{"id":12075,"date":"2025-10-09T07:41:02","date_gmt":"2025-10-09T11:41:02","guid":{"rendered":"https:\/\/www.netwitness.com\/?post_type=glossary&#038;p=12075"},"modified":"2026-01-07T09:17:07","modified_gmt":"2026-01-07T14:17:07","slug":"identity-threat-detection-and-response","status":"publish","type":"glossary","link":"https:\/\/www.netwitness.com\/it\/cyber-glossary\/identity-threat-detection-and-response\/","title":{"rendered":"Identity Threat Detection and Response"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12075\" class=\"elementor elementor-12075\" data-elementor-post-type=\"glossary\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d7f09d2 e-flex e-con-boxed e-con e-parent\" data-id=\"d7f09d2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7565758 elementor-widget elementor-widget-heading\" data-id=\"7565758\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Identity Threat Detection and Response?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da689aa elementor-widget elementor-widget-text-editor\" data-id=\"da689aa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><b><span data-contrast=\"auto\">Identity Threat Detection and Response (ITDR)<\/span><\/b><span data-contrast=\"auto\"> is the practice of identifying, assessing, and mitigating risks associated with compromised user identities, privileged accounts, and identity infrastructure. In an era where identity has become the primary attack vector for cybercriminals, effective identity threat protection ensures the safety of critical systems, continuity of operations, and protection against sophisticated attacks.<\/span><\/p><p><span data-contrast=\"auto\">Identity threat detection and response involves the proactive handling of risks arising from compromised identities and identity systems. These threats can include credential theft, privilege escalation, lateral movement, and account takeover attacks. By implementing identity threat detection and comprehensive identity threat protection strategies, organizations can anticipate threats and reduce their impact.<\/span><\/p><p><span data-contrast=\"auto\">Proper ITDR aligns with broader cybersecurity frameworks, ensuring that identity vulnerabilities don&#8217;t become pathways for attackers to compromise business-critical systems and data.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d4924e e-con-full e-flex e-con e-child\" data-id=\"3d4924e\" data-element_type=\"container\" id=\"synonyms\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9de91a0 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"9de91a0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Synonyms<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc08118 e-con-full e-flex e-con e-child\" data-id=\"fc08118\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c788fe elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"9c788fe\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"28\" height=\"28\" viewBox=\"0 0 28 28\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M13.9999 23.625H5.24992C4.89642 23.625 4.57705 23.4115 4.44142 23.0851C4.3058 22.7579 4.38104 22.3816 4.63129 22.1314L12.7627 14L4.63129 5.86863C4.38104 5.61838 4.3058 5.24213 4.44142 4.91488C4.57705 4.5885 4.89642 4.375 5.24992 4.375H13.9999C14.2318 4.375 14.4549 4.46687 14.6185 4.63137L23.3685 13.3814C23.7107 13.7226 23.7107 14.2774 23.3685 14.6186L14.6185 23.3686C14.4549 23.5331 14.2318 23.625 13.9999 23.625Z\" fill=\"#BE3A34\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Identity Security<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"28\" height=\"28\" viewBox=\"0 0 28 28\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M13.9999 23.625H5.24992C4.89642 23.625 4.57705 23.4115 4.44142 23.0851C4.3058 22.7579 4.38104 22.3816 4.63129 22.1314L12.7627 14L4.63129 5.86863C4.38104 5.61838 4.3058 5.24213 4.44142 4.91488C4.57705 4.5885 4.89642 4.375 5.24992 4.375H13.9999C14.2318 4.375 14.4549 4.46687 14.6185 4.63137L23.3685 13.3814C23.7107 13.7226 23.7107 14.2774 23.3685 14.6186L14.6185 23.3686C14.4549 23.5331 14.2318 23.625 13.9999 23.625Z\" fill=\"#BE3A34\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Identity Fraud Detection<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"28\" height=\"28\" viewBox=\"0 0 28 28\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M13.9999 