The product needs further maturity, with some improvements in the user interface. There's a confusing aspect with the escalation options; applying conditions to a specific identity is not immediately visible and requires using a three-dot menu. Additionally, the rogue apps feature is in beta and currently lacks functionality.
Find out what your peers are saying about Huntress, Proofpoint, CrowdStrike and others in Identity Threat Detection and Response (ITDR). Updated: March 2025.
Identity Threat Detection and Response technology focuses on identifying and mitigating potential security threats associated with user credentials and identities. By proactively monitoring, it supports organizations in securing their network from unauthorized access.ITDR solutions play a crucial role in the cybersecurity landscape, where safeguarding digital identities is paramount. With the increasing threats targeting user identities, these tools help detect suspicious activities,...
More in-depth reporting could be beneficial for the solution.
The product needs further maturity, with some improvements in the user interface. There's a confusing aspect with the escalation options; applying conditions to a specific identity is not immediately visible and requires using a three-dot menu. Additionally, the rogue apps feature is in beta and currently lacks functionality.