List of SOFTwarfare iDXDR Customers
Prairie Village, 66208, KS,
United States
Since 2010, our global team of researchers has been studying SOFTwarfare iDXDR customers around the world, aggregating massive amounts of data points that form the basis of our forecast assumptions and perhaps the rise and fall of certain vendors and their products on a quarterly basis.
Each quarter our research team identifies companies that have purchased SOFTwarfare iDXDR for Identity and Access Management (IAM), Extended Detection and Response (XDR) from public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources, including the customer size, industry, location, implementation status, partner involvement, LOB Key Stakeholders and related IT decision-makers contact details.
Companies using SOFTwarfare iDXDR for Identity and Access Management (IAM), Extended Detection and Response (XDR) include: United States Army, a United States based Government organisation with 453551 employees and revenues of $65.25 billion, United States Department of Defense, a United States based Government organisation with 1000 employees and revenues of $250.0 million and many others.
Contact us if you need a completed and verified list of companies using SOFTwarfare iDXDR, including the breakdown by industry (21 Verticals), Geography (Region, Country, State, City), Company Size (Revenue, Employees, Asset) and related IT Decision Makers, Key Stakeholders, business and technology executives responsible for the software purchases.
The SOFTwarfare iDXDR customer wins are being incorporated in our Enterprise Applications Buyer Insight and Technographics Customer Database which has over 100 data fields that detail company usage of software systems and their digital transformation initiatives. Apps Run The World wants to become your No. 1 technographic data source!
Apply Filters For Customers
| Logo | Customer | Industry | Empl. | Revenue | Country | Vendor | Application | Category | When | SI | Insight |
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
United States Army | Government | 453551 | $65.3B | United States | SOFTwarfare | SOFTwarfare iDXDR | Identity and Access Management (IAM),Extended Detection and Response (XDR) | 2025 | n/a |
In 2025 the United States Army awarded a SBIR Phase III contract to SOFTwarfare to deliver Zero Trust identity and user and entity behavior analytics capabilities through SOFTwarfare iDXDR in support of the PEO C3N network modernization program in the United States. The engagement is scoped to provide Identity and Access Management (IAM),Extended Detection and Response (XDR) capabilities across both tactical and enterprise network domains managed by the program.
SOFTwarfare iDXDR implementation centers on identity-threat response and UEBA functionality, with PangaeAPI cited for continuous identity telemetry and behavioral analytics. Configuration is expected to include continuous identity verification, authentication policy enforcement, identity risk scoring, and identity-centric detection workflows that map to Zero Trust principles.
Technical integration focuses on embedding identity telemetry into detection and response pipelines for the PEO C3N program, with alignment to CMMC and NIST authentication controls for both tactical and enterprise environments. The deployment narrative emphasizes the combination of Identity and Access Management (IAM),Extended Detection and Response (XDR) controls to unify authentication, identity monitoring, and threat detection across networked sites.
Module usage of UEBA and identity-threat response in SOFTwarfare iDXDR is inferred from the SBIR scope and SOFTwarfare product materials, and the Phase III award is intended to validate continuous identity verification and CMMC/NIST-aligned authentication for tactical and enterprise networks. Governance and rollout are oriented toward operational validation under the Army PEO C3N modernization program, with identity assurance and detection workflows positioned as primary operational changes.
|
|
|
United States Department of Defense | Government | 1000 | $250M | United States | SOFTwarfare | SOFTwarfare iDXDR | Identity and Access Management (IAM),Extended Detection and Response (XDR) | 2025 | n/a |
In 2025, the United States Department of Defense validated SOFTwarfare iDXDR under a DoD program executed via a prime contractor. The validation targeted Identity and Access Management (IAM),Extended Detection and Response (XDR) capabilities within SOFTwarfare iDXDR, with emphasis on Zero Trust identity, phishing resistant passwordless MFA, and a rapid deployment architecture for operational environments.
The engagement validated iDXDR capable automated identity threat response and continuous authentication features to support air gapped and DDIL, Denied, Disrupted, Intermittent, Limited environments. Functional areas exercised included continuous authentication, credentialless MFA workflows, and identity centric detection and response orchestration consistent with Identity and Access Management (IAM),Extended Detection and Response (XDR) operational patterns. Configuration work emphasized policy driven access controls and automated response playbooks for identity anomalies.
Deployment validation covered rapid provisioning and hardened authentication flows suitable for disconnected or intermittently connected networks in operational sites, reflecting the platform design in SOFTwarfare iDXDR. Governance validation targeted CMMC compliance requirements for identity assurance and phishing resistance, aligning authentication policies with DoD access governance and incident response processes. The program demonstration showed the platform delivering CMMC compliant, phishing resistant, passwordless MFA and a rapid deployment architecture for operational environments.
|
Buyer Intent: Companies Evaluating SOFTwarfare iDXDR
Discover Software Buyers actively Evaluating Enterprise Applications
| Logo | Company | Industry | Employees | Revenue | Country | Evaluated | ||
|---|---|---|---|---|---|---|---|---|
| No data found | ||||||||