23.625H5.24992C4.89642 23.625 4.57705 23.4115 4.44142 23.0851C4.3058 22.7579 4.38104 22.3816 4.63129 22.1314L12.7627 14L4.63129 5.86863C4.38104 5.61838 4.3058 5.24213 4.44142 4.91488C4.57705 4.5885 4.89642 4.375 5.24992 4.375H13.9999C14.2318 4.375 14.4549 4.46687 14.6185 4.63137L23.3685 13.3814C23.7107 13.7226 23.7107 14.2774 23.3685 14.6186L14.6185 23.3686C14.4549 23.5331 14.2318 23.625 13.9999 23.625Z\" fill=\"#BE3A34\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Identity and Access Security<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"28\" height=\"28\" viewBox=\"0 0 28 28\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M13.9999 23.625H5.24992C4.89642 23.625 4.57705 23.4115 4.44142 23.0851C4.3058 22.7579 4.38104 22.3816 4.63129 22.1314L12.7627 14L4.63129 5.86863C4.38104 5.61838 4.3058 5.24213 4.44142 4.91488C4.57705 4.5885 4.89642 4.375 5.24992 4.375H13.9999C14.2318 4.375 14.4549 4.46687 14.6185 4.63137L23.3685 13.3814C23.7107 13.7226 23.7107 14.2774 23.3685 14.6186L14.6185 23.3686C14.4549 23.5331 14.2318 23.625 13.9999 23.625Z\" fill=\"#BE3A34\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Identity Monitoring<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"28\" height=\"28\" viewBox=\"0 0 28 28\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M13.9999 23.625H5.24992C4.89642 23.625 4.57705 23.4115 4.44142 23.0851C4.3058 22.7579 4.38104 22.3816 4.63129 22.1314L12.7627 14L4.63129 5.86863C4.38104 5.61838 4.3058 5.24213 4.44142 4.91488C4.57705 4.5885 4.89642 4.375 5.24992 4.375H13.9999C14.2318 4.375 14.4549 4.46687 14.6185 4.63137L23.3685 13.3814C23.7107 13.7226 23.7107 14.2774 23.3685 14.6186L14.6185 23.3686C14.4549 23.5331 14.2318 23.625 13.9999 23.625Z\" fill=\"#BE3A34\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Identity and Access Management (IAM)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"28\" height=\"28\" viewBox=\"0 0 28 28\" fill=\"none\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M13.9999 23.625H5.24992C4.89642 23.625 4.57705 23.4115 4.44142 23.0851C4.3058 22.7579 4.38104 22.3816 4.63129 22.1314L12.7627 14L4.63129 5.86863C4.38104 5.61838 4.3058 5.24213 4.44142 4.91488C4.57705 4.5885 4.89642 4.375 5.24992 4.375H13.9999C14.2318 4.375 14.4549 4.46687 14.6185 4.63137L23.3685 13.3814C23.7107 13.7226 23.7107 14.2774 23.3685 14.6186L14.6185 23.3686C14.4549 23.5331 14.2318 23.625 13.9999 23.625Z\" fill=\"#BE3A34\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat Detection and Response (TDR)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9397ba4 elementor-widget elementor-widget-heading\" data-id=\"9397ba4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why Identity Threat Detection and Response Matters<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef941d5 elementor-widget elementor-widget-text-editor\" data-id=\"ef941d5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Failing to manage identity threats can lead to complete system compromise, data breaches, ransomware attacks, and regulatory violations. Key reasons identity threat protection is critical include:<\/span><\/p><ol><li><b><span data-contrast=\"auto\">Identity Threat Protection<\/span><\/b><span data-contrast=\"auto\">: Safeguarding user accounts and identity systems from cyber threats.<\/span><\/li><li><b><span data-contrast=\"auto\">Operational Security<\/span><\/b><span data-contrast=\"auto\">: Maintaining business operations by preventing identity-based attacks.<\/span><\/li><li><b><span data-contrast=\"auto\">Compliance Assurance<\/span><\/b><span data-contrast=\"auto\">: Meeting industry standards for identity and access management.<\/span><\/li><li><b><span data-contrast=\"auto\">Strategic Defense<\/span><\/b><span data-contrast=\"auto\">: Informed planning for protecting the new security perimeter\u2014identity.<\/span><\/li><\/ol><p><span data-contrast=\"auto\">Effectively managing identity threats ensures organizations can operate confidently in digital environments without compromising security or exposing sensitive data.