Introducing G2.ai, the future of software buying.Try now

Best Identity Threat Detection and Response (ITDR) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Identity threat detection and response (ITDR) software detects identity-related threats and vulnerabilities, such as credential misuse and abuse, unapproved entitlements and privilege escalations, and other identity-related threats. Information security teams use this software as part of their threat detection initiatives, specifically geared toward the identity-related attack surface.

Identity threat detection and response (ITDR) software is different from identity and access management (IAM) software; IAM’s function is to prevent identity-related risks through proper user authentication and access up front, while ITDR identifies threats once systems have been compromised. ITDR is also different from insider threat management (ITM) software in that ITDR identifies credentials and privileges abuse, commonly from external parties that have identified and misused identity vulnerabilities, while ITM monitors the actions a threat actor takes such as downloading data they are not entitled to.

To qualify for inclusion in the Identity Threat Detection and Response (ITDR) category, a product must:

Monitor and detect potentially malicious identity and privileges activity
Identify identity-related misconfigurations
Investigate identity threats with contextual user information
Flag unauthorized accounts and excessive privileges

Best Identity Threat Detection and Response (ITDR) Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
43 Listings in Identity Threat Detection and Response (ITDR) Available
(35)4.9 out of 5
1st Easiest To Use in Identity Threat Detection and Response (ITDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Huntress Managed Identity Threat Detection & Response (ITDR) is a specialized cybersecurity solution designed to help organizations safeguard their identity systems against a range of identity-bas

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 94% Small-Business
    • 3% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Huntress Managed ITDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    13
    Continuous Monitoring
    10
    Customer Support
    8
    Alert Management
    7
    Remediation Process
    7
    Cons
    Inefficient Alert System
    4
    UX Improvement
    3
    Inadequate Detection
    2
    Limited Control
    2
    Poor Reporting
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Huntress Managed ITDR features and usability ratings that predict user satisfaction
    9.7
    Quality of Support
    Average: 9.1
    9.7
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Ellicott City, US
    Twitter
    @HuntressLabs
    35,762 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    603 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Huntress Managed Identity Threat Detection & Response (ITDR) is a specialized cybersecurity solution designed to help organizations safeguard their identity systems against a range of identity-bas

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 94% Small-Business
  • 3% Enterprise
Huntress Managed ITDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
13
Continuous Monitoring
10
Customer Support
8
Alert Management
7
Remediation Process
7
Cons
Inefficient Alert System
4
UX Improvement
3
Inadequate Detection
2
Limited Control
2
Poor Reporting
2
Huntress Managed ITDR features and usability ratings that predict user satisfaction
9.7
Quality of Support
Average: 9.1
9.7
Ease of Use
Average: 9.1
Seller Details
Company Website
Year Founded
2015
HQ Location
Ellicott City, US
Twitter
@HuntressLabs
35,762 Twitter followers
LinkedIn® Page
www.linkedin.com
603 employees on LinkedIn®
(297)4.7 out of 5
2nd Easiest To Use in Identity Threat Detection and Response (ITDR) software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    54
    Ease of Use
    43
    Security
    43
    Threat Detection
    38
    Detection
    36
    Cons
    Missing Features
    14
    Expensive
    11
    Limited Features
    11
    Complexity
    10
    Difficult Navigation
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 9.1
    9.0
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,168 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,101 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 40% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
54
Ease of Use
43
Security
43
Threat Detection
38
Detection
36
Cons
Missing Features
14
Expensive
11
Limited Features
11
Complexity
10
Difficult Navigation
10
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 9.1
9.0
Ease of Use
Average: 9.1
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,168 Twitter followers
LinkedIn® Page
www.linkedin.com
10,101 employees on LinkedIn®
Ownership
NASDAQ: CRWD

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(31)4.8 out of 5
4th Easiest To Use in Identity Threat Detection and Response (ITDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Falcon Shield enables security teams to secure their entire SaaS stack with its prevention, detection, and response platform. Falcon Shield integrates with over 150 applications out of the box, contin

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 52% Enterprise
    • 48% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Shield Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    19
    Customer Support
    17
    Easy Integrations
    14
    Features
    8
    Security
    7
    Cons
    Limited Features
    6
    Integration Issues
    5
    Immaturity
    2
    Poor Usability
    2
    Training Required
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Shield features and usability ratings that predict user satisfaction
    9.8
    Quality of Support
    Average: 9.1
    9.4
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,168 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,101 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

Falcon Shield enables security teams to secure their entire SaaS stack with its prevention, detection, and response platform. Falcon Shield integrates with over 150 applications out of the box, contin

