Identity threat detection and response use grows despite challenges


Organizations are facing increasingly sophisticated threats to their identity infrastructure so it's not surprising that a new survey of over 370 IT professionals shows use of identity threat detection and response (ITDR) technology is growing, though many are running into roadblocks to unlocking its full potential.
The study from Quest Software shows 84 percent of organizations are reaping benefits from their ITDR efforts, even if it hasn’t been fully implemented. Over one in three (36 percent) say their expectations have been fully met or exceeded.
How to build a stronger identity security posture with ITDR strategies


In today’s cybersecurity landscape, identity has emerged as the prime target for threat actors, with compromised credentials involved in 49 percent of breaches. Attackers exploit misconfigurations, use generative AI for social engineering, and purchase stolen credentials, highlighting the need for robust identity security. While Identity and Access Management (IAM) has been crucial, evolving threats demand a more proactive and multifaceted approach that integrates threat intelligence tools and processes to protect identity systems effectively.
Implementing a robust Identity Threat Detection and Response (ITDR) strategy may be the solution. ITDR merges continuous monitoring and response with proactive measures, ensuring a resilient and adaptable security posture. A robust ITDR strategy not only prevents and detects threats but also investigates and coordinates responses to restore integrity after identity infractions.
Identity is the new frontline of cybersecurity


Identity is a battleground upon which all organizations must now fight. Responding to this growing threat is non-optional because identity is at the heart of the processes and technologies that power the new world of remote and hybrid working.
The "human element" is involved in 85 percent of breaches, with credential data theft and misuse now factoring into 61 percent of incidents, the Verizon Data Breach Investigations Report 2021 reported last year. Attackers know this, so they are constantly searching for ways of accessing valid credentials which they can use to gain access to the network and then move undetected in search of new targets.