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8648ee elementor-widget elementor-widget-heading\" data-id=\"a8648ee\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Identity Threat Detection and Response Works<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-198e799 elementor-widget elementor-widget-text-editor\" data-id=\"198e799\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Identity <a href=\"https:\/\/www.netwitness.com\/blog\/unified-threat-detection-and-response-strategy\/\" target=\"_blank\" rel=\"noopener\">threat detection and response<\/a> solutions typically follow a structured approach:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><ol><li><b><span data-contrast=\"auto\">Risk Identification<\/span><\/b><span data-contrast=\"auto\">: Recognizing potential identity threats across Active Directory, cloud environments, privileged accounts, and access management systems.<\/span><\/li><li><b><span data-contrast=\"auto\">Risk Assessment<\/span><\/b><span data-contrast=\"auto\">: Evaluating the probability and potential impact of identity compromise on organizational assets.<\/span><\/li><li><b><span data-contrast=\"auto\">Risk Mitigation<\/span><\/b><span data-contrast=\"auto\">: Implementing strategies to prevent or reduce threats, including multifactor authentication, privileged access management, and deception technologies.<\/span><\/li><li><b><span data-contrast=\"auto\">Continuous Monitoring<\/span><\/b><span data-contrast=\"auto\">: Leveraging identity threat detection solutions to track suspicious activities and behavioral anomalies in real time.<\/span><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43d286b elementor-widget elementor-widget-heading\" data-id=\"43d286b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Best Practices for Managing Identity Threats<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20cebee elementor-widget elementor-widget-text-editor\" data-id=\"20cebee\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ol><li><b><span data-contrast=\"auto\">Adopt a Risk-Based Approach<\/span><\/b><span data-contrast=\"auto\">: Prioritize identity vulnerabilities by severity and exploitability.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Leverage Identity Threat Detection Solutions<\/span><\/b><span data-contrast=\"auto\">: Use specialized tools that monitor identity activities continuously and detect compromise indicators proactively.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Address Social Identity Threat<\/span><\/b><span data-contrast=\"auto\">: Train employees to recognize social engineering, phishing, and manipulation tactics targeting their credentials.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Integrate with Security Ecosystem<\/span><\/b><span data-contrast=\"auto\">: Combine ITDR with SIEM, XDR, and PAM solutions for comprehensive protection.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Review Identity Posture Regularly<\/span><\/b><span data-contrast=\"auto\">: Adapt to emerging attack techniques and changes in identity infrastructure.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-046cda6 elementor-widget elementor-widget-heading\" data-id=\"046cda6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Related Terms &amp; Synonyms<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1d9e24 elementor-widget elementor-widget-text-editor\" data-id=\"f1d9e24\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><b><span data-contrast=\"auto\">Identity Threat Protection<\/span><\/b><span data-contrast=\"auto\">: Comprehensive strategies and tools to safeguard identity systems and user accounts.<\/span><\/li><li><b><span data-contrast=\"auto\">Identity Threat Detection<\/span><\/b><span data-contrast=\"auto\">: Continuous monitoring and analysis to identify compromised identities and suspicious activities.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Social Identity Threat<\/span><\/b><span data-contrast=\"auto\">: Psychological manipulation tactics used to compromise identities through human exploitation.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Identity Threat<\/span><\/b><span data-contrast=\"auto\">: Any malicious activity targeting user credentials, accounts, or identity infrastructure.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li><li><b><span data-contrast=\"auto\">Identity Threat Detection and Response Solutions<\/span><\/b><span data-contrast=\"auto\">: Specialized security platforms designed to protect against identity-based attacks.