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 52% Enterprise
  • 48% Mid-Market
CrowdStrike Falcon Shield Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
19
Customer Support
17
Easy Integrations
14
Features
8
Security
7
Cons
Limited Features
6
Integration Issues
5
Immaturity
2
Poor Usability
2
Training Required
2
CrowdStrike Falcon Shield features and usability ratings that predict user satisfaction
9.8
Quality of Support
Average: 9.1
9.4
Ease of Use
Average: 9.1
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,168 Twitter followers
LinkedIn® Page
www.linkedin.com
10,101 employees on LinkedIn®
Ownership
NASDAQ: CRWD
(99)4.3 out of 5
7th Easiest To Use in Identity Threat Detection and Response (ITDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Identity enables you to integrate Microsoft Defender for Identity with Defender for Endpoint, for an even more complete threat protection solution. While Defender for Identity m

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 36% Enterprise
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Installation
    1
    Easy Integrations
    1
    Monitoring
    1
    Threat Detection
    1
    User Interface
    1
    Cons
    Complexity
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Identity features and usability ratings that predict user satisfaction
    7.9
    Quality of Support
    Average: 9.1
    8.0
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Identity enables you to integrate Microsoft Defender for Identity with Defender for Endpoint, for an even more complete threat protection solution. While Defender for Identity m

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 36% Enterprise
  • 31% Small-Business
Microsoft Defender for Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Installation
1
Easy Integrations
1
Monitoring
1
Threat Detection
1
User Interface
1
Cons
Complexity
1
False Positives
1
Microsoft Defender for Identity features and usability ratings that predict user satisfaction
7.9
Quality of Support
Average: 9.1
8.0
Ease of Use
Average: 9.1
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
(187)4.7 out of 5
Optimized for quick response
3rd Easiest To Use in Identity Threat Detection and Response (ITDR) software
View top Consulting Services for SentinelOne Singularity
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    19
    Threat Detection
    13
    Features
    12
    Security
    12
    Customer Support
    9
    Cons
    False Positives
    6
    Compatibility Issues
    5
    Agent Issues
    4
    Blocking Issues
    4
    Missing Features
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 9.1
    9.0
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Mid-Market
  • 37% Enterprise
SentinelOne Singularity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
19
Threat Detection
13
Features
12
Security
12
Customer Support
9
Cons
False Positives
6
Compatibility Issues
5
Agent Issues
4
Blocking Issues
4
Missing Features
4
SentinelOne Singularity features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 9.1
9.0
Ease of Use
Average: 9.1
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
(42)4.5 out of 5
6th Easiest To Use in Identity Threat Detection and Response (ITDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Identity Protection is a tool that allows organizations to accomplish three key tasks: Automate the detection and remediation of identity-based risks. Investigate risks using data in the portal. Expor

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 50% Enterprise
    • 26% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Entra Identity Protection features and usability ratings that predict user satisfaction
    9.0
    Quality of Support
    Average: 9.1
    9.0
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Identity Protection is a tool that allows organizations to accomplish three key tasks: Automate the detection and remediation of identity-based risks. Investigate risks using data in the portal. Expor

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 50% Enterprise
  • 26% Mid-Market
Microsoft Entra Identity Protection features and usability ratings that predict user satisfaction
9.0
Quality of Support
Average: 9.1
9.0
Ease of Use
Average: 9.1
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
(13)4.1 out of 5
View top Consulting Services for Falcon Identity protection
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Falcon Identity protection features and usability ratings that predict user satisfaction
    8.2
    Quality of Support
    Average: 9.1
    8.5
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,168 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,101 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Users
No information available
Industries
No information available
Market Segment
  • 46% Mid-Market
  • 38% Enterprise
Falcon Identity protection features and usability ratings that predict user satisfaction
8.2
Quality of Support
Average: 9.1
8.5
Ease of Use
Average: 9.1
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,168 Twitter followers
LinkedIn® Page
www.linkedin.com
10,101 employees on LinkedIn®
Ownership
NASDAQ: CRWD
(22)4.7 out of 5
5th Easiest To Use in Identity Threat Detection and Response (ITDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zilla Security is the leading provider of modern identity governance and administration (IGA), providing a SaaS platform that automates the processes of identity compliance, provisioning, and security

    Users
    No information available
    Industries
    • Hospital & Health Care
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zilla Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Access Management
    7
    Customer Support
    7
    Intuitive
    6
    Access Control
    5
    Cons
    Missing Features
    4
    Inefficient Processes
    2
    Integration Issues
    2
    Lack of Automation
    2
    Lack of Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zilla Security features and usability ratings that predict user satisfaction
    9.6
    Quality of Support
    Average: 9.1
    9.3
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2020
    HQ Location
    Boston, MA
    Twitter
    @zillasecurity
    52 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zilla Security is the leading provider of modern identity governance and administration (IGA), providing a SaaS platform that automates the processes of identity compliance, provisioning, and security

