May 13, 2025

SOFTwarfare Launches iDXDR: Breakthrough Identity Threat Platform Unifying IAM With XDR

SOFTwarfare®, the leading innovator in Zero Trust identity security, today announced the public launch of iDXDR™ (Identity Extended Detection and Response) - a groundbreaking cybersecurity platform that combines Identity and Access Management (IAM) and User Entity Behavior Analytics (UEBA) with Extended Detection and Response (XDR) in a unified, real-time defense solution. Available immediately, iDXDR empowers enterprise CISOs, MSSPs, and cybersecurity resellers to detect, respond, and contain identity-based threats faster than ever before, significantly reducing the risk of costly breaches. Using machine learning, and advanced analytics, iDXDR customers and service providers identify and stop abnormal user and entity behavior within an organization's network.


Unlike traditional XDR solutions, which typically overlook identity-related activities post-authentication, iDXDR continuously monitors biometric, behavioral, and access data throughout the entire user session. Built on SOFTwarfare's patented Zero Trust Identity® framework and powered by seamless telemetry integration via PangaeAPI®, iDXDR delivers unparalleled threat visibility and real-time response capabilities, fundamentally changing how organizations defend against identity-driven cyber threats.


"iDXDR doesn't just add identity to XDR - it completely redefines what XDR can achieve," said Wyatt Cobb, CEO of SOFTwarfare. "By embedding continuous biometric and behavioral authentication into the detection and response loop, we give security teams the actionable intelligence needed to detect identity compromise and abuse instantly, correlate threats across the cyber kill chain, and automatically stop attacks before they escalate."


Why iDXDR Matters: Accelerating Detection and Response


  • Real-Time Detection and Response: Cuts detection and response times from minutes to milliseconds by continuously verifying identity and behavior post-login.
  • Reduced Breach Costs: Early threat containment prevents costly investigations, data breaches, and business disruption.
  • Eliminates SOC Alert Fatigue: Rich identity telemetry reduces false positives, enabling analysts to focus on critical threats and improving SOC efficiency and staff retention.
  • Compliance and Security Framework Alignment: Directly aligns with industry standards including Zero Trust mandates, NIST 800-207, CMMC, HIPAA, and PCI - critical for regulated sectors and national security.


Key Features and Innovations of iDXDR


  • Continuous Biometric and Behavioral Identity Verification: Uses BioThenticate® to monitor users and devices continuously, proactively identifying session hijacking, anomalous access, and compromised identities.
  • Automated, Policy-Driven Responses: Dynamically enforces actions like step-up authentication, session termination, or access denial based on risk scoring.
  • Correlated Identity and Enterprise Telemetry: Integrates deeply with SIEM, XDR, and EDR platforms, providing comprehensive visibility from initial identity compromise through lateral threat movements.
  • Built Specifically for MSSPs, MSPs, and Enterprise Security Teams


SOFTwarfare designed iDXDR as a fully managed, multi-tenant, channel-ready solution, enabling MSSPs, MSPs, and system integrators to:


  • Differentiate their cybersecurity portfolio with identity-centric threat defense.
  • Offer compliance-ready Zero Trust services to regulated industries.
  • Create new recurring revenue streams through authentication-as-a-service (IDaaS).


"Given that compromised identities are fuel for so many breaches, the industry absolutely must evolve beyond reactive security. Integrating real-time identity intelligence directly into threat detection and response is the necessary path forward," said Mike Jackson, President, Pendello Solutions. "We're particularly interested in iDXDR's potential to deliver the faster, more accurate mitigation capability our clients require. We anticipate technologies like this will be key to achieving practical security gains while advancing Zero Trust objectives."


Share


Recent Posts

July 15, 2025
The bell rings, and students flood the hallways, accessing learning platforms, and collaborating online. In today’s interconnected educational landscape, these constant digital interactions make schools increasingly vulnerable to sophisticated cyber threats. The alarming reality is that data breaches are no longer a rare occurrence in the education sector; they are a pervasive and growing threat. A recent report by the Center for Internet Security revealed a startling statistic: 82% of K-12 schools experienced a cyber incident between July 2023 and December 2024. This highlights the widespread nature of the problem, with over 9,300 confirmed cyber incidents affecting an estimated 5,000 K-12 institutions during those 18 months. Schools are increasingly "prime targets for cybercriminals," not just for the data they hold, but also due to often lacking the dedicated information security teams and funding that corporations possess.
March 19, 2025
It’s March Madness, and the entire office is buzzing. Employees are refreshing their screens, checking brackets, and placing friendly wagers.
March 4, 2025
SOFTwarfare Strengthens Executive Leadership With the Appointment of Seasoned CFO, Jack Caffrey
February 26, 2025
I remember seeing a comedian do a bit about “why do brand marketers use words like ‘New and Improved’ on products?” The punch line boiled down to: the only thing “new and improved” is the way you’re talking about the product and maybe a feature you bolted on to the old one you’re imploring us to replace.
January 22, 2025
In an era where banking services can be accessed on any device, at any time, from virtually anywhere, digital identity has become the keystone of secure, streamlined financial services. Yet as financial institutions race to improve customer experience and outpace fintech disruptors, they face a deluge of sophisticated cyber threats capable of bypassing many traditional safeguards. The stakes couldn’t be higher: one successful breach can threaten customer trust, brand reputation, and regulatory compliance all in a single stroke.
December 23, 2024
Non-Kinetic Warfare (NKW) poses relentless threats like financial, social, informational and infrastructure attacks, undermining trust and security. A fragmented identity landscape, weak authentication, and rising IoT vulnerabilities leave organizations exposed. The solution? A unified identity fabric that integrates Zero Trust principles—strong authentication, centralized management, and continuous monitoring—for both human and machine identities. This approach reduces risks, enhances resilience, and protects critical infrastructure, making authenticated identities the cornerstone of national defense.
December 10, 2024
While we continue to pour resources into bolstering our firewalls and implementing the latest threat detection systems, a new cybersecurity battleground is emerging – one that many organizations are woefully unprepared for. By 2025, the biggest threat won't be lurking at the network perimeter, attempting to breach our defenses; it will be the exponential growth of non-human identities lurking within our own systems.
November 12, 2024
Imagine this: a critical piece of equipment in a bustling hospital's operating room suddenly goes offline. Surgeons are left scrambling, the patient's life hangs in the balance. The culprit? Not a malfunction, but a cyberattack that exploited a compromised API key – a digital credential that granted access to the equipment's control systems. This seemingly innocuous string of characters, embedded within the hospital's network, became the entry point for attackers to disrupt critical care.
October 10, 2024
In today's interconnected world, where digital transformation is accelerating and the lines between physical and digital are blurring, the concept of identity has expanded beyond the human realm. While we've traditionally focused on verifying human users, the rise of machines, applications, and interconnected devices necessitates a new approach to security. Just as we authenticate human users, we must also authenticate the machines accessing our networks and data. This is where machine identity comes into play, and it's a critical factor often overlooked in the multi-factor authentication (MFA) conversation.
August 15, 2024
Multifactor authentication (MFA) strengthens security by adding layers beyond a username and password. However, traditional MFA often meets user resistance due to its inconvenience. Invisible MFA addresses this by streamlining the process, reducing user fatigue while improving security.