Save to My Lists
Unclaimed
Unclaimed

Top Rated SolarWinds Identity Monitor Alternatives

SolarWinds Identity Monitor Reviews & Product Details

Jeremy M.
JM
Director of IT
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about SolarWinds Identity Monitor?

It is very simple to use. Just enter your work email address to see details of its exposure. You’ll start receiving notifications whenever it shows up in a new data leak. In addition, you can see the aggregate statistics about the data from the email address domain. Review collected by and hosted on G2.com.

What do you dislike about SolarWinds Identity Monitor?

A bit difficult to figure out how to add it to the reset of your product tool sets. Feels a bit disconnected. Review collected by and hosted on G2.com.

What problems is SolarWinds Identity Monitor solving and how is that benefiting you?

Monitoring the dark web for exposed credentials which could lead to data breaches and takeovers. Review collected by and hosted on G2.com.

SolarWinds Identity Monitor Overview

SolarWinds Identity Monitor Details
Show LessShow More

Seller Details
Year Founded
1999
HQ Location
Austin, TX
Twitter
@solarwinds
20,053 Twitter followers
LinkedIn® Page
www.linkedin.com
2,655 employees on LinkedIn®
Ownership
NYSE: SWI
Description

SolarWinds provides powerful and affordable IT management software to customers worldwide from Fortune 500 enterprises to small businesses.

Recent SolarWinds Identity Monitor Reviews

Jeremy M.
JM
Jeremy M.Mid-Market (51-1000 emp.)
3.5 out of 5
"Simple and effective Monitor for exposed credentials"
It is very simple to use. Just enter your work email address to see details of its exposure. You’ll start receiving notifications whenever it show...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

SolarWinds Identity Monitor Media

Answer a few questions to help the SolarWinds Identity Monitor community
Have you used SolarWinds Identity Monitor before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of SolarWinds Identity Monitor for G2 to provide buying insight. Below are some alternatives with more reviews:

1
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(288)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
2
SentinelOne Singularity Logo
SentinelOne Singularity
4.7
(183)
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, rapidly eliminates threats with a fully-automated incident response protocol, and adapts defenses against the most advanced cyber attacks.
3
IBM MaaS360 Logo
IBM MaaS360
4.2
(173)
Keep your business moving with mobile device management and security
4
Recorded Future Logo
Recorded Future
4.6
(127)
Recorded Future Intelligence Cloud elevates your existing security defenses by enhancing the depth and breadth of protection by giving you insights into threats and attacks before they impact, so you can stay ahead of attackers, at the speed and scale of today’s threat environment.
5
Microsoft Defender for Identity Logo
Microsoft Defender for Identity
4.3
(98)
Microsoft Defender for Identity enables you to integrate Microsoft Defender for Identity with Defender for Endpoint, for an even more complete threat protection solution. While Defender for Identity monitors the traffic on your domain controllers, Defender for Endpoint monitors your endpoints, together providing a single interface from which you can protect your environment.
6
Guardz Logo
Guardz
4.8
(53)
7
Microsoft Entra Identity Protection Logo
Microsoft Entra Identity Protection
4.5
(42)
Identity Protection is a tool that allows organizations to accomplish three key tasks: Automate the detection and remediation of identity-based risks. Investigate risks using data in the portal. Export risk detection data to your SIEM.
8
Agency Logo
Agency
4.8
(41)
Agency for Business provides personalized managed cybersecurity for your organization's most vulnerable threat surface, the digital lives of your employees. Businesses use Agency to stop Employee Targeted Digital Risks (ETDR) by protecting their executives and high-risk team members from attacks on their personal devices, online accounts, and personal data. Agency works on iOS, Android, Windows, MacOS, and Linux devices and is backed by over $1M of coverage. No other company has as much experience protecting high-value targets around the world.
9
ZeroFox Logo
ZeroFox
4.6
(34)
With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFOX Platform protects you from cyber, brand and physical threats on social media & digital platforms.
10
Huntress Managed ITDR Logo
Huntress Managed ITDR
4.9
(33)
Continuously monitors for indications and behaviors of a BEC attack, like a user logging in from a suspicious location or a malicious email forwarding rule. The Huntress Security Operations Center (SOC) reviews any detections, instantly isolating any compromised identities, and supplies a semi-automated remediation plan for further necessary actions.
Show More