Users
No information available
Industries
  • Hospital & Health Care
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Zilla Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Access Management
7
Customer Support
7
Intuitive
6
Access Control
5
Cons
Missing Features
4
Inefficient Processes
2
Integration Issues
2
Lack of Automation
2
Lack of Features
2
Zilla Security features and usability ratings that predict user satisfaction
9.6
Quality of Support
Average: 9.1
9.3
Ease of Use
Average: 9.1
Seller Details
Company Website
Year Founded
2020
HQ Location
Boston, MA
Twitter
@zillasecurity
52 Twitter followers
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
(181)4.2 out of 5
Optimized for quick response
View top Consulting Services for IBM MaaS360
Save to My Lists
Entry Level Price:$4.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM MaaS360 is an easy to use, unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across essentially every type of device. Its

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 45% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM MaaS360 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    32
    Ease of Use
    27
    Security
    27
    Device Management
    26
    Integrations
    17
    Cons
    Learning Curve
    12
    Expensive
    9
    Slow Performance
    9
    Complexity
    8
    Complex Setup
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM MaaS360 features and usability ratings that predict user satisfaction
    8.0
    Quality of Support
    Average: 9.1
    8.2
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM MaaS360 is an easy to use, unified endpoint management (UEM) solution that transforms the way that organizations support users, apps, content, and data across essentially every type of device. Its

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 45% Mid-Market
  • 38% Enterprise
IBM MaaS360 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
32
Ease of Use
27
Security
27
Device Management
26
Integrations
17
Cons
Learning Curve
12
Expensive
9
Slow Performance
9
Complexity
8
Complex Setup
7
IBM MaaS360 features and usability ratings that predict user satisfaction
8.0
Quality of Support
Average: 9.1
8.2
Ease of Use
Average: 9.1
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Semperis Directory Services Protector puts Active Directory security and identity threat detection and response on autopilot with continuous AD threat monitoring, real-time alerts, and autonomous reme

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 76% Enterprise
    • 24% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Semperis Directory Services Protector Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Features
    7
    Alerts
    5
    Customer Support
    5
    Monitoring
    5
    Cons
    Poor Reporting
    3
    Communication Issues
    2
    Complex Setup
    2
    Data Inconsistency
    2
    Deployment Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Semperis Directory Services Protector features and usability ratings that predict user satisfaction
    9.6
    Quality of Support
    Average: 9.1
    9.2
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Semperis
    Company Website
    Year Founded
    2015
    HQ Location
    Hoboken, New Jersey
    Twitter
    @SemperisTech
    10,097 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    510 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Semperis Directory Services Protector puts Active Directory security and identity threat detection and response on autopilot with continuous AD threat monitoring, real-time alerts, and autonomous reme

Users
No information available
Industries
No information available
Market Segment
  • 76% Enterprise
  • 24% Mid-Market
Semperis Directory Services Protector Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Features
7
Alerts
5
Customer Support
5
Monitoring
5
Cons
Poor Reporting
3
Communication Issues
2
Complex Setup
2
Data Inconsistency
2
Deployment Issues
2
Semperis Directory Services Protector features and usability ratings that predict user satisfaction
9.6
Quality of Support
Average: 9.1
9.2
Ease of Use
Average: 9.1
Seller Details
Seller
Semperis
Company Website
Year Founded
2015
HQ Location
Hoboken, New Jersey
Twitter
@SemperisTech
10,097 Twitter followers
LinkedIn® Page
www.linkedin.com
510 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qomplx features and usability ratings that predict user satisfaction
    9.5
    Quality of Support
    Average: 9.1
    8.5
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    QOMPLX
    Year Founded
    2015
    HQ Location
    Tysons, Virginia
    Twitter
    @QOMPLX
    586 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

Users
No information available
Industries
No information available
Market Segment
  • 55% Mid-Market
  • 27% Enterprise
Qomplx features and usability ratings that predict user satisfaction
9.5
Quality of Support
Average: 9.1
8.5
Ease of Use
Average: 9.1
Seller Details
Seller
QOMPLX
Year Founded
2015
HQ Location
Tysons, Virginia
Twitter
@QOMPLX
586 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oort is an identity threat detection and response platform for enterprise security. Oort enables IAM, SOC, and GRC professionals to find users quickly and easily, to conduct deep and thorough identity

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oort Identity Security Platform features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 9.1
    9.3
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oort
    Year Founded
    2019
    HQ Location
    Boston, MA
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Oort is an identity threat detection and response platform for enterprise security. Oort enables IAM, SOC, and GRC professionals to find users quickly and easily, to conduct deep and thorough identity

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Oort Identity Security Platform features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 9.1
9.3
Ease of Use
Average: 9.1
Seller Details
Seller
Oort
Year Founded
2019
HQ Location
Boston, MA
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Reveal Security ITDR detects identity threats in and across SaaS applications and cloud services – post authentication. The solution uses a patented unsupervised machine learning algorithm to continu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RevealSecurity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    4
    User Behavior Analytics
    3
    Monitoring
    2
    Activity Monitoring
    1
    Alerts
    1
    Cons
    Expensive
    1
    Insufficient Detail
    1
    Integration Issues
    1
    Limited Automation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RevealSecurity features and usability ratings that predict user satisfaction
    9.7
    Quality of Support
    Average: 9.1
    9.3
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Radebeul, Saxony
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Reveal Security ITDR detects identity threats in and across SaaS applications and cloud services – post authentication. The solution uses a patented unsupervised machine learning algorithm to continu

