Best Identity Threat Detection and Response (ITDR) Software for Splunk Cloud Platform

Find and compare the best Identity Threat Detection and Response (ITDR) software for Splunk Cloud Platform in 2025

Use the comparison tool below to compare the top Identity Threat Detection and Response (ITDR) software for Splunk Cloud Platform on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Plurilock DEFEND Reviews

    Plurilock DEFEND

    Plurilock Security

    $9 per user per month
    Plurilock DEFEND provides full-time, continuous authentication throughout active computing sessions using behavioral biometrics and your existing employee keyboard and pointer devices. DEFEND relies on an invisible endpoint agent and machine learning techniques to confirm or reject user's identity biometrically based on console input as they work, without visible authentication steps. When integrated with SIEM/SOAR, DEFEND can help to triage and respond to SOC alerts with high-confidence identity threat intelligence. By integrating with login and application workflows, DEFEND provides a just-in-time identity certainty signal behind the scenes, making truly invisible login workflows possible when identity is already confirmed. DEFEND supports Windows, Mac OS, IGEL, Amazon Workspaces VDI clients.
  • 2
    Sonrai Security Reviews
    Identity and Data Protection for AWS and Azure, Google Cloud, and Kubernetes. Sonrai's cloud security platform offers a complete risk model that includes activity and movement across cloud accounts and cloud providers. Discover all data and identity relationships between administrators, roles and compute instances. Our critical resource monitor monitors your critical data stored in object stores (e.g. AWS S3, Azure Blob), and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are maintained across multiple cloud providers and third-party data stores. All resolutions are coordinated with the relevant DevSecOps groups.
  • 3
    QOMPLX Reviews
    QOMPLX Identity Threat Detection and Response System (ITDR) constantly validates to prevent network takeovers. QOMPLX ITDR detects attacks and misconfigurations in Active Directory (AD). Identity security is critical to network operations. Verify identity in real time. We verify everyone in order to prevent privilege escalation or lateral movement. We integrate your existing security stack to enhance our analytics, resulting in comprehensive transparency. Understanding the severity and priority of threats allows resources to be allocated where they are most needed. Real-time detection, prevention and detection stop attackers from bypassing the security measures. Our experts can help you with everything from Active Directory (AD), to red teams, to other needs. QOMPLX helps clients manage and reduce cybersecurity risk holistically. Our analysts will monitor your environment and implement our SaaS-solutions.
  • 4
    VeriClouds Reviews
    VeriClouds CredVerify, the only service that detects, verifies and remediates the use of weak or stole credentials throughout the entire user's lifecycle - from registration to authentication to password reset - is the only one to do so. It detects in seconds, provides immediate response and has a 90% coverage. VeriClouds is committed to providing the highest level of security. Automates the detection and integration of unauthorized login attempts with real-time enforcement measures. Reduces the threat of a weak password or a stolen one, the number one cause for data breaches. Reduces the chances of a successful account takeover or credential stuffed attack. CredVerify is available as a cloud service through VeriClouds or can be deployed by a customer in their own cloud environment using just a few lines code.
  • Previous
  • You're on page 1
  • Next