About Us

STEALTHbits Technologies is a cybersecurity software company focused on protecting an organization’s credentials and data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements and decrease operations expense.

Watch Video

 

The Companies You Trust, Trust Us

AstraZeneca Logo
Credit Suisse Logo
John Deere Logo
Disney Logo
NBC Universal Logo

Management Team

Steve Cochran - Chief Executive Officer (CEO)

Steve Cochran

Founder, CEO
Jonathan Sander - Chief Technology Officer

Jonathan Sander

Chief Technology Officer
Carol Volk - Senior Vice President, Marketing & Product Management

Carol Volk

Senior Vice President, Marketing and Product Management
Adam Laub - Senior Vice President, Product Marketing

Adam Laub

Senior Vice President, Product Marketing
Jeff Warren - Senior Vice President, Technical Product Management

Jeff Warren

Senior Vice President, Technical Product Management
Jill Twomey - Director of Finance

Jill Twomey

Vice President, Finance

Steve Cochran

Founder, CEO

Steve Cochran is the CEO for STEALTHbits Technologies. He has served as CEO since his founding of the company in 2001. Steve has guided the organization from its inception to eleven consecutive years of profitability and growth.

He has had a successful 20-year career in the software industry, holding senior management positions and leading the Change Management business unit at Quest Software prior to founding STEALTHbits. Steve was also instrumental in the success and growth of Quest Software; an organization of less than 100 employees when he began.

Jonathan Sander

Chief Technology Officer

Jonathan Sander is STEALTHbits’ Chief Technology Officer (CTO). As CTO, he is responsible for driving technical innovation, ensuring that STEALTHbits is well positioned in their current and emerging markets, and he will also lead corporate development efforts. Jonathan also plays the role of evangelist at STEALTHbits venues large and small. Prior to STEALTHbits, Jonathan was VP of Product Strategy for Lieberman Software.

As part of Quest Software from 1999 through 2013, he worked with the security and ITSM portfolios. He helped launch Quest’s IAM solutions, directing all business development and product strategy efforts. Previous to that, Mr. Sander was a consultant at Platinum Technology focusing on the security, access control and SSO solutions. He graduated from Fordham University with a degree in Philosophy.

Carol Volk

Senior Vice President, Marketing and Product Management

Carol is the Senior Vice President of Marketing and Product Management at STEALTHbits. Her team’s areas of focus include corporate marketing, communications and AR/PR, demand generation, product marketing, events and marketing operations.

Prior to joining STEALTHbits, Carol held roles in Marketing, Product Management and Engineering for several software technology companies including Oracle, McAfee, RightNow Technologies, Voxware and Prudential Investments.

Carol holds a Bachelor of Science degree in Computer Science Engineering from Lehigh University.

Adam Laub

Senior Vice President, Product Marketing

Adam Laub is the Senior Vice President of Product Marketing at STEALTHbits Technologies. He is responsible for setting product strategy, defining future roadmap, driving strategic sales engagements, supporting demand generation activities, enabling the sales organization and all aspects of product evangelism.

Since joining STEALTHbits in 2005, Adam has held multiple positions within the organization, including Sales, Marketing, and Operational Management roles.

Adam holds a Bachelor of Science degree in Business Administration from Susquehanna University, Selinsgrove, PA.

Jeff Warren

Senior Vice President, Technical Product Management

Jeff Warren is STEALTHbits’ Senior Vice President of Technical Product Management. Jeff has held multiple roles within the Technical Product Management group since joining the organization in 2010, initially building STEALTHbits’ SharePoint management offerings before shifting focus to the organization’s Data Access Governance solution portfolio as a whole. Before joining STEALTHbits, Jeff was a Software Engineer at Wall Street Network, a solutions provider specializing in GIS software and custom SharePoint development.

With deep knowledge and experience in technology, product and project management, Jeff and his teams are responsible for designing and delivering STEALTHbits’ high quality, innovative solutions.

Jeff holds a Bachelor of Science degree in Information Systems from the University of Delaware.

Jill Twomey

Vice President, Finance

Jill Twomey is the Vice President of Finance for STEALTHbits Technologies and has over 25 years of experience in accounting positions. Prior to joining STEALTHbits in September 2005, Jill was the Controller for both PGI, Inc. and Arcadian Healthcare, Inc. She is responsible for all Accounting, Legal, and Human Resources in the organization. She holds a Bachelor of Science degree in Accounting from the University of Rhode Island.