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 43% Mid-Market
RevealSecurity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
4
User Behavior Analytics
3
Monitoring
2
Activity Monitoring
1
Alerts
1
Cons
Expensive
1
Insufficient Detail
1
Integration Issues
1
Limited Automation
1
RevealSecurity features and usability ratings that predict user satisfaction
9.7
Quality of Support
Average: 9.1
9.3
Ease of Use
Average: 9.1
Seller Details
Year Founded
2021
HQ Location
Radebeul, Saxony
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vectra AI is the leader in hybrid attack detection, investigation and response. The Vectra AI Platform delivers integrated signal across public cloud, SaaS, identity, and data center networks in a sin

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 72% Enterprise
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Vectra AI Platform features and usability ratings that predict user satisfaction
    8.1
    Quality of Support
    Average: 9.1
    8.3
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Vectra AI
    Year Founded
    2011
    HQ Location
    San Jose, CA
    Twitter
    @Vectra_AI
    3,227 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    644 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Vectra AI is the leader in hybrid attack detection, investigation and response. The Vectra AI Platform delivers integrated signal across public cloud, SaaS, identity, and data center networks in a sin

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 72% Enterprise
  • 17% Mid-Market
Vectra AI Platform features and usability ratings that predict user satisfaction
8.1
Quality of Support
Average: 9.1
8.3
Ease of Use
Average: 9.1
Seller Details
Seller
Vectra AI
Year Founded
2011
HQ Location
San Jose, CA
Twitter
@Vectra_AI
3,227 Twitter followers
LinkedIn® Page
www.linkedin.com
644 employees on LinkedIn®
(5)4.9 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Reco is the leader in Dynamic SaaS Security — the only approach that eliminates the SaaS Security Gap (the growing gap between what you can protect and what’s outpacing your security). This gap is dri

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Reco Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Customer Support
    2
    Easy Integrations
    1
    Easy Setup
    1
    Intuitive
    1
    Cons
    Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Reco features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 9.1
    9.3
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Reco
    Company Website
    Year Founded
    2020
    HQ Location
    New York, New York
    Twitter
    @recolabs_ai
    185 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    63 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Reco is the leader in Dynamic SaaS Security — the only approach that eliminates the SaaS Security Gap (the growing gap between what you can protect and what’s outpacing your security). This gap is dri

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 20% Enterprise
Reco Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Customer Support
2
Easy Integrations
1
Easy Setup
1
Intuitive
1
Cons
Limitations
1
Reco features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 9.1
9.3
Ease of Use
Average: 9.1
Seller Details
Seller
Reco
Company Website
Year Founded
2020
HQ Location
New York, New York
Twitter
@recolabs_ai
185 Twitter followers
LinkedIn® Page
www.linkedin.com
63 employees on LinkedIn®
(7)4.7 out of 5
View top Consulting Services for SaaS Alerts
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ​​SaaS Alerts is a automated cybersecurity platform to detect and automate the remediation of SaaS security threats. The platform provides unified, continuous monitoring of core business SaaS applicat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Small-Business
    • 14% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SaaS Alerts Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerts
    3
    Ease of Use
    2
    Features
    2
    Reporting
    2
    Threat Detection
    2
    Cons
    False Positives
    1
    Ineffective Alerts
    1
    Inefficient Alert System
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SaaS Alerts features and usability ratings that predict user satisfaction
    9.7
    Quality of Support
    Average: 9.1
    8.6
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,018 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

​​SaaS Alerts is a automated cybersecurity platform to detect and automate the remediation of SaaS security threats. The platform provides unified, continuous monitoring of core business SaaS applicat

