Proofpoint Identity Threat DefenseProofpoint 
                        
                        
                     | 
        
        
        
            RapidIdentityIdentity Automation 
                        
                        
                     | 
        
        |||||
Related Products
  | 
            
            ||||||
                
            
            
            About
            In an ever-changing hybrid world, your organization depends on its employees, their virtual identities, and the endpoints they operate on to build and protect its assets. Threat actors have found unique ways to move laterally across your cloud environments by exploiting such identities. You need an innovative and agentless identity threat detection and response solution to discover and remediate modern identity vulnerabilities—a key part of today’s attack chain.
Proofpoint Identity Threat Defense, previously Illusive, gives you comprehensive prevention and visibility across all your identities so you can remediate identity vulnerabilities before they become real risks. You can also detect any lateral movements in your environments and activate deception to ensure threat actors are stopped in action before they gain access to your corporate assets. It doesn’t get better than knowing you can prevent modern identity risks and stop real-time identity threats in action, all in one place.
             
            
        
         | 
        
        
                
            
            
            About
            Identity Automation delivers the most scalable, full-lifecycle identity, access, governance, and administration solution. As the company's flagship product, RapidIdentity helps organizations increase business agility, embrace security, and deliver an enhanced user experience. For organizations looking to streamline security, reduce risk from network and data breaches, and lessen IT costs, use RapidIdentity today!
             
            
        
         | 
        |||||
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        
        
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        |||||
                
            
        
        Audience
        Companies searching for an identity threat defense system
         
        
    
         | 
        
        
                
            
        
        Audience
        Built for enterprises, local and state government agencies, healthcare and retail industries, higher education, and K12.
         
        
    
         | 
        |||||
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        
        
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        |||||
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        
        
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        |||||
                
            
        
        Screenshots and Videos | 
        
        
                
            
        
        Screenshots and Videos | 
        |||||
                
            
        
        Pricing
        No information available.
        
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        
        
                
            
        
        Pricing
        No information available.
        
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        |||||
                
            
        
    
        
Reviews/
         | 
        
        
                
            
        
    
        
Reviews/
         | 
        |||||
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        
        
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        |||||
                
            
        
        Company InformationProofpoint 
    
    Founded: 2002 
    
    United States 
    www.proofpoint.com/us/illusive-is-now-proofpoint 
         | 
        
        
                
            
        
        Company InformationIdentity Automation 
    
    Founded: 2004 
    
    United States 
    www.identityautomation.com 
         | 
        |||||
                
            
            
    
        
        
        
            Alternatives | 
        
        
                
            
            
    
        
        
        
            Alternatives | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        
        
                
            
            
    
        
        
        
        
             | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        
        
                
            
            
    
        
        
        
        
             | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        
        
                
            
            
    
        
        
        
        
             | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        
        
                
            
            
    
        
        
        
        
             | 
        |||||
                
            
        
    
        Categories | 
        
        
                
            
        
    
        Categories | 
        |||||
                
            
        
    
        
            
            
        
            
            
                
                    
                
                Identity Management Features
            
                Access Certification
            
            
         
        
    
        
        
            
                Compliance Management
            
            
         
        
    
        
        
            
                Multifactor Authentication
            
            
         
        
    
        
        
            
                Password Management
            
            
         
        
    
        
        
            
                Privileged Account Management
            
            
         
        
    
        
        
            
                Self-Service Access Request
            
            
         
        
    
        
        
            
                Single Sign On
            
            
         
        
    
        
        
            
                User Activity Monitoring
            
            
         
        
    
        
        
            
                User Provisioning
            
            
         
        
    
                     | 
        ||||||
                
            
        
    
        Integrations
            
                
    Axonius
            
            
         
        
    
        
        
            
                
    BeyondTrust Endpoint Privilege Management
            
            
         
        
    
        
        
            
                
    BlueCat Gateway
            
            
         
        
    
        
        
            
                
    BlueCat Unified DDI
            
            
         
        
    
        
        
            
                
    Cisco Umbrella
            
            
         
        
    
        
        
            
                
    CrowdStrike Falcon
            
            
         
        
    
        
        
            
                
    CyberArk Privileged Access Manager
            
            
         
        
    
        
        
            
                
    Google Cloud Platform
            
            
         
        
    
        
        
            
                
    IBM QRadar SIEM
            
            
         
        
    
        
        
            
                
    Incident IQ
            
            
         
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
             | 
        
        
                
            
        
    
        Integrations
            
                
    Axonius
            
            
         
        
    
        
        
            
                
    BeyondTrust Endpoint Privilege Management
            
            
         
        
    
        
        
            
                
    BlueCat Gateway
            
            
         
        
    
        
        
            
                
    BlueCat Unified DDI
            
            
         
        
    
        
        
            
                
    Cisco Umbrella
            
            
         
        
    
        
        
            
                
    CrowdStrike Falcon
            
            
         
        
    
        
        
            
                
    CyberArk Privileged Access Manager
            
            
         
        
    
        
        
            
                
    Google Cloud Platform
            
            
         
        
    
        
        
            
                
    IBM QRadar SIEM
            
            
         
        
    
        
        
            
                
    Incident IQ
            
            
         
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
             | 
        |||||
| 
                
            
        
    
     | 
        
        
                
            
        
    
     |