Quick Definition
Identity Threat Detection and Response technologies concern themselves with detecting mismatches between the owner of a session, grant, or set of credentials and the individual who appears to be using them at any given moment.
Unlike Identity and Access Management (IAM) tools, which mostly concern themselves with the day-to-day of identity management and authentication, ITDR technologies are designed to detect and enable responses to cases in which an unauthorized user may have gained access, whether as a matter of credential theft, account takeovers, session takeovers, other other instances in which the user of an identity appears no longer to be its owner.