We can not only detect the attack as its happening, but we can pinpoint the affected machines right away, accelerating remediation and recovery efforts. All this capability comes out-of-the box, without installing agents on endpoints, or employing an army of analysts peeling through logs.”

- Global Energy Company

Careers - Current Open Positions

We are always looking for talented, motivated individuals who want to make a difference in our customers' lives with award-winning solutions.

  • Account Executive

    The Mid Market Account Executive will contribute to key sales operations initiatives, including compiling and developing prospective client information and managing a sales territory.

    A Sales Engineer’s responsibilities include conducting sales presentations, performing software evaluations, and developing strong business justifications. Sales Engineers must have the aptitude to develop an expert understanding of STEALTHbits products.

    Responsibilities:

    • Conduct discussions, presentations, and demonstrations to understand the customer’s business and identify their key challenges
    • Implement STEALTHbits software, collect compelling data, and develop findings
    • Articulate the importance of addressing relevant security threats
    • Provide expert guidance to customers on how to secure credentials and data
    • Provide expert guidance to customers on relevant compliance standards

    Requirements:

    • A minimum of four years of relevant Sales Engineering experience
    • Strong knowledge of Windows Server, NTFS permissions, Microsoft Exchange, Active Directory
    • Experience in Active Directory security
    • Knowledge of AD attack methods such as ntds.dit extraction
    • Excellent presentation, business, analytical, and problem solving skills.
    • Strong background in SQL
    • Ability to communicate effectively with a wide variety of technical and non-technical audiences such as executives and practitioners across Security, IT, Legal, Compliance, etc.

    STEALTHbits Technologies is an Equal Opportunity Employer

    Hawthorne, NJ

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Business Development Representative

    Are you a driven, methodical and hard-working individual that likes to learn new things? Do you have a sense of humor and like to collaborate? If so, keep reading!

    We are searching for highly motivated teammates that are looking to start and build a career in sales for a great technology software company. As a Business Development Rep, we will foster your professional growth by listening to your ideas and supporting your professional growth by investing time in your development as you continue on in your sales journey.

    Responsibilities:

    • Meet sales activities (KPIS): Dials, Calls, Follow-ups and Meetings.
    • Initiate the sales cycle and build pipeline by Qualifying companies using proven processes and methodologies
    • Articulate our products and services to potential customers
    • Maintain accurate details of your daily activities within our CRM system
    • Foster a strong partnership with your Account Executives to move the sales cycle forward
    • Compensation: Base plus commission/KPI

    Experience:

    • BA/BS Degree or 1+ years' experience in a related field
    • Excellent verbal and written communication skills
    • Ability to collaborate and accept/provide feedback in a team setting
    • Ability to work in a fast-paced environment

    STEALTHbits Technologies is an Equal Opportunity Employer

    Southern, CA

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Enterprise Account Executive

    We are looking to hire an Enterprise Account Executive for the Rocky Mountain Region. This is a virtual position, looking for candidates local to the Rocky Mountain Region . We are also looking to hire Enterprise Account Executives in the Mid-West and Ohio Valley. These are remote positions, however, we are looking for local candidates in the Mid-West (ideally Chicago & Minneapolis) and Ohio Valley regions.

    Responsibilities:

    • Prospecting into a large territory with the ability to navigate multiple stakeholders
    • Develop and cultivate relationships at all levels of an organization
    • Responsible for software license and software maintenance sales
    • Maintain professional and technical knowledge of software products
    • Collaborate with partner organizations
    • Generate sales leads, actively prospect new business and maximize opportunities within current client base
    • Develop sales strategies with management team to increase market penetration
    • Manage sales pipeline and provide timely and accurate sales forecast reports
    • Perform sales presentations/demonstrations to match products with identified needs
    • Negotiate and close sales: must be able to move deals from inception to close
    • Startup hustle and ability to manage a fast paced environment.