Users
No information available
Industries
No information available
Market Segment
  • 86% Small-Business
  • 14% Mid-Market
SaaS Alerts Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerts
3
Ease of Use
2
Features
2
Reporting
2
Threat Detection
2
Cons
False Positives
1
Ineffective Alerts
1
Inefficient Alert System
1
Integration Issues
1
SaaS Alerts features and usability ratings that predict user satisfaction
9.7
Quality of Support
Average: 9.1
8.6
Ease of Use
Average: 9.1
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,550 Twitter followers
LinkedIn® Page
www.linkedin.com
5,018 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securonix is working to radically transform all areas of data security with actionable security intelligence.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 54% Enterprise
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Securonix Security Operations and Analytics Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dashboard Customization
    1
    Dashboard Design
    1
    Dashboard Usability
    1
    Detection Accuracy
    1
    Ease of Understanding
    1
    Cons
    Alerting Issues
    1
    Complex Querying
    1
    Inefficient Alerting
    1
    Logging Issues
    1
    Log Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Securonix Security Operations and Analytics Platform features and usability ratings that predict user satisfaction
    8.1
    Quality of Support
    Average: 9.1
    8.5
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Securonix
    Year Founded
    2008
    HQ Location
    Addison, US
    Twitter
    @Securonix
    4,228 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    708 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securonix is working to radically transform all areas of data security with actionable security intelligence.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 54% Enterprise
  • 31% Small-Business
Securonix Security Operations and Analytics Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dashboard Customization
1
Dashboard Design
1
Dashboard Usability
1
Detection Accuracy
1
Ease of Understanding
1
Cons
Alerting Issues
1
Complex Querying
1
Inefficient Alerting
1
Logging Issues
1
Log Management
1
Securonix Security Operations and Analytics Platform features and usability ratings that predict user satisfaction
8.1
Quality of Support
Average: 9.1
8.5
Ease of Use
Average: 9.1
Seller Details
Seller
Securonix
Year Founded
2008
HQ Location
Addison, US
Twitter
@Securonix
4,228 Twitter followers
LinkedIn® Page
www.linkedin.com
708 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sonrai Security is a leading public cloud identity and access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security de

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 39% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sonrai Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    9
    Cloud Security
    7
    Cloud Technology
    6
    Cloud Management
    4
    Ease of Use
    4
    Cons
    Expensive
    3
    Automation Issues
    2
    Feature Complexity
    2
    Feature Limitations
    2
    Improvement Needed
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sonrai Security features and usability ratings that predict user satisfaction
    8.9
    Quality of Support
    Average: 9.1
    8.1
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    74 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sonrai Security is a leading public cloud identity and access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security de

Users
No information available
Industries
No information available
Market Segment
  • 39% Enterprise
  • 33% Mid-Market
Sonrai Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
9
Cloud Security
7
Cloud Technology
6
Cloud Management
4
Ease of Use
4
Cons
Expensive
3
Automation Issues
2
Feature Complexity
2
Feature Limitations
2
Improvement Needed
2
Sonrai Security features and usability ratings that predict user satisfaction
8.9
Quality of Support
Average: 9.1
8.1
Ease of Use
Average: 9.1
Seller Details
Year Founded
2017
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
74 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Push is a browser-based agent that stops identity attacks. The Push browser agent gives your blue team the broadest, most contextual source of telemetry for monitoring all your workforce identities,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 56% Mid-Market
    • 22% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Push features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 9.1
    9.4
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    London, GB
    Twitter
    @PushSecurity
    566 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    60 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Push is a browser-based agent that stops identity attacks. The Push browser agent gives your blue team the broadest, most contextual source of telemetry for monitoring all your workforce identities,

Users
No information available
Industries
No information available
Market Segment
  • 56% Mid-Market
  • 22% Small-Business
Push features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 9.1
9.4
Ease of Use
Average: 9.1
Seller Details
Year Founded
2021
HQ Location
London, GB
Twitter
@PushSecurity
566 Twitter followers
LinkedIn® Page
www.linkedin.com
60 employees on LinkedIn®
(2)5.0 out of 5
View top Consulting Services for SentinelOne Singularity Identity Detection & Response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Identity is an identity threat detection and response (ITDR) solution that protects on-premises and cloud-hosted Active Directory domain controllers and domain-joined endpoints in real tim

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Identity Detection & Response features and usability ratings that predict user satisfaction
    5.8
    Quality of Support
    Average: 9.1
    9.2
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Identity is an identity threat detection and response (ITDR) solution that protects on-premises and cloud-hosted Active Directory domain controllers and domain-joined endpoints in real tim

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
SentinelOne Singularity Identity Detection & Response features and usability ratings that predict user satisfaction
5.8
Quality of Support
Average: 9.1
9.2
Ease of Use
Average: 9.1
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
Ownership
NASDAQ: S
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gurucul is the only cost-optimized security analytics company founded in data science that delivers radical clarity about cyber risk. Our REVEAL security analytics platform analyzes enterprise data at

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Gurucul Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    Alerts
    1
    Dashboard Design
    1
    Dashboard Usability
    1
    Data Protection
    1
    Cons
    Alert Management
    1
    Cloud Dependency
    1
    Complex Parsing
    1
    Deployment Difficulties
    1
    Ineffective Alerts
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Gurucul features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 9.1
    9.2
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Gurucul
    Year Founded
    2010
    HQ Location
    El Segundo, US
    Twitter
    @Gurucul
    1,314 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    288 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Gurucul is the only cost-optimized security analytics company founded in data science that delivers radical clarity about cyber risk. Our REVEAL security analytics platform analyzes enterprise data at

