Varonis Named a Leader in GigaOm Radar for Identity Threat Detection and Response (ITDR)

We are excited to announce that Varonis has been recognized as a leader in the 2025 GigaOm Radar for Identity Threat Detection and Response (ITDR).
Shawn Hays
3 min read
Last updated May 22, 2025
Varonis Named a Leader in GigaOm Radar for Identity Threat Detection and Response (ITDR)

We are excited to announce that Varonis has been recognized as a leader in the 2025 GigaOm Radar for Identity Threat Detection and Response (ITDR). The report recognizes the Varonis Data Security Platform (DSP) as one of the few solutions bridging identity security with data security.

This year’s report saw a 50% increase in vendors assessed, showing significant growth and demand for ITDR solutions. This demand mirrors a threat landscape in which identity is increasingly vulnerable. Bad actors aren’t breaking in; they are logging in. In fact, most data breaches (86%) start with stolen credentials. To learn more, see our research on The Identity Crisis report and the Rising Threat of Data Breaches in Healthcare.

Organizations are looking for a well-integrated ITDR strategy and platform to detect malicious activity earlier in the attack chain to combat this identity-led data breach epidemic. In this blog, we’ll explore why combining leading ITDR capabilities and leading data security capabilities makes Varonis the best protection for your data.

Varonis' unmatched approach to ITDR 

Varonis stands out as a leader in the ITDR arena as it bridges the gap between identity threat awareness and the data blast radius. Security teams must understand when an identity is compromised and quickly discern what the user can access. Confidently finding this information can take significant effort for many organizations; a recent study shows the average time to report a breach is over 4.1 months.

Even the best zero-trust and least-privilege programs fail when identity risk and data risk are treated in silos. Stopping attackers after they log in requires a unified view, one that connects who a user is with what they can access and what they’re doing. That’s why we’ve made it a priority to unify identity and data insights, so threats can be caught before any damage is done.

Liron Raveh, VP of Product Management

 

Visualizing identity threats across dozens or hundreds of information systems in cloud, SaaS and hybrid environments can be challenging. Yet, mapping those human and non-human identities and their impact on data can affect the breach timeline most.

For example, AWS and Azure customers get bi-directional visibility into identities, what data they have access to and the origin of their entitlements with the Varonis Access Graph. By unraveling identity and mapping it to sensitive data, enterprise organizations see identity and access risk across their data estate and respond to threats faster. 

Varonis' AWS Access Graph is one of many examples where identity security capabilities are integrated throughout its platform.

AWS Access Graph

Varonis' AWS Access Graph is one of many examples where identity security capabilities are integrated throughout its platform.

With comprehensive features including identity resolution, centralized access control and AI-driven anomaly detection — Varonis is shattering the hourglass. Security teams gain speed rather than busy work. Varonis’ placement as a Leader in the report validates its end-to-end approach to data security, which seamlessly integrates ITDR. 

ITDR in 2025 and beyond

Varonis uses machine learning and advanced AI capabilities to efficiently reason over a growing river of threat data. Functionality like User and Entity Behavior Analytics (UEBA) will be critical for modern ITDR solutions, and security vendors will need to continuously enhance their models and adapt as attackers change their methods in evading detection. 

Recently, The Wall Street Journal sat down with Varonis CEO, Yaki Faitelson, for a conversation about data security in the age of AI. "Every minute gives an attacker an advantage...", says Yaki, "Automation coupled with AI-driven insight can help companies quickly spot and fix vulnerabilities. What you really need is robots fighting robots.”

Every minute gives an attacker an advantage... What you really need is robots fighting robots.”

Yaki Faitelson, Varonis CEO

 

ITDR solutions must adapt and support the massive adoption of AI in productivity and business operations. Insider threats or compromised accounts may use a trial-and-error approach across multiple sanctioned and unsanctioned AI applications to find the answers or data they're hunting. Protecting data from improper AI use or access will largely depend on how well organizations monitor identity compromise.

Security teams will need to use AI for both detecting the subtle nuances in anomalous behavior and tracking AI activity from its user base. Two facts persist into the next decade of cybersecurity: AI relevancy will rise and identity threats will be the most pervasive risk to AI. Varonis is preparing for that future.

For a look at how Varonis detects identity-related threats facing organizations at scale, schedule a demo and subscribe for news on new identity protection capabilities.

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.