<\/span><\/li><li><strong>Threat Detection and Response (TDR)<\/strong>: <a href=\"https:\/\/www.netwitness.com\/blog\/what-is-threat-detection-and-response\/\" target=\"_blank\" rel=\"noopener\">TDR<\/a> refers to a set of processes and technologies that monitor indicators of compromise or malicious activity<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b9b8efb e-flex e-con-boxed e-con e-parent\" data-id=\"b9b8efb\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b41d3 elementor-widget elementor-widget-heading\" data-id=\"a7b41d3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">People Also Ask<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c2498ac e-con-full e-flex e-con e-child\" data-id=\"c2498ac\" data-element_type=\"container\" id=\"faq-section\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b7af59c elementor-widget elementor-widget-n-accordion\" data-id=\"b7af59c\" data-element_type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1920\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1920\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><h3 class=\"e-n-accordion-item-title-text\"> 1. What is identity threat protection? <\/h3><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" fill=\"none\"><g clip-path=\"url(#clip0_726_1402)\"><path d=\"M39.9375 19.9998C39.9375 31.0111 31.0111 39.9375 19.9998 39.9375C8.98853 39.9375 0.0617981 31.0111 0.0617981 19.9998C0.0617981 8.98853 8.98853 0.0617981 19.9998 0.0617981C31.006 0.0742111 39.9251 8.99328 39.9375 19.9998ZM2.05582 19.9998C2.05582 29.9101 10.0896 37.9438 19.9998 37.9438C29.9101 37.9438 37.9438 29.9101 37.9438 19.9998C37.9438 10.0896 29.9101 2.05582 19.9998 2.05582C10.0943 2.06714 2.06714 10.0943 2.05582 19.9998Z\" fill=\"#001D3B\"><\/path><path d=\"M27.7284 22.3341C28.0909 22.7489 28.0485 23.3786 27.6342 23.7411C27.2195 24.1033 26.5897 24.0609 26.2272 23.6466L19.9998 16.5291L13.772 23.6469C13.4095 24.0617 12.7798 24.1036 12.3654 23.7415C11.9507 23.379 11.9083 22.7492 12.2709 22.3345L19.2492 14.3595C19.4383 14.143 19.7121 14.0189 19.9998 14.0189C20.2875 14.0189 20.5609 14.143 20.7504 14.3595L27.7284 22.3341Z\" fill=\"#001D3B\"><\/path><\/g><defs><clipPath id=\"clip0_726_1402\"><rect width=\"39.8756\" height=\"39.8756\" fill=\"white\" transform=\"matrix(0 -1 -1 0 39.9375 39.9375)\"><\/rect><\/clipPath><\/defs><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" fill=\"none\"><g clip-path=\"url(#clip0_726_1407)\"><path d=\"M39.9375 20.0002C39.9375 8.98887 31.0111 0.0625 19.9998 0.0625C8.98853 0.0625 0.0617981 8.98887 0.0617981 20.0002C0.0617981 31.0115 8.98853 39.9382 19.9998 39.9382C31.006 39.9258 39.9251 31.0067 39.9375 20.0002ZM2.05582 20.0002C2.05582 10.0899 10.0896 2.05616 19.9998 2.05616C29.9101 2.05616 37.9438 10.0899 37.9438 20.0002C37.9438 29.9104 29.9101 37.9442 19.9998 37.9442C10.0943 37.9329 2.06714 29.9057 2.05582 20.0002Z\" fill=\"#001D3B\"><\/path><path d=\"M27.7284 17.6659C28.0909 17.2511 28.0485 16.6214 27.6342 16.2589C27.2195 15.8967 26.5897 15.9391 26.2272 16.3534L19.9998 23.4709L13.772 16.3531C13.4095 15.9383 12.7798 15.8964 12.3654 16.2585C11.9507 16.621 11.9083 17.2508 12.2709 17.6655L19.2492 25.6405C19.4383 25.857 19.7121 25.9811 19.9998 25.9811C20.2875 25.9811 20.5609 25.857 20.7504 25.6405L27.7284 17.6659Z\" fill=\"#001D3B\"><\/path><\/g><defs><clipPath id=\"clip0_726_1407\"><rect width=\"39.8756\" height=\"39.8756\" fill=\"white\" transform=\"matrix(0 1 -1 0 39.9375 0.0625)\"><\/rect><\/clipPath><\/defs><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1920\" class=\"elementor-element elementor-element-7f4aa81 e-con-full e-flex e-con e-child\" data-id=\"7f4aa81\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1920\" class=\"elementor-element elementor-element-0a80958 e-flex e-con-boxed e-con e-child\" data-id=\"0a80958\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-afe789b elementor-widget elementor-widget-text-editor\" data-id=\"afe789b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW241056075 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241056075 BCX0\">Identity threat protection involves proactive monitoring and mitigation strategies to protect user identities, privileged accounts, and identity infrastructure from compromise, misuse, and exploitation.