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Gurucul Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
Alerts
1
Dashboard Design
1
Dashboard Usability
1
Data Protection
1
Cons
Alert Management
1
Cloud Dependency
1
Complex Parsing
1
Deployment Difficulties
1
Ineffective Alerts
1
Gurucul features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 9.1
9.2
Ease of Use
Average: 9.1
Seller Details
Seller
Gurucul
Year Founded
2010
HQ Location
El Segundo, US
Twitter
@Gurucul
1,314 Twitter followers
LinkedIn® Page
www.linkedin.com
288 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Verify Identity Protection features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 9.1
    10.0
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
IBM Verify Identity Protection features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 9.1
10.0
Ease of Use
Average: 9.1
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
Entry Level Price:$2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    All in one platform for SaaS app and access management for modern IT teams. Streamline app discovery, user offboarding, access reviews, and cost tracking.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Resmo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Integration
    2
    Alert Notifications
    1
    Ease of Use
    1
    Easy Integrations
    1
    Monitoring Efficiency
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Resmo features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 9.1
    9.7
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Resmo
    Year Founded
    2022
    HQ Location
    Dover, US
    Twitter
    @resmoio
    1,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

All in one platform for SaaS app and access management for modern IT teams. Streamline app discovery, user offboarding, access reviews, and cost tracking.

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 30% Mid-Market
Resmo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Integration
2
Alert Notifications
1
Ease of Use
1
Easy Integrations
1
Monitoring Efficiency
1
Cons
This product has not yet received any negative sentiments.
Resmo features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 9.1
9.7
Ease of Use
Average: 9.1
Seller Details
Seller
Resmo
Year Founded
2022
HQ Location
Dover, US
Twitter
@resmoio
1,269 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Silverfort features and usability ratings that predict user satisfaction
    9.9
    Quality of Support
    Average: 9.1
    9.9
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Tel Aviv, Israel
    Twitter
    @silverfort
    627 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    484 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative age

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Silverfort features and usability ratings that predict user satisfaction
9.9
Quality of Support
Average: 9.1
9.9
Ease of Use
Average: 9.1
Seller Details
Year Founded
2016
HQ Location
Tel Aviv, Israel
Twitter
@silverfort
627 Twitter followers
LinkedIn® Page
www.linkedin.com
484 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WithSecure Elements XDR is a unified solution, designed to protect modern IT estates. It minimizes the impact of attacks by using automated and advanced preventative controls that keep incident volume

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • WithSecure Elements XDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    Ease of Use
    1
    Efficiency
    1
    Investigation
    1
    Platform Compatibility
    1
    Cons
    False Positives
    1
    Not User-Friendly
    1
    Poor Navigation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WithSecure Elements XDR features and usability ratings that predict user satisfaction
    9.4
    Quality of Support
    Average: 9.1
    9.4
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Helsinki, Finland
    Twitter
    @WithSecure
    68,923 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,718 employees on LinkedIn®
    Ownership
    FSOYF
Product Description
How are these determined?Information
This description is provided by the seller.

WithSecure Elements XDR is a unified solution, designed to protect modern IT estates. It minimizes the impact of attacks by using automated and advanced preventative controls that keep incident volume

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
WithSecure Elements XDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
Ease of Use
1
Efficiency
1
Investigation
1
Platform Compatibility
1
Cons
False Positives
1
Not User-Friendly
1
Poor Navigation
1
WithSecure Elements XDR features and usability ratings that predict user satisfaction
9.4
Quality of Support
Average: 9.1
9.4
Ease of Use
Average: 9.1
Seller Details
Year Founded
1988
HQ Location
Helsinki, Finland
Twitter
@WithSecure
68,923 Twitter followers
LinkedIn® Page
www.linkedin.com
1,718 employees on LinkedIn®
Ownership
FSOYF
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Attackers are targeting credentials, privileges and the systems that manage them. Identity Threat Detection and Response solutions are designed to detect and derail identity-based attacks.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Attivo Networks Identity Threat Detection and Response features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Fremont, US
    Twitter
    @AttivoNetworks
    3,702 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    84 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Attackers are targeting credentials, privileges and the systems that manage them. Identity Threat Detection and Response solutions are designed to detect and derail identity-based attacks.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Attivo Networks Identity Threat Detection and Response features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2011
HQ Location
Fremont, US
Twitter
@AttivoNetworks
3,702 Twitter followers
LinkedIn® Page
www.linkedin.com
84 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AuthMind is an innovator in identity security, continuously identifying and preventing hidden identity risks. AuthMind’s patented access neural network technology enables organizations to analyze all

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AuthMind features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AuthMind
    HQ Location
    Washington DC, United States
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AuthMind is an innovator in identity security, continuously identifying and preventing hidden identity risks. AuthMind’s patented access neural network technology enables organizations to analyze all

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
AuthMind features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
AuthMind
HQ Location
Washington DC, United States
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Authomize protects organizations from identity-based cyberattacks with the first Identity Threat Detection and Response (ITDR) Platform. Authomize collects and normalizes data of identities, access p

