Try our new research platform with insights from 80,000+ expert users

Best Identity Threat Detection and Response (ITDR) Solutions

What is Identity Threat Detection and Response (ITDR)?

Identity Threat Detection and Response (ITDR) solutions mindshare

As of September 2025, in the Identity Threat Detection and Response (ITDR) category, the mindshare of CrowdStrike Falcon is 15.6%, up from 11.7% compared to the previous year. The mindshare of Microsoft Defender for Identity is 15.4%, down from 23.9% compared to the previous year. The mindshare of Microsoft Entra ID Protection is 12.2%, down from 26.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Threat Detection and Response (ITDR) Market Share Distribution
ProductMarket Share (%)
CrowdStrike Falcon15.6%
Microsoft Defender for Identity15.4%
Microsoft Entra ID Protection12.2%
Other56.8%
Identity Threat Detection and Response (ITDR)

Top Identity Threat Detection and Response (ITDR) products

Rankings through
Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Identity Threat Detection and Response (ITDR). Updated: August 2025.
867,341 professionals have used our research since 2012.
report
Use our free recommendation engine to learn which Identity Threat Detection and Response (ITDR) solutions are best for your needs.
867,341 professionals have used our research since 2012.

Identity Threat Detection and Response (ITDR) experts

Nagendra Nekkala. - PeerSpot reviewer
Mahender Nirwan - PeerSpot reviewer
Mahmoud Younes - PeerSpot reviewer
NiteshSharma - PeerSpot reviewer
MichaelSoliman - PeerSpot reviewer
AshishDubey - PeerSpot reviewer
ZH
BS

Identity Threat Detection and Response (ITDR) Q&As

Read answers to top Identity Threat Detection and Response (ITDR) questions. 867,341 professionals have gotten help from our community of experts.

Identity Threat Detection and Response (ITDR) FAQ

What are the benefits of Identity Threat Detection and Response (ITDR)?

What are the key features of Identity Threat Detection and Response (ITDR)?