Recommends continuous and holistic approach to effectively combat
identity-driven threats targeting workforce, third parties, and customers
ID Dataweb, a recognized leader in identity threat detection and risk mitigation, announced the availability of a new industry white paper from technology research and advisory group Omdia titled “Controlling Identity Risk: Detecting and Mitigating Identity Threats.” The paper examines how attackers exploit weak, stolen, or otherwise compromised credentials across customer, third-party and workforce workflows, and why enterprises need a holistic approach to managing identity risk.
The report highlights that traditional identity and access management (IAM) approaches are no longer sufficient against threat actors armed with stolen data and increasingly sophisticated social engineering tactics. It presents an identity verification maturity model that progresses from credential-only authentication to step-up authentication, point-in-time identity verification (IDV), and ultimately continuous identity threat detection and risk mitigation.
Marketing Technology News: MarTech Interview with Haley Trost, Group Product Marketing Manager @ Braze
The advent of identity threat detection and risk mitigation
Identity threat detection and risk mitigation goes beyond IDV by analyzing the broader pattern of transactions associated with a credential, as well as activity across other credentials in the environment. It incorporates a feedback loop that enables continuous learning and refinement of the decision engine. This approach integrates adaptive identity verification, behavioral analytics, device and credential intelligence, and risk scoring to identify and mitigate threats in real time.
What to look for to effectively combat identity-driven threats
Identity use cases are diverse and often span multiple teams within an enterprise, each with distinct objectives and risk tolerances. To be effective, organizations must avoid siloed identity security strategies that optimize for individual teams but leave the enterprise exposed overall.
The report emphasizes the importance of solutions that provide, at minimum, the following capabilities:
- Flexible risk detection and orchestration
- Broad access to authoritative identity data sources and risk signals
- Resilience across infrastructure, data, and identity verification services
- Privacy preservation
This holistic approach enables organizations to deploy a single solution that integrates across multiple enterprise use cases—including customers, third parties (such as contractors and suppliers), and workforce—while reducing complexity, cost, and risk.
Marketing Technology News: From Data to Impact: How AI is Transforming Interactive CTV Ads
“Identity risk is no longer confined to a single login, transaction ,or device,” said Dave Coxe, Co-founder and CEO at ID Dataweb. “Organizations need a unified approach that can continuously verify the person behind the credential across the full identity lifecycle without adding friction for legitimate users.”










