Identity Threat Detection and Response (ITDR) software detects identity-related threats and vulnerabilities, such as credential misuse, unauthorized access, privilege escalation, and other identity-based attacks. This software is primarily used by information security teams as part of their broader threat detection efforts, focusing specifically on the identity-related aspects of the attack surface. Unlike Identity and Access Management (IAM) software, which prevents identity-related risks through proper user authentication and access controls upfront, ITDR identifies and responds to threats after systems have been compromised. Additionally, ITDR differs from Insider Threat Management (ITM) software, as it focuses on detecting abuse of credentials and privileges, typically by external attackers exploiting identity vulnerabilities. In contrast, ITM monitors the actions of insiders, such as unauthorized data downloads, by users with legitimate access.
Pošalji novu aplikaciju

JumpCloud
jumpcloud.com
JumpCloud je cloud platforma za upravljanje identitetima i uređajima: centralizira pristup, SSO, MFA, upravljanje uređajima i autentifikaciju (LDAP/RADIUS).

Push Security
pushsecurity.com
Push Security je preglednički agent koji prati identitete korisnika, otkriva i odgovara na napade, blokira zlonamjerne aktivnosti i omogućuje MFA.

SlashID
slashid.dev
SlashID je platforma za upravljanje identitetima koja dodaje autentikaciju, autorizaciju, ograničenje zahtjeva i detekciju botova bez CAPTCHA-e te nudi passkey, SSO i sigurnu serverless pohranu korisnika.

Delinea
delinea.com
Delinea upravlja i štiti privilegirane i ne-ljudske identitete: centralizira autorizaciju, kontrolira pristup, rotira vjerodajnice, prati sesije i integrira se s IT sustavima.

Trustle
trustle.com
Trustle pomaže timovima upravljati pristupima do cloud sustava (npr. AWS), olakšava privremeni ulaz i izlaz iz sustava te smanjuje vrijeme i rizik upravljanja pristupima.

Sonrai Security
sonraisecurity.com
Sonrai Security prati i upravlja identitetima, dozvolama i podacima u AWS, Azure i Google Cloudu, otkriva rizike i automatizira uklanjanje nepotrebnih pristupa.
© 2025 WebCatalog, Inc.