Try our new research platform with insights from 80,000+ expert users

BloodHound Enterprise vs Microsoft Entra ID Protection comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

BloodHound Enterprise
Ranking in Identity Threat Detection and Response (ITDR)
8th
Average Rating
8.0
Reviews Sentiment
6.2
Number of Reviews
1
Ranking in other categories
No ranking in other categories
Microsoft Entra ID Protection
Ranking in Identity Threat Detection and Response (ITDR)
2nd
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
12
Ranking in other categories
Identity Management (IM) (9th), Microsoft Security Suite (9th)
 

Mindshare comparison

As of November 2024, in the Identity Threat Detection and Response (ITDR) category, the mindshare of BloodHound Enterprise is 7.3%, up from 4.8% compared to the previous year. The mindshare of Microsoft Entra ID Protection is 32.0%, down from 35.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity Threat Detection and Response (ITDR)
 

Featured Reviews

Hasan Abufreiha - PeerSpot reviewer
Has significantly influenced our security strategy as it helps us plan attacks and take initial steps in compromising networks
I haven't explored cost-saving aspects or utilized integration capabilities within BloodHound. Additionally, I haven't used AI features in Broadcom for threat detection yet, leaving that to our IT team to handle. If you're already familiar with the field, learning to use BloodHound Enterprise shouldn't be too tricky as the UI is user-friendly and the features are straightforward. I'd rate my overall experience around an eight, mainly due to occasional performance issues and deeper operational concerns. However, in terms of features, UI, and ease of use, it's top-notch.
Mahender Nirwan - PeerSpot reviewer
Access to other software is just one click away and suitable for big organizations
Currently, we have limited use of Microsoft AD. We only use it to see if user blocks are available. If they are, we unblock the account and get access accordingly. AD has paid access control features. We can add access control over AD. For example, for documentation, we use an Outline tool. It's open source, and we add our company's knowledge base to it. It's an alternative to Confluence. We don't want everyone to have access to all documentation. If I create documentation for my team, only my team should have access, not support or sales. We can add these scopes or access controls over AD. Once integrated, the person will get the appropriate access control features upon logging in. Role-based access control is a great feature of Active Directory.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The custom Cypress queries in BloodHound Enterprise is the most valuable feature."
"The solution's technical support offers great assistance to users."
"The deployment process is straightforward. It takes a few hours to complete."
"The solution helps us with authentication."
"The reverse proxy feature provides additional security that is not available in other solutions."
"The features we find most effective for identity security include access reviews, two-factor authentication, and modification."
"The tool is simple and you can find a lot of tutorials, and videos on YouTube that can help you."
"The primary and most valuable aspect of Azure AD identity is its ability to function seamlessly on both on-premise and cloud infrastructure, eliminating the need for extensive updates. However, this dual solution can pose vulnerabilities that require substantial support and security measures in the on-premise environment. Despite the challenges, it is currently not feasible to completely abandon AD, especially for companies in the sales and energy sectors. The integration with Microsoft Defender is crucial for enhancing security, making identity and security the primary focus and purpose of Azure AD."
"The valuable features include multifactor authentication, accessory capabilities, and conditional access for specific applications."
 

Cons

"A few months ago, there was a problem with the digesters having trouble importing data from the normal digesters, a significant issue that needed attention."
"The product's initial setup phase is not easy."
"The recent CrowdStrike issue affected most systems."
"Identity labeling and sensitivity needs improvement."
"Integrating some notifications, not necessarily all, but at least for important events or alerts, would be beneficial as it would function as a team solution or something similar."
"The solution's sync should be faster since it can take about 30 minutes to two hours to complete a simple sync. The tool needs to sync instantly. It also needs to improve scalability, support, and stability."
"The solution is not optimized to work with Mac devices on a granular level. They work seamlessly with Windows but have a lot to improve to work with Mac devices. It also needs to improve stability and scalability."
"There is a lot of confusion around the user interface."
"The platform's pricing and scalability need improvement."
 

Pricing and Cost Advice

Information not available
"Azure Active Directory Identity Protection is not very expensive."
"From one to ten, if one is cheap and ten is expensive, I rate the tool a seven out of ten."
"The pricing is competitive in the SMA segment and runs $5-$6 per user."
"The product cost is on the expensive side."
"The price of Azure AD is not expensive."
report
Use our free recommendation engine to learn which Identity Threat Detection and Response (ITDR) solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
10%
Manufacturing Company
9%
Retailer
8%
Computer Software Company
17%
Financial Services Firm
14%
Government
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with BloodHound Enterprise?
I don't have any specific improvements in mind, as I haven't encountered any significant issues with BloodHound Enterprise. However, a few months ago, there was a problem with the digesters having ...
What is your primary use case for BloodHound Enterprise?
I mainly use BloodHound Enterprise for internal architecture planning, audits, and daily general testing engagements.
What advice do you have for others considering BloodHound Enterprise?
I haven't explored cost-saving aspects or utilized integration capabilities within BloodHound. Additionally, I haven't used AI features in Broadcom for threat detection yet, leaving that to our IT ...
What is your experience regarding pricing and costs for Azure Active Directory Identity Protection?
Pricing for Microsoft products is slightly high, and it influences some customers to consider switching to other service providers.
What needs improvement with Azure Active Directory Identity Protection?
There is a lot of confusion around the user interface. For new users, it can be difficult or confusing to understand the concepts of managed identity and role protection.
 

Also Known As

No data available
Azure Active Directory Identity Protection, Azure AD Identity Protection
 

Learn More

Video not available
 

Overview

Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Identity Threat Detection and Response (ITDR). Updated: October 2024.
816,406 professionals have used our research since 2012.