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Authomize features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Authomize
    Year Founded
    2020
    HQ Location
    Alpharetta, US
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Authomize protects organizations from identity-based cyberattacks with the first Identity Threat Detection and Response (ITDR) Platform. Authomize collects and normalizes data of identities, access p

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Authomize features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Authomize
Year Founded
2020
HQ Location
Alpharetta, US
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The problem of Attack Path Management requires a fundamentally different, unique methodology designed to help organizations understand, empirically quantify impact, and eliminate identity-based Attack

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BloodHound Enterprise features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Virginia, United States
    Twitter
    @SpecterOps
    38,179 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    65 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The problem of Attack Path Management requires a fundamentally different, unique methodology designed to help organizations understand, empirically quantify impact, and eliminate identity-based Attack

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BloodHound Enterprise features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Virginia, United States
Twitter
@SpecterOps
38,179 Twitter followers
LinkedIn® Page
www.linkedin.com
65 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VeriClouds credential verification services help organizations detect compromised credentials through the whole customer lifecycle and limit the risk of account takeover attacks. VeriClouds uses the s

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CredVerify features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

VeriClouds credential verification services help organizations detect compromised credentials through the whole customer lifecycle and limit the risk of account takeover attacks. VeriClouds uses the s

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CredVerify features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure and comprehensive access control to on-premises infrastructure, centrally managed from Active Directory, minimizing risk across all Linux, UNIX, and Windows systems. Server Suite secures privi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 56% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Delinea Server Suite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    1
    Ease of Use
    1
    Identity Management
    1
    Implementation Ease
    1
    Reliability
    1
    Cons
    Access Issues
    2
    Authentication Issues
    1
    Login Issues
    1
    Notification Issues
    1
    Password Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Delinea Server Suite features and usability ratings that predict user satisfaction
    6.7
    Quality of Support
    Average: 9.1
    8.3
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Delinea
    Year Founded
    2004
    HQ Location
    San Francisco
    Twitter
    @DelineaInc
    797 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,122 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure and comprehensive access control to on-premises infrastructure, centrally managed from Active Directory, minimizing risk across all Linux, UNIX, and Windows systems. Server Suite secures privi

Users
No information available
Industries
No information available
Market Segment
  • 56% Enterprise
  • 33% Mid-Market
Delinea Server Suite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
1
Ease of Use
1
Identity Management
1
Implementation Ease
1
Reliability
1
Cons
Access Issues
2
Authentication Issues
1
Login Issues
1
Notification Issues
1
Password Issues
1
Delinea Server Suite features and usability ratings that predict user satisfaction
6.7
Quality of Support
Average: 9.1
8.3
Ease of Use
Average: 9.1
Seller Details
Seller
Delinea
Year Founded
2004
HQ Location
San Francisco
Twitter
@DelineaInc
797 Twitter followers
LinkedIn® Page
www.linkedin.com
1,122 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Identity is the new perimeter and securing identities, establishing privileged access policies, and implementing zero trust programs are critical to protect organizations from threat actors. The rise

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GuruCul Identity Analytics features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Gurucul
    Year Founded
    2010
    HQ Location
    El Segundo, US
    Twitter
    @Gurucul
    1,314 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    288 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Identity is the new perimeter and securing identities, establishing privileged access policies, and implementing zero trust programs are critical to protect organizations from threat actors. The rise

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
GuruCul Identity Analytics features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Gurucul
Year Founded
2010
HQ Location
El Segundo, US
Twitter
@Gurucul
1,314 Twitter followers
LinkedIn® Page
www.linkedin.com
288 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Identity Confluence is an intelligent Identity Governance and Administration (IGA) platform designed to help IT and security teams manage access, automate identity lifecycles, and maintain continuous

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Identity Conflunce features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Pune, IN
    LinkedIn® Page
    www.linkedin.com
    93 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Identity Confluence is an intelligent Identity Governance and Administration (IGA) platform designed to help IT and security teams manage access, automate identity lifecycles, and maintain continuous

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Identity Conflunce features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2017
HQ Location
Pune, IN
LinkedIn® Page
www.linkedin.com
93 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Permiso detects and protects against human and non-human identity threats across cloud and on-premise environments to provide modern threat detection for your modern attack surface. Permiso assesses e

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Permiso features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Permiso
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Permiso detects and protects against human and non-human identity threats across cloud and on-premise environments to provide modern threat detection for your modern attack surface. Permiso assesses e

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Permiso features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Permiso
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber-first Active Directory recovery. Active Directory Forest Recovery (ADFR)—the only backup and recovery solution purpose-built for recovering Active Directory from cyber disasters—fully automa

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Semperis Active Directory Forest Recovery features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Semperis
    Year Founded
    2015
    HQ Location
    Hoboken, New Jersey
    Twitter
    @SemperisTech
    10,097 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    510 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber-first Active Directory recovery. Active Directory Forest Recovery (ADFR)—the only backup and recovery solution purpose-built for recovering Active Directory from cyber disasters—fully automa

