Head of IT at a tech services company with 51-200 employees
Real User
Top 20
2025-06-27T15:37:24Z
Jun 27, 2025
My use case is really just for threat detection and response to observe and get more awareness of where our sign-ins are coming from, so we can better protect our login environment.
I synchronize every client I have with M365 into Huntress Managed ITDR, and it operates seamlessly. It acts as the M365 cloud counterpart of EDR on physical machines, offering peace of mind by covering both endpoints and the actual cloud tenant. (If you have both products)
Find out what your peers are saying about Huntress, Proofpoint, SentinelOne and others in Identity Threat Detection and Response (ITDR). Updated: July 2025.
Identity Threat Detection and Response technology focuses on identifying and mitigating potential security threats associated with user credentials and identities. By proactively monitoring, it supports organizations in securing their network from unauthorized access.ITDR solutions play a crucial role in the cybersecurity landscape, where safeguarding digital identities is paramount. With the increasing threats targeting user identities, these tools help detect suspicious activities,...
My use case is really just for threat detection and response to observe and get more awareness of where our sign-ins are coming from, so we can better protect our login environment.
I use Huntress Managed ITDR for 365 protection, monitoring log run events, security, and abnormal logons.
I synchronize every client I have with M365 into Huntress Managed ITDR, and it operates seamlessly. It acts as the M365 cloud counterpart of EDR on physical machines, offering peace of mind by covering both endpoints and the actual cloud tenant. (If you have both products)