KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Unlock the power of industry-leading insights and expertise. Gain access to our extensive knowledge base, vibrant community, and tailored analyst sessions—all designed to keep you at the forefront of identity security.
Get instant access to our complete research library.
Access essential knowledge at your fingertips with KuppingerCole's extensive resources. From in-depth reports to concise one-pagers, leverage our complete security library to inform strategy and drive innovation.
Get instant access to our complete research library.
Gain access to comprehensive resources, personalized analyst consultations, and exclusive events – all designed to enhance your decision-making capabilities and industry connections.
Get instant access to our complete research library.
Gain a true partner to drive transformative initiatives. Access comprehensive resources, tailored expert guidance, and networking opportunities.
Get instant access to our complete research library.
Optimize your decision-making process with the most comprehensive and up-to-date market data available.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Configure your individual requirements to discover the ideal solution for your business.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Identity-driven attacks are escalating, driven by the dissolution of traditional network perimeters due to cloud adoption, remote work, and the increasingly sophisticated tactics of adversaries. Over 80% of breaches involve compromised identities, as attackers leverage methods like Kerberoasting, password spraying, and the exploitation of misconfigurations in identity systems such as Active Directory. Traditional security measures are proving inadequate in differentiating between legitimate and malicious use of identities, leaving significant vulnerabilities.
The insidious nature of identity-based attacks is that the attacker can parade around your infrastructure using legitimate, highly trusted levels of authentication and encryption to commit crimes without any fear of being noticed. They’re not the proverbial wolf in sheep’s clothing—they manipulate the sheep, instead.
This dynamic is completely uprooting our current models for threat detection and response. To deal with this type of threat, a new runbook must be written. As an industry, we’re still very early on in that process; but for the moment, we’re cautiously referring to this new practice as Identity Threat Detection and Response (ITDR). But its arrival has posed some questions, such as who is responsible for this new tool.
The growing tension between identity and access management (IAM) and security operations center (SOC) teams further complicates the landscape. SOC teams handle threat detection and response, while IAM teams focus on managing digital identities, resulting in silos that inhibit effective identity threat response. This disconnect must be bridged to effectively defend against identity-driven threats, requiring a convergent approach.
The five pillars in the image below illustrate how neither IT administration nor SOC teams have control over the entire process, but that visibility is broadly available.
These pillars support activities that range from administration of identity systems (on the left) to shared responsibilities in the center, then SOC-related responsibilities to the right. Given that administration and SOC teams need to collaborate on this process, tools that provide integrated views will improve the success of ITDR projects.
The five pillars of ITDR (image source: KuppingerCole)