Leaderboard for Microsoft Defender for Identity
Check out the members with the highest scores who have reviewed Microsoft Defender for Identity.
#1. MichaelSoliman
375
Points
Owner at Alopex ONE UG
Reviewed Microsoft Defender for Identity:
Its hybrid artificial intelligence, which gathers forensic data to track and counteract security…#2. Ram-Krish
330
Points
Cloud Security & Governance at a financial services firm
Reviewed Microsoft Defender for Identity:
Protect on-premises and hybrid environments with advanced threat detection and seamless integration#3. Peter Arabomen
265
Points
Security Engineer at Fidelity Bank Plc
Reviewed Microsoft Defender for Identity:
Has supported hybrid identity management while integrating well with cloud directory services#4. Nay San
200
Points
Solution Consultant at BIM Group of Companies
Reviewed Microsoft Defender for Identity:
Real-time threat detection, good behavioral analytics, and enhanced security#5. ROBERT-CHRISTIAN
185
Points
CTO at a tech vendor
Reviewed Microsoft Defender for Identity:
Integration within the ecosystem enhances collaboration and automates functionalities125
Points
Owner at a tech services company
Reviewed Microsoft Defender for Identity:
Provides PIM management, access detection, and synchronization#7. IlanHamoy
115
Points
Information Technology Security Manager at a security firm
Reviewed Microsoft Defender for Identity:
Automatic remedies and threat visibility boost safety with minimal fake alerts#8. Alejandro Lagler
115
Points
Manager, Collaboration Bds at C3ntro
Reviewed Microsoft Defender for Identity:
Helps prioritize security threats and enables access management for enterprise clients#9. reviewer2510448
110
Points
Security Specialist at a construction company
Reviewed Microsoft Defender for Identity:
Used for detecting user anomalies, sign-in anomalies, and user behavior analytics#10. Oluwa Adetunji
110
Points
CyberSecurity Engineer | Information Security Management at Self Employed
Reviewed Microsoft Defender for Identity:
Automation and threat intelligence streamline threat response and user management






