What is ITDR? Gartner's definition and the identity security market explained

Why Gartner created identity threat detection and response as a distinct security category, what the market covers, and how to use analyst frameworks to evaluate solutions

Identity threat detection and response (ITDR) is a security discipline focused on detecting, investigating, and responding to attacks that target or abuse user accounts, machine identities, and the infrastructure that manages them. Unlike identity and access management (IAM), which governs who can access what, ITDR operates after authentication, monitoring for signs that legitimate access mechanisms are being exploited. Gartner first named ITDR as a distinct security category in March 2022, identifying it as the missing capability between preventive identity controls and the broader security operations function.

Why Gartner created ITDR as a distinct category

The short answer is that IAM and SOC tools each had half the problem covered, and neither had the other half.

IAM tools, access management, privileged access management (PAM), identity governance and administration (IGA), and multi-factor authentication (MFA) are designed as preventive controls. They govern entitlements, enforce authentication policies, and manage identity lifecycle. What they are not designed to do is detect an attacker who has already authenticated using stolen credentials, or respond to an active identity-based compromise in real time.

Security operations tools, SIEM, EDR, XDR, and NDR, have strong detection and response capabilities, but they treat identity events as additional telemetry rather than a primary detection surface. They lack the identity-specific context to reliably detect credential misuse, privilege escalation through IAM misconfiguration, or lateral movement via service accounts.

Gartner's 2026 research on ITDR implementation describes this directly. IAM controls are preventative and not designed to address attacks that leverage existing identities, while infrastructure security tools lack identity-specific threat detection and response capabilities. The result is a detection gap that sits between the two disciplines, exactly where most modern breaches operate.

ITDR fills that gap. It provides the detection logic, behavioral analysis, and response playbooks that are specific to identity-based threats, and connects IAM-origin incidents into the SOC's detection and response processes.

What Gartner's guidance covers

Gartner's framework for ITDR implementation addresses three core areas: detection controls, capability benchmarking, and SOC integration.

Detection controls grounded in adversary behavior

Gartner's guidance emphasizes moving from signature-based and anomaly-based detection toward what it calls adversary-centric detection: prioritizing the tactics, techniques, and procedures (TTPs) documented in the MITRE ATT&CK framework. Identity-focused TTPs include password spraying, pass-the-hash, SAML golden ticket attacks, credential scanning, privilege escalation, and lateral movement. Detection logic built around known attacker behavior is more durable than static rules, because it remains effective even when attackers modify their tooling.

The framework also highlights behavioral analytics and deception techniques, including honeypot credentials placed in internal systems that act as tripwires, triggering alerts the moment an attacker interacts with them, as complementary detection controls.

Benchmarking against NIST CSF 2.0

Gartner recommends mapping ITDR capabilities to the NIST Cybersecurity Framework 2.0, which organizes security functions into six areas, including identify, protect, detect, respond, recover, and govern. The practical value of this mapping is that it prevents a common evaluation error: buying tools that only deliver administrative-time prevention but are marketed as ITDR. According to Gartner's framework, true ITDR must deliver runtime detection and response capabilities, not just posture assessment and access controls.

Integration between IAM and SOC as a shared responsibility

One of Gartner's clearest recommendations is that ITDR implementation should be treated as a shared responsibility between IAM and infrastructure security teams, rather than owned exclusively by either. A 2024 Gartner IAM Leadership Survey found that collaboration between IAM and cybersecurity functions leads to measurably better outcomes in achieving IAM program goals. Operationally, this means forming a multidisciplinary team that includes members from IAM, the SOC, and infrastructure and operations, with a designated ITDR owner to drive execution.

Why the identity threat detection and response market is growing

The market growth is a direct response to attack trends. Credential misuse was the leading initial access vector in security breaches in 2025, appearing in 22% of confirmed incidents according to Verizon's Data Breach Investigations Report. The IBM Cost of a Data Breach report consistently identifies compromised credentials among the top initial access vectors, noting that breaches originating from stolen credentials take longer to identify and contain than those initiated through other means.

Machine identities are compounding the problem. Gartner research highlights that machine identities now significantly outnumber human identities and are among the fastest-growing components of IAM environments, introducing considerable security risk if not properly governed. Many organizations lack visibility into their machine identity landscape and struggle with inconsistent governance, which contributes to increased security incidents. Service accounts, API keys, OAuth tokens, and cloud provider credentials now dominate enterprise identity ecosystems, often operating with limited monitoring, lifecycle management, and detection coverage.

Gartner's forward-looking guidance adds another dimension. By 2027, AI agents are projected to automate credential theft and the compromise of authentication channels, potentially reducing the time attackers need to exploit account exposures by 50%. That projection reflects a broader trend that identity attacks are becoming faster, more automated, and harder to detect with the tools organizations currently have in place.