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1921\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1921\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><h3 class=\"e-n-accordion-item-title-text\"> 2. What is identity threat? <\/h3><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" fill=\"none\"><g clip-path=\"url(#clip0_726_1402)\"><path d=\"M39.9375 19.9998C39.9375 31.0111 31.0111 39.9375 19.9998 39.9375C8.98853 39.9375 0.0617981 31.0111 0.0617981 19.9998C0.0617981 8.98853 8.98853 0.0617981 19.9998 0.0617981C31.006 0.0742111 39.9251 8.99328 39.9375 19.9998ZM2.05582 19.9998C2.05582 29.9101 10.0896 37.9438 19.9998 37.9438C29.9101 37.9438 37.9438 29.9101 37.9438 19.9998C37.9438 10.0896 29.9101 2.05582 19.9998 2.05582C10.0943 2.06714 2.06714 10.0943 2.05582 19.9998Z\" fill=\"#001D3B\"><\/path><path d=\"M27.7284 22.3341C28.0909 22.7489 28.0485 23.3786 27.6342 23.7411C27.2195 24.1033 26.5897 24.0609 26.2272 23.6466L19.9998 16.5291L13.772 23.6469C13.4095 24.0617 12.7798 24.1036 12.3654 23.7415C11.9507 23.379 11.9083 22.7492 12.2709 22.3345L19.2492 14.3595C19.4383 14.143 19.7121 14.0189 19.9998 14.0189C20.2875 14.0189 20.5609 14.143 20.7504 14.3595L27.7284 22.3341Z\" fill=\"#001D3B\"><\/path><\/g><defs><clipPath id=\"clip0_726_1402\"><rect width=\"39.8756\" height=\"39.8756\" fill=\"white\" transform=\"matrix(0 -1 -1 0 39.9375 39.9375)\"><\/rect><\/clipPath><\/defs><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" fill=\"none\"><g clip-path=\"url(#clip0_726_1407)\"><path d=\"M39.9375 20.0002C39.9375 8.98887 31.0111 0.0625 19.9998 0.0625C8.98853 0.0625 0.0617981 8.98887 0.0617981 20.0002C0.0617981 31.0115 8.98853 39.9382 19.9998 39.9382C31.006 39.9258 39.9251 31.0067 39.9375 20.0002ZM2.05582 20.0002C2.05582 10.0899 10.0896 2.05616 19.9998 2.05616C29.9101 2.05616 37.9438 10.0899 37.9438 20.0002C37.9438 29.9104 29.9101 37.9442 19.9998 37.9442C10.0943 37.9329 2.06714 29.9057 2.05582 20.0002Z\" fill=\"#001D3B\"><\/path><path d=\"M27.7284 17.6659C28.0909 17.2511 28.0485 16.6214 27.6342 16.2589C27.2195 15.8967 26.5897 15.9391 26.2272 16.3534L19.9998 23.4709L13.772 16.3531C13.4095 15.9383 12.7798 15.8964 12.3654 16.2585C11.9507 16.621 11.9083 17.2508 12.2709 17.6655L19.2492 25.6405C19.4383 25.857 19.7121 25.9811 19.9998 25.9811C20.2875 25.9811 20.5609 25.857 20.7504 25.6405L27.7284 17.6659Z\" fill=\"#001D3B\"><\/path><\/g><defs><clipPath id=\"clip0_726_1407\"><rect width=\"39.8756\" height=\"39.8756\" fill=\"white\" transform=\"matrix(0 1 -1 0 39.9375 0.0625)\"><\/rect><\/clipPath><\/defs><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1921\" class=\"elementor-element elementor-element-0cb3db5 e-con-full e-flex e-con e-child\" data-id=\"0cb3db5\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1921\" class=\"elementor-element elementor-element-f66bb0a e-flex e-con-boxed e-con e-child\" data-id=\"f66bb0a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a341ecb elementor-widget elementor-widget-text-editor\" data-id=\"a341ecb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW246822566 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW246822566 BCX0\">An identity threat refers to any malicious activity that targets user credentials, accounts, or identity systems to gain unauthorized access to organizational resources and data.<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is Identity Threat Detection and Response? Identity Threat Detection and Response (ITDR) is the practice of identifying, assessing, and mitigating risks associated with compromised user identities, privileged accounts, and identity infrastructure. In an era where identity has become the primary attack vector for cybercriminals, effective identity threat protection ensures the safety of critical systems, [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","class_list":["post-12075","glossary","type-glossary","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.netwitness.com\/it\/wp-json\/wp\/v2\/glossary\/12075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netwitness.com\/it\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.netwitness.com\/it\/wp-json\/wp\/v2\/types\/glossary"}],"version-history":[{"count":0,"href":"https:\/\/www.netwitness.com\/it\/wp-json\/wp\/v2\/glossary\/12075\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.netwitness.com\/it\/wp-json\/wp\/v2\/media?parent=12075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}