    Experience:

    • Undergraduate degree in business or other related field.
    • Previous business-to-business sales experience (5+ yrs.) preferred, technology industry experience preferred.
    • Exceptional verbal and written communication skills.
    • Outstanding phone skills.
    • Ability to work collaboratively and effectively in a team-oriented environment
    • Ability to influence, negotiate and gain commitment at all organizational levels.
    • Ability to work in fast-paced, self-directed entrepreneurial environment.
    • Decision-making, problem resolution and creative thinking skills.
    • Personal drive and internal motivation toward high achievement.
    • Ability to build customer relationships
    • Ability to function out of a home office

    STEALTHbits Technologies is an Equal Opportunity Employer

    Mid-West (Chicago & Minneapolis)

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    New England & Southeast

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Ohio Valley Region

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Rocky Mountain Region

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • STEALTHbits Technologies is a data security software company focused on protecting an organization’s credentials and sensitive information. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements and decrease operations expense.

    Identify threats. Secure data. Reduce risk.

    We are looking for an Enterprise Sales Manager to join our sales team. The ideal candidate will be located in our Hawthorne, NJ office. We are looking for candidates with a successful track record in...

    • Managing a sales territory
    • Driving aggressive growth
    • Building teams
    • Developing people
    • Run a predictable sales process
    • Partnering with the channel

    Responsibilities

    • Develop, communicate and execute sales plans in support of corporate strategy and objectives
    • Develop and implement the proper size of sales force required to meet the sales strategy
    • Oversee the hiring and development of the Enterprise East Coast Sales organization
    • Lead the Sales Team in following sales methodology and best practices, as well as ensuring proper use of CRM system
    • Provides ongoing mentorship to Sales Representatives to teach appropriate prospecting techniques for securing new clients, key account management, and general account maintenance
    • Conducts periodic reviews of business, which includes sales call activity, lead follow up, and prospecting and performance for each individual Sales Representative, while helping with competitive losses/wins, and professional developmental opportunities
    • Assess skill sets and provide ongoing coaching and feedback to team members in order to meet objectives, reinforce sales methodologies, and provide guidance on career path direction
    • Identify areas where your team needs assistance/where your territory needs growth and participate in the recruiting/interviewing activities
    • Guide Sales Team members on how to manage key relationships with principals and select Customers and Channel Partners
    • Implement processes that will keep the Sales Leadership Team current on the status of all sales activity on ongoing progress while acting as a point of escalation for Customers and Channel Partners
    • Ability to assess customer information, identify and address problem areas, formulate relevant solutions, and present solutions effectively
    • Manage overall sales processes and metrics
    • Manage customer expectations and contribute to a high level of customer satisfaction
    • Define sales processes that drive desired sales outcomes and identify improvements where and when required
    • Provide detailed and accurate sales forecasting
    • Responsible for driving sales, attaining sales objectives, and achieving quota metrics
    • Provide market, competitor, and customer activity to the Executive team
    • Travel for in-person meetings with customers and partners to develop key relationships

    Experience

    • Undergraduate degree in business or other related field
    • Previous business-to-business software/technology sales experience (10+ yrs)
    • Experience in security software and identity management space is a big plus
    • Prior experience managing a sales team
    • Exceptional verbal and written communication skills
    • Outstanding phone skills
    • Personal drive and internal motivation toward high achievement
    • Ability to function out of a home office

    In addition, successful candidates must have prior experience in these areas:

    • Business Planning: Has done an analysis of the assigned market with a developed business plan. This includes identifying specific resources, coverage, revenue goals, and action plans to achieve the forecast.
    • Activity Management: Establishes a basic plan with sub-tasks and timelines, communicates the plan and tracks execution, and focuses on forecasted activities
    • Pipeline Management & Forecasting: Checks the general status of each Sales Representatives’ pipeline on a regular basis and provides coaching to address critical gaps. Based on familiarity and experience, applies judgement to their team members forecasting projections
    • Sales Process Execution: Actively involved in all critical deals and is consistently works with all Sales Representatives with a variety of accounts to understand the current selling environment. Decision-making, problem resolution and creative thinking skills
    • Orchestrating Resources: Ability to influence, negotiate and gain commitment at all organizational levels. Persistently leads, influences, and choreographs cross-functional and partner selling teams to ensure that customer deadlines, expectations, and agreements are met/exceeded. Ability to work collaboratively and effectively in a team-oriented environment

    Hawthorne, NJ

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Marketing Director

    The Marketing Director will be responsible for developing an integrated marketing program for a STEALTHbits product suite. The ideal candidate will have 5+ years of experience in a B2B software technology company in either product management, product marketing, solution engineering or marketing. Information Security experience is a plus.

