Leaderboard for Microsoft Defender for Identity
Check out the members with the highest scores who have reviewed Microsoft Defender for Identity.
#1. Ram-Krish
380
Points
Cloud Security & Governance at a financial services firm
Reviewed Microsoft Defender for Identity:
Protect on-premises and hybrid environments with advanced threat detection and seamless integration#2. MichaelSoliman
375
Points
Owner at a tech services company
Reviewed Microsoft Defender for Identity:
Its hybrid artificial intelligence, which gathers forensic data to track and counteract security…#3. Peter Arabomen
265
Points
Security Engineer at a financial services firm
Reviewed Microsoft Defender for Identity:
Has supported hybrid identity management while integrating well with cloud directory services#4. Nay San
200
Points
Solution Consultant at a tech services company
Reviewed Microsoft Defender for Identity:
Real-time threat detection, good behavioral analytics, and enhanced security#5. ROBERT-CHRISTIAN
185
Points
CTO at a tech vendor
Reviewed Microsoft Defender for Identity:
Integration within the ecosystem enhances collaboration and automates functionalities125
Points
Owner at a tech services company
Reviewed Microsoft Defender for Identity:
Provides PIM management, access detection, and synchronization#7. IlanHamoy
115
Points
Information Technology Security Manager at a security firm
Reviewed Microsoft Defender for Identity:
Automatic remedies and threat visibility boost safety with minimal fake alerts#8. Alejandro Lagler
115
Points
Manager, Collaboration Bds at a comms service provider
Reviewed Microsoft Defender for Identity:
Helps prioritize security threats and enables access management for enterprise clients#9. reviewer2510448
110
Points
Security Specialist at a construction company
Reviewed Microsoft Defender for Identity:
Used for detecting user anomalies, sign-in anomalies, and user behavior analytics#10. Oluwa Adetunji
110
Points
CyberSecurity Engineer | Information Security Management
Reviewed Microsoft Defender for Identity:
Automation and threat intelligence streamline threat response and user management






