A 23 page guide for engaging with vendors in the space of Identity Threat Detection and Response and Identity Security Posture Management. This guide is to provide industry practitioners with a foundational understanding of the market for Identity Threat Detection and Response (ITDR) – with example use cases, capabilities and questions to consider when engaging […]
Join us on Sept 27th for our latest industry webinar. We will be launching our latest industry report on Identity Threat Detection and Response, as well as hosting an industry panel of global identity and access management experts and leaders, to discuss the threats to our critical IAM infrastructure.
MANCHESTER, UNITED KINGDOM, August 22, 2023 — The Cyber Hut, a leading boutique industry analyst and advisory firm focused on the global identity and access management market, announced today it has released a new research report. “Identity Threat Detection & Response: Emerging Market Review” is a 39 page report focused on the most recent developments […]
A 39 page vendor agnostic report looking at the emerging market for identity threat detection and response. Table of contents: Introduction Identity Types Increasing Asset Types Increasing Core Service Deployment Explosion Adversarial Activity Switching to IAM Supply Chain Attacks Gaps in IAM Threat Framework What is ITDR? Sector Definition Use Cases How it Works Sample […]
A 39 page vendor agnostic report looking at the emerging market for identity threat detection and response. Table of contents: Introduction Identity Types Increasing Asset Types Increasing Core Service Deployment Explosion Adversarial Activity Switching to IAM Supply Chain Attacks Gaps in IAM Threat Framework What is ITDR? Sector Definition Use Cases How it Works Sample […]
I wanted to expand to this based on conversations I've had over past 4-5 months as part of a research report coming out soon from The Cyber Hut on ITDR - what it is and why it's important now. The last thing I want to do however, is create more confusion and definitions! In order to avoid that I want to break down the term bit by bit.
Our latest community poll was focused on the ever growing murmur that many privileged access management (PAM) and identity governance and administration (IGA) capabilities are either starting to overlap, or dedicated solution providers from each world are starting to add in "lite" functions from each others feature set.
The Cyber Hut recently ran a 7 day community poll on LinkedIn asking which of four big-ticket items will organisations be looking at from an identity and access management point of view.

I recently ran another of my highly scientific industry polls - via LinkedIn to get a feel for this years spending patterns as they pertain to some emerging identity and access management technology areas. I have been tracking four emerging areas over the past 8 months or so, including Passwordless Authentication (where The Cyber Hut released a 61 page buyer guide last year), Cloud Identity/Infrastructure Entitlements Management, Decoupled Authorization and Identity Threat Detection and Response.

All four areas have had significant venture capitalist funding over the past 36 months and the use cases and capabilities of each have started to stabilise to a point where buy side procurement and integration is becoming consistent and vendors are identifying their competitive go to market narratives.

So my poll was essentially asking, which of these areas would a buy-side practitioner look to invest in during 2022?

Vendor introduction report covering oort.io - an emerging vendor in the Identity Threat Detection and Response sector.