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Semperis Active Directory Forest Recovery features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Semperis
Year Founded
2015
HQ Location
Hoboken, New Jersey
Twitter
@SemperisTech
10,097 Twitter followers
LinkedIn® Page
www.linkedin.com
510 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SlashID is the composable identity platform to improve identity security without user friction. SlashID Gate adds authentication, authorization,rate limiting and CAPTCHA-less bot detections to your A

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SlashID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    3
    Ease of Use
    3
    Easy Integrations
    2
    Features
    2
    Integrations
    2
    Cons
    API Difficulty
    1
    Complex Configuration
    1
    Integration Issues
    1
    Limited Features
    1
    Limited Functionality
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SlashID features and usability ratings that predict user satisfaction
    10.0
    Quality of Support
    Average: 9.1
    9.4
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SlashID
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

SlashID is the composable identity platform to improve identity security without user friction. SlashID Gate adds authentication, authorization,rate limiting and CAPTCHA-less bot detections to your A

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
SlashID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
3
Ease of Use
3
Easy Integrations
2
Features
2
Integrations
2
Cons
API Difficulty
1
Complex Configuration
1
Integration Issues
1
Limited Features
1
Limited Functionality
1
SlashID features and usability ratings that predict user satisfaction
10.0
Quality of Support
Average: 9.1
9.4
Ease of Use
Average: 9.1
Seller Details
Seller
SlashID
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Active Directory is a primary source for Authentication and Authorization for users and business applications. Microsoft doesn't provide out of the box tools that can be used to perform health & r

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SmartProfiler for Active Directory Security and Health features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Minneapolis, US
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Active Directory is a primary source for Authentication and Authorization for users and business applications. Microsoft doesn't provide out of the box tools that can be used to perform health & r

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SmartProfiler for Active Directory Security and Health features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2019
HQ Location
Minneapolis, US
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SPHERE is the leader in Identity Hygiene.  We help companies maintain real-time visibility, achieve least privilege, and automate identity risk mitigation. Organizations struggle with excessive, unmon

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SPHEREboard features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

SPHERE is the leader in Identity Hygiene.  We help companies maintain real-time visibility, achieve least privilege, and automate identity risk mitigation. Organizations struggle with excessive, unmon

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SPHEREboard features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Stack Identity features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Stack Identity features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    lllusive continuously discovers and automatically remediates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identit

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • The Illusive Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    New York, US
    Twitter
    @illusivenw
    3,886 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

lllusive continuously discovers and automatically remediates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identit

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
The Illusive Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
HQ Location
New York, US
Twitter
@illusivenw
3,886 Twitter followers
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trustle goes beyond Cloud Infrastructure Entitlement Management (CIEM) to prioritize the most over-privileged users, and easily transition your entire organization to Just-In-Time Access to everything

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trustle Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Services
    1
    Identity Management
    1
    Secure Access
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trustle features and usability ratings that predict user satisfaction
    8.3
    Quality of Support
    Average: 9.1
    10.0
    Ease of Use
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trustle
    Year Founded
    2019
    HQ Location
    Walnut Creek, CA
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trustle goes beyond Cloud Infrastructure Entitlement Management (CIEM) to prioritize the most over-privileged users, and easily transition your entire organization to Just-In-Time Access to everything

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Trustle Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Services
1
Identity Management
1
Secure Access
1
Cons
This product has not yet received any negative sentiments.
Trustle features and usability ratings that predict user satisfaction
8.3
Quality of Support
Average: 9.1
10.0
Ease of Use
Average: 9.1
Seller Details
Seller
Trustle
Year Founded
2019
HQ Location
Walnut Creek, CA
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Veza is the authorization platform for data security. Identity and security professionals use Veza to modernize access governance for the new data landscape. By automating the work of finding and fixi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veza Core Authorization Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Veza
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Veza is the authorization platform for data security. Identity and security professionals use Veza to modernize access governance for the new data landscape. By automating the work of finding and fixi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Veza Core Authorization Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Seller
Veza
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WithSecure Elements Identity Security is an identity threat detection solution that protects organizations against identity-based attacks by detecting potentially compromised Microsoft Entra ID identi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WithSecure Elements Identity Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Helsinki, Finland
    Twitter
    @WithSecure
    68,923 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,718 employees on LinkedIn®
    Ownership
    FSOYF
Product Description
How are these determined?Information
This description is provided by the seller.

WithSecure Elements Identity Security is an identity threat detection solution that protects organizations against identity-based attacks by detecting potentially compromised Microsoft Entra ID identi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
WithSecure Elements Identity Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1988
HQ Location
Helsinki, Finland
Twitter
@WithSecure
68,923 Twitter followers
LinkedIn® Page
www.linkedin.com
1,718 employees on LinkedIn®
Ownership
FSOYF