App store for web apps
Find the right software and services.
Turn websites into desktop apps with WebCatalog Desktop, and access a wealth of exclusive apps for Mac, Windows. Use spaces to organize apps, switch between multiple accounts with ease, and boost your productivity like never before.
Top Identity Threat Detection and Response (ITDR) Software - United States
Identity Threat Detection and Response (ITDR) software detects identity-related threats and vulnerabilities, such as credential misuse, unauthorized access, privilege escalation, and other identity-based attacks. This software is primarily used by information security teams as part of their broader threat detection efforts, focusing specifically on the identity-related aspects of the attack surface. Unlike Identity and Access Management (IAM) software, which prevents identity-related risks through proper user authentication and access controls upfront, ITDR identifies and responds to threats after systems have been compromised. Additionally, ITDR differs from Insider Threat Management (ITM) software, as it focuses on detecting abuse of credentials and privileges, typically by external attackers exploiting identity vulnerabilities. In contrast, ITM monitors the actions of insiders, such as unauthorized data downloads, by users with legitimate access.
Submit New App
JumpCloud
jumpcloud.com
JumpCloud is a U.S.-based enterprise software company headquartered in Denver, Colorado. The company was formally launched in 2013 at TechCrunch Disrupt Battlefield as an automated server management tool. JumpCloud’s cloud based directory platform is used to securely manage users identity, devices, and access.
Sonrai Security
sonraisecurity.com
Sonrai Security is a leading public cloud identity and access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers identity, access, and permissions security for companies running on AWS, Azure, and Google Cloud platforms. The company is renowned for pioneering the Cloud Permissions Firewall, enabling one-click least privilege while supporting developer access needs without disruption. Trusted by leading companies across various industries, Sonrai Security is committed to driving innovation and excellence in cloud security. The company is trusted by Cloud Operations, Development, and Security Teams. The Cloud Permissions Firewall removes all unused sensitive permissions, quarantines unused identities and disables unused service and regions – all in one click. There is zero disruption to the business because all identities using sensitive permissions maintain their access and any new access is seamlessly granted through an automated chatops workflow. SecOps teams spend 97% less time achieving least privilege and slash the attack surface by 92%. After reaching platform-wide least privilege, the Sonrai CIEM+ solution discovers toxic combinations of permissions and shuts down the unintended attack paths they create with automated or detailed remediation.
SlashID
slashid.dev
SlashID is the composable identity platform to improve identity security without user friction. SlashID Gate adds authentication, authorization,rate limiting and CAPTCHA-less bot detections to your APIs and workloads in minutes. Gate can also enforce passkeys and SSO on any internal application without any code modification. SlashID Access is the most reliable and secure user identity management module thanks to our HSM-backed, globally-replicated, serverless architecture. With Access, you can implement passwordless authentication flows, multi-tenancy, one-click user invitations, RBAC, SAML and MFA in hours, not weeks. Access minimizes latency for your users, seamlessly handles traffic spikes and avoids downtime and customer data breaches.
Delinea
delinea.com
Delinea is a pioneer in securing identities through centralized authorization, making organizations more secure by seamlessly governing their interactions across the modern enterprise. Delinea allows organizations to apply context and intelligence throughout the identity lifecycle across cloud and traditional infrastructure, data, and SaaS applications to eliminate identity-related threats. With intelligent authorization for all identities, Delinea is the only platform that enables you to identify each user, assign appropriate access levels, monitor interaction across the modern enterprise, and immediately respond upon detecting any irregularities. The Delinea Platform enables your teams to accelerate adoption and be more productive by deploying in weeks, not months, and requiring 10% of the resources to manage compared to the nearest competitor.
Push Security
pushsecurity.com
Push is a browser-based agent that stops identity attacks. The Push browser agent gives your blue team the broadest, most contextual source of telemetry for monitoring all your workforce identities, whether they're in your IdP or not. Using this telemetry, you can detect and respond to identity attacks that can't be observed using other telemetry sources. Not got an in-house blue team? You can still use Push to defend your identities. Enable Push’s out-of-the-box security controls so you can automatically block malicious activities in the browser as well as stop end-users introducing new identity vulnerabilities. Push gives you proactive identity security posture management (ISPM) capabilities AND reactive identity threat detection and response (ITDR) capabilities in a single tool.
Trustle
trustle.com
Trustle helps front-line teams get their permissioning under control, so they can get back to the jobs they’re hired to do. Trustle makes it easy for developers and ops teams to go in and and out of access to cloud systems like AWS, which cuts out hassles, time, and headaches, while making the whole cloud environment safer and more secure.