The identity threat detection and response market has grown in direct proportion to these trends. What began as a recognized capability gap has become a defined investment category, with a growing vendor landscape and increasing analyst coverage across Gartner's security research.

What the ITDR vendor landscape looks like

Gartner's framework organizes the ITDR vendor landscape into three broad categories, reflecting different approaches to delivering the capability.

The first category is existing detection and response platforms, EDR, XDR, and SIEM tools, that treat IAM events as additional telemetry. These platforms offer mature analytics and automation, but their identity coverage depends heavily on integration quality with IAM systems, and their detection logic is not purpose-built for identity-specific attack patterns.

IAM vendors have also extended their platforms with detection and response capabilities. These tools are often well-positioned for identity-focused detection within their own ecosystem, but may lack broader threat correlation across endpoints, networks, and environments outside their coverage scope.

The third category is third-party ITDR vendors and managed detection and response (MDR) services with dedicated identity coverage. Gartner notes that many of these solutions now extend support to SaaS applications, cloud infrastructure, and machine identities, including coverage for agentic AI systems, and can address gaps that IAM-native tools typically cannot. Because no single vendor covers all ITDR needs, Gartner's guidance recommends that most organizations draw from multiple categories, with the mix evolving as ITDR maturity increases.

Agentic SOC platforms have emerged as a fourth category since Gartner's initial framework. They unify identity detection with broader security operations across cloud, SaaS, endpoint, and application environments. These platforms treat identity as one detection surface within a full-lifecycle SOC capability, rather than as a standalone discipline, enabling cross-environment correlation that purpose-built ITDR tools and traditional infrastructure security platforms typically handle separately.

How to use Gartner's framework in your evaluation

The NIST CSF 2.0 mapping Gartner recommends is the most practical tool available for evaluating ITDR solutions without getting lost in feature comparisons. The test is straightforward: does the solution deliver runtime detection and response capabilities, or does it primarily offer administrative-time prevention that is being marketed as detection?

Apply the test across each NIST CSF function. 

  • Detect: Does the solution have purpose-built detection logic for identity-specific TTPs in your environment, or does it rely on generic anomaly flagging?
  • Respond: Can it initiate containment actions, session revocation, account lockout, and access review through integration with your identity providers, or does every response action require manual steps outside the tool?
  • Recover: Does it support identity-specific remediation workflows, or does it hand off entirely to your broader incident response process?

Gartner's guidance also recommends measuring ITDR program progress against specific KPIs: the percentage of known identity TTPs covered by your detection logic, the time required to implement new detection rules for emerging threats, the percentage of IAM infrastructure components covered by monitoring, and the average time from detection to containment for identity-related incidents. These metrics provide a practical baseline for assessing both your current posture and the effectiveness of any solution you evaluate.

For a detailed look at what separates strong ITDR platforms from weak ones in practice, the guide to evaluating ITDR solutions applies these criteria directly to vendor evaluation. For a deeper technical overview of how ITDR works in practice, including the threat categories it targets and the components of an effective program, see the full ITDR guide.

Frequently asked questions

What is Gartner's definition of ITDR? Gartner introduced identity threat detection and response (ITDR) as a security category in October 2022 to describe tools and processes focused on detecting and responding to attacks that target or abuse identity systems and the accounts they manage. Gartner's framework positions ITDR as the second and third layers of defense after preventive IAM controls, activating when prevention is insufficient to stop an active identity-based attack.

Is ITDR the same as IAM? No. IAM (identity and access management) governs access rights and authentication; it is a preventive control. ITDR detects and responds to threats that bypass or abuse IAM controls. The two disciplines are complementary: IAM reduces the attack surface; ITDR provides visibility and response capability when that surface is breached.

What does the ITDR market include? The identity threat detection and response market includes purpose-built ITDR platforms, IAM vendors with detection extensions, detection and response platforms (EDR, XDR, SIEM) with identity coverage, and managed security services with dedicated ITDR capabilities. Gartner recommends that most organizations combine capabilities from multiple categories rather than relying on a single vendor.

Why is ITDR growing as a market category? Growth is driven by the prevalence of identity-based attacks, and credential misuse is the leading cause of breaches in 2025, per Verizon's DBIR, combined with the rapid expansion of machine identities and the increasing automation of credential theft by AI-assisted threat actors. Traditional IAM and SOC tools leave a detection gap that ITDR is specifically designed to close.

Trusted by SOCs from next-gen startups to global enterprises

Explore how Exaforce can help transform your security operations

See what Exabots + humans can do for you
No items found.
No items found.