Security at the Core

Breadcrumb Abstract Shape
Breadcrumb Abstract Shape
Breadcrumb Abstract Shape

What ITDR Does

Think of ITDR as a security system that protects your digital identity—your usernames, passwords, and accounts—just like a home security system protects your house.

ITDR does three big things:

Watches for suspicious activity

It keeps an eye on your accounts to spot unusual behavior, like:

  • Someone trying to log in from another country
  • Too many failed password attempts
  • Accessing things they normally shouldn’t

Alerts when something looks wrong


Using data from your normal activity, we can spot issues with hackers trying to gain access by geo-locating every login and checking for abnormal behavior.


Our Security Operations Center (SOC) reviews suspicious activity to ensure your identity is not compromised.

If something seems off, ITDR raises a flag so security teams can check it out quickly.


A security team is monitoring this activity 24/7 to make sure no one slips through the door. Having expert monitoring of this activity is essential to safeguarding your identity.

Helps stop the threat

We can instantly isolate your account and deny access to hackers. 

It can take action, such as:

  • Locking an account
  • Forcing a password reset
  • Blocking the suspicious activity

Then work with you to reset your credential securely.

ITDR helps ensure:

  • Your accounts stay safe
  • Hackers can’t pretend to be you
  • Your company’s data stays protected

It’s basically an early-warning system + automatic protection for your digital identity.

FAQ

Identity Threat Detection & Response. It’s a critical security control that continuously monitors for abnormal identity-based behaviors that could indicate compromise or abuse.

Yes, both Google and M365 logs are ingested and evaluated for ITDR incidents. 

Yes. ITDR is a core security control available on all plans. It helps reduce human risk and protect identities without requiring an upgrade. ITDR is paired with our 24/7 MDR team, who monitor alerts, triage incidents, and respond to threats, so you get a human-powered safety net on top of automated protection.

Yes. ITDR replaces and goes well beyond the capabilities of our included Cloud Directory Posture.

While “posture” focuses on static misconfigurations at the individual user level, ITDR delivers dynamic, behavior-based threat detection, identifying anomalous activity, privilege escalations, authentication-related attacks, and more. It’s smarter, deeper, and built to evolve with modern identity risks.

The main response action is to suspend the user, thereby preventing further spread of the attack. This remediation, along with isolating a device, are designed to be strong but reversible actions to mitigate a threat without hindering long term productivity.

Suspending a user can be done by the admin at the click of a button or by the SOC when approval has been granted.

Currently, ITDR leverages Microsoft 365 logs (Graph API) for identity threat detection and response. Google Workspace support is coming soon.