

Find out what your peers are saying about ServiceNow, Proofpoint, Trellix and others in Security Incident Response.
| Product | Mindshare (%) |
|---|---|
| Proofpoint Threat Response | 8.7% |
| Netwrix Threat Manager | 2.1% |
| Other | 89.2% |
Netwrix Threat Manager is an identity threat detection and response (ITDR) solution that protects hybrid identity environments across Active Directory and Microsoft Entra ID. It detects and responds to identity-based attacks in real time using behavioural analytics and machine learning to surface high-risk activity and reduce alert noise.
By focusing on identity as the primary attack surface, Netwrix Threat Manager helps organizations protect sensitive data from the inside out.
The solution enables security teams to identify compromised accounts, privilege misuse, lateral movement, credential abuse, and advanced techniques such as Kerberoasting, DCSync, DCShadow, and Golden Ticket attacks. Automated response actions support rapid containment. Built-in investigation tools correlate related events into a consolidated attack timeline for efficient forensic analysis.
Key use cases
• Detect identity attacks across Active Directory, Entra ID, and file systems
• Investigate incidents faster with correlated attack timelines
• Trigger automated containment actions to block malicious activity
• Detect insider threats using behavioural analytics and anomaly detection
• Deploy deception controls using honeytoken technology
Netwrix Threat Manager integrates with SIEM platforms, ITSM tools such as ServiceNow, and collaboration platforms such as Slack to support coordinated incident response. By combining accurate detection, automated containment, and investigation capabilities, it helps reduce the risk of domain compromise and operational disruption.
No defense can stop every attack. When something does get through, Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently. Get an actionable view of threats, enrich alerts, and automate forensic collection and comparison. For verified threats, quarantine and contain users, hosts, and malicious email attachments - automatically or at the push of a button.
We monitor all Security Incident Response reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.