    The Marketing Director will be in charge of creating multi-touch, multi-channel campaigns that use a mix of digital and in-person touches to build relationships with personas throughout the buyer’s journey. He or she will also be responsible for writing marketing collateral and other content, which require an understanding of STEALTHbits’ solutions and the ability to articulate their value and benefits. The position will report to the SVP of Marketing and will also work closely with the SVP of Product Marketing and his team, as well as the Technical Product Managers.

    Responsibilities:

    • Work closely with product marketing/product management to develop and execute integrated marketing campaigns to generate leads and brand awareness for STEALTHbits’ product suite and contribute to quarterly and annual revenue goals
    • Create an editorial content calendar that generates a steady stream of content and webcasts to support brand awareness and sales growth of STEALTHbits’ products, including buzz in the press
    • Become an expert on your buyer and user personas and products in order to edit content produced by product marketing and product management, as well as create content highlighting key messages with regards to business pain points at each stage of the buyers’ journey
    • Manage marketing content and activities around product launches and releases, ensuring messaging consistency across media, website and customer- and analyst-facing materials
    • Support the creation of product messaging and corporate branding to differentiate STEALTHbits in the marketplace, including managing creative content from external vendors
    • Be integral in the development of the strategy around third-party conferences and events, e.g., messaging and content, booth/demo experience, and pre- and post-show communications to ensure event goals are met
    • Build relationships with customers to learn how they are using STEALTHbits products for insight into use cases and business benefits and to write their success stories
    • Help create the story flow and content for automated email nurture campaigns
    • Support analyst relations outreach with presentation, customer references, and other content as requested by product marketing and product management
    • Support SEM/SEO efforts by understanding the website, content, and metadata strategy and aligning campaigns and content to it
    • Use CRM solutions (marketing and sales automation) to help create campaigns, generate lead reports, and do analysis to track and improve marketing results

    Experience:

    • 5+ years of experience in a technology field with a passion for marketing. Information security experience a plus
    • Understanding of the buyer’s journey and persona-based marketing
    • Ability to think strategically and creatively while maintaining attention to detail
    • Ability to build effective working relationships with a wide range of stakeholders
    • Ability to research technical topics and quickly master them
    • Positive self-starter and desire to exceed expectations
    • Commitment to achieving product suite revenue goals
    • Strong written, verbal, and presentation skills
    • Ability to multi-task and deliver within tight timeframes
    • Proven organizational skills and project management experience
    • Familiarity with B2B marketing and sales processes
    • Familiarity with CRM marketing and sales automation tools (Pardot and Salesforce)
    • Strong MS office skills. Adobe Photoshop design skills a plus
    • Bachelor’s degree in marketing, computer science, or related field. MBA a plus

    Travel Component:

    Minimal (<20%) within the United States and Canada

    STEALTHbits Technologies is an Equal Opportunity Employer

    Hawthorne, NJ

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Virtual / Remote

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Marketing Program Manager

    The Marketing Program Manager will assist the marketing team in the implementation of all marketing activities.

    Responsibilities:

    • Handle all event logistics for regional and national events, including budget management, event goal management, pre-event planning to drive attendance and meetings, booth planning and post-event activities and debriefs
    • Support marketing campaigns by creating email templates, invitations and landing pages for marketing assets and events
    • Handle webinar logistics (creation of invites, management of live webinar console, creating On-Demand webinars, and association of leads to campaigns)
    • Manage corporate swag including vendors for ordering corporate clothing and giveaways
    • Manage technical aspects of key marketing systems (marketing automation, CRM) used to generate, distribute, and report on leads
    • Manage marketing assets (whitepapers, videos, etc.) by ensuring they are formatted consistently, with up-to-date branding, and are accessible on the appropriate webpages
    • Contribute to the SEO program as appropriate
    • Assist the rest of the marketing and product management teams in the design and management of the corporate website

    Experience

    • Excellent Communicator, both verbal and written
    • Strong organizational skills and the ability to handle multiple deadlines
    • Strong MS Office skills
    • Ability to build effective relationships with a wide range of people
    • Strong presentation skills
    • Bachelor’s degree in related field preferred
    • Graphic design skills and knowledge in Adobe are a plus

    STEALTHbits Technologies is an Equal Opportunity Employer

    Hawthorne, NJ

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Pre-Sales Systems Engineer

    The function of a Pre-Sales Engineer at STEALTHbits is to communicate and demonstrate the value of STEALTHbits' products and technologies, in the areas of Operating System and Application Management, to customers and business partners. In particular, the Pre-Sales Engineer's key mission is to work with Account and Sales Managers and support them to compete and win business for STEALTHbits products in the above mentioned areas.

    Responsibilities:

    • To conduct technical engagements for STEALTHbits Technologies' OS and Application Management products.
    • To assist Account Managers to qualify customer requirements and to participate in technical discussions on STEALTHbits' value propositions.
    • To conduct demonstrations and product walkthroughs to customers' IT personnel and Managers.
    • To assist customers periodically with expertise in the areas of OS & Application Management. Provide customers with the best practice methods and expertise in the areas of OS and Application Management.
    • To assist and maintain rapport with the technical decision makers on the customer side.

    Experience:

    • B.A./B.S. in CS/CIS or higher qualifications
    • A minimum of four years of relevant technical experience. Experience in a pre-sales role will be a strong added qualification.
    • Extensive skills and experiences with OS & Application Management tools.
    • Excellent presentation, business, analytical, and problem solving skills.
    • Ideal candidate needs to have strong work ethic with the ability to work well with a variety of team members.
    • Should have a strong background in SQL knowledge and troubleshooting.
    • Demonstrated ability to successfully support procurement activities (i.e. RFP responses, Trial Execution, and Installation).
    • Strong knowledge of Windows Operating Systems, Microsoft Exchange, Active Directory, and various UNIX/Linux platforms.
    • Experience in working on projects centered in Active Directory, Identity and Access. Management and other IT related projects.
    • Strong communication skills in English (written and verbal).

    All applicants are required to provide a comprehensive resume (in word document) with current and expected salaries.

    STEALTHbits Technologies is an Equal Opportunity Employer

    United Kingdom

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Virtual/Remote

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Product Manager

    The Product Manager will be responsible for the overall success for a STEALTHbits solution or solution set. The ideal candidate will have 5+ years of experience in a B2B software technology company in either product management, solution engineering or software development. Information Security experience is a plus.

    The Product Manager will be responsible for gathering & prioritizing customer requirements, creating product strategy, vision & roadmap, and working closely with Development, Sales & Marketing to ensure goals are met in accordance with overall company strategy. The position will report to the SVP of Marketing and Product Management and will work closely with Technical Product Managers and Sales.

    Responsibilities:

    • Own the strategic product roadmap, based on customer/prospect input, competitive intelligence, analyst guidance, market influence and innovative ambition.
    • Drive requirements into the development organization through business requirements, and work closely with your development.
    • Maintain a multi-release, cross-product roadmap for their solution set at all times.
    • Anticipate, identify, and communicate project status and risks to key stakeholders, including the senior leadership team.
    • Work closely with Sales by engaging in sales opportunities. Track opportunity creation and progress, and collaborate with marketing to create programs that ensure quarterly and annual revenue goals are met.
    • Become an expert on your customers and prospects and the reasons they buy and use your solution. Develop a thorough knowledge of why the company wins and loses deals.
    • Find and develop relationships with early adopters to provide feedback on features and products prior to market introduction.
    • Create simple, clear sales enablement, training and tools so that Sales can clearly articulate product value and knows when and to whom to sell your solution.
    • Create externally-facing content highlighting key messages and value proposition with regards to business pain points at each stage of the buyers’ journey.
    • Collaborate with Marketing to manage content and activities in support of product launches and releases.
    • Support SEM/SEO efforts by understanding the website, content, and metadata strategy and aligning content to it.
    • Be the brand ambassador for your solution(s) by presenting in webinars, podcasts, speaking at events and participating in media and analysts opportunities when needed.

    Experience:

    • 5+ years of experience in a technology field with a passion for product management. Information security experience a plus
    • Technical expertise in any of the following areas a plus: Azure, Office 365, Active Directory, SharePoint, Exchange, Windows File Systems, SQL, Linux/Unix, Box, Dropbox.
    • Familiarity with Data Access Governance, Auditing and Compliance, or Threat Detection as they relate to InfoSec is a plus.
    • Ability to think strategically and creatively while maintaining attention to detail.
    • Ability to build effective working relationships with a wide range of stakeholders.
    • Ability to research technical topics and quickly master them.
    • Ability to thrive in a start-up environment, where gears shift often and your confident input is crucial to fast decision making.
    • Positive self-starter and desire to exceed expectations.
    • Commitment to achieving product suite revenue goals.
    • Strong written, verbal, and presentation skills, with an eye towards clarity and conciseness.
    • Ability to multi-task and deliver within tight timeframes.
    • Proven organizational skills and project management experience.
    • Familiarity with B2B marketing and sales processes.
    • Strong MS Office skills.
    • Familiarity with Salesforce a plus.
    • Bachelor’s degree in computer science, or related field. MBA a plus.

    Travel Component:

    Moderate (30% on average) for customer visits, additional travel to corporate headquarters for remote candidates.

    All applicants are required to provide a comprehensive resume (in word document) with current and expected salaries.

    STEALTHbits Technologies is an Equal Opportunity Employer

    Hawthorne, NJ

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Remote / Virtual

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • QA Engineer

    Responsibilities:

    • Developing, documenting and maintaining functional test cases and other test artifacts
    • Backend database testing in Microsoft SQL environment
    • Executing and evaluating manual or automated test cases and reporting test results.
    • Isolating, replicating, and reporting defects and verifying defect fixes.
    • Standing up server environments that will be used for testing.

    Experience:

    • 3+ years of experience in a Quality Assurance Engineering role for a software company.
    • The ability to effectively communicate complex technical concepts verbally and in writing.
    • Demonstrate the ability to do in-depth problem determination and analysis.
    • UNIX and Windows Server administration experience a must. SQL Server experience strongly desired.
    • Active Directory, Exchange, SharePoint, Windows Server experience strongly desired.

    What We Expect:

    • Within 3 months, the following will be expected to have been accomplished:
      • Develop, document and maintain functional test cases and other test artifacts like the test data, data validation, harness scripts and automated scripts.
      • Backend database testing in Microsoft SQL environment including validating stored procedures, functions, tables, and views.
      • Standing up server environments that will be used for testing.
    • Within 6 months, the following will be expected to have been accomplished:
      • Demonstrate true ownership of product area and become a reliable point of contact for the company.
      • Execute and evaluate manual or automated test cases and reporting test results using a formal bug tracking software.
      • Isolating, replicating, and reporting defects and verifying defect fixes

    STEALTHbits Technologies is an Equal Opportunity Employer

    Hawthorne, NJ

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Sales Engineer

    We’re currently looking for smart, enthusiastic people with a passion for helping customers address complex security challenges.

    A Sales Engineer’s responsibilities include conducting sales presentations, performing software evaluations, and developing strong business justifications. Sales Engineers must have the aptitude to develop an expert understanding of STEALTHbits products.

    Responsibilities:

    • Conduct discussions, presentations, and demonstrations to understand the customer’s business and identify their key challenges
    • Implement STEALTHbits software, collect compelling data, and develop findings
    • Articulate the importance of addressing relevant security threats
    • Provide expert guidance to customers on how to secure credentials and data
    • Provide expert guidance to customers on relevant compliance standards

    Requirements:

    • A minimum of four years of relevant Sales Engineering experience
    • Strong knowledge of Windows Server, NTFS permissions, Microsoft Exchange, Active Directory
    • Experience in Active Directory security
    • Knowledge of AD attack methods such as ntds.dit extraction
    • Strong background in SQL
    • Ability to communicate effectively with a wide variety of technical and non-technical audiences such as executives and practitioners across Security, IT, Legal, Compliance, etc.

    STEALTHbits Technologies is an Equal Opportunity Employer

    United Kingdom

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Virtual/Remote

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Senior Developer

    STEALTHbits Technologies is a leading provider of data security solutions. For over a decade, STEALTHbits Technologies has been enabling organizations large and small to secure their data, prevent advanced attacks, and detect malicious insider activity.

    Grow your career out of our Madison, Wisconsin office, with its casual, yet focused atmosphere where you will collaborate with colleagues in one of the smartest US cities to live in. After hours, enjoy the state's capital city that still maintains its small, college town feel.

    We are looking for an experienced lead developer to join our development team and help us continue to set the standard for data security around the world. Come join an existing team of engineers to design and develop a large-scale, distributed application to help some of the world's largest organizations monitor access to their sensitive data and identify threats in real time. Work amongst a highly collaborative team of architects, developers, quality assurance engineers and product managers. Leverage C# and similar Microsoft technologies for real-time data processing. Work with open source communities to commit code, review code, and drive enhancements.

    Responsibilities:

    • Work with development team to write, develop and maintain high-quality components using C#, and other .NET technologies for the StealthAUDIT product and other DAG products
    • Interact with cross-functional product teams (Quality Assurance, Engineering, Customer Support, etc.,) for product development efforts
    • Participate in development by actively writing code, conducting unit testing, performing code reviews
    • Analytical thinking and diagnostic skills capable of understanding and solving complex problems
    • Ability to clearly and concisely articulate technical subject matter both written and verbally

    Experience:

    • 7+ years strong programming experience
    • Experience developing Windows software with Visual Studio utilizing Windows Forms/.NET and Native Win32 API/C/C++
    • Hands-on experience developing .NET software on Windows platforms
    • Experience in agile development methodologies, including scrum, unit testing, refactoring, and test automation
    • Proven track record for producing quality code in production software

    Preferences:

    • Experience with Microsoft SQL Server and database programming
    • Experience with the Box, Dropbox and OneDrive API toolsets
    • Can learn complex technical materials quickly
    • Have a strong grasp of troubleshooting concepts
    • Work effectively and deliver results under tight deadlines
    • Bachelor's in Computer Science or related field and/or equivalent directly related working experience.
    • Minimum of two to four years of relevant job experience

    STEALTHbits Technologies is an Equal Opportunity Employer

    Hawthorne, NJ

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Madison, WI

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Software Architect

    STEALTHbits Technologies is a leading provider of data security solutions. For over a decade, STEALTHbits Technologies has been enabling organizations large and small to secure their data, prevent advanced attacks, and detect malicious insider activity.

    We are looking for an experienced lead developer to join our development team and help us continue to set the standard for data security around the world. Come join an existing team of engineers to design and develop a large-scale application to help some of the world’s largest organizations identify security issues. Work amongst a highly collaborative team of architects, developers, quality assurance engineers and product managers.

    Requirements:

    • • 10+ years development experience.
    • 3+ years in a technical leadership role.
    • Experience designing and building windows applications in a rapid development environment.
    • Proficient in all of the following technologies: C/C++, C#, COM, Windows Forms, Win32, Multithreading
    • Ability to mentor provide technical leadership to software developers.
    • Experience using Test Driven Development, Continuous Integration, and Test Automation.
    • Ability to assess rapidly changing technologies and apply them to business needs.
    • Excellent analytical and technical skills; proven planning, leadership and organizational skills.
    • Demonstrated skills in both big-picture strategic activities and detail-oriented tactical activities.
    • History of open source contributions is a plus.

    Responsibilities:

    • Design, architect and build our StealthAUDIT platform
    • Act as the technical lead engineer for the platform
    • Document and execute the architecture vision
    • Perform troubleshooting and debugging of the system
    • Coordinate transition of legacy code to new technologies
    • Provide requirements and oversight to a team of engineers to execute on the designed architecture
    • Work closely with architecture and management teams to drive requirements and overall project success

    STEALTHbits Technologies is an Equal Opportunity Employer

    Madison, WI

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Hawthorne, NJ

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Virtual / Remote

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Systems Engineer

    STEALTHbits Technologies is a data security software company focused on protecting an organization’s credentials and sensitive information. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements and decrease operations expense.

    Identify threats. Secure data. Reduce risk.

    We are looking for a Strategic Account Executive to join our sales team. The ideal candidate will be located in our Hawthorne, NJ office.

    Responsibilities:

    • Actively selling into large, complex, Fortune 250 companies
    • Following up on inbound leads and referrals
    • Forecasting and closing business
    • Developing and driving selling campaigns into strategic accounts – both existing customers, and new prospect accounts
    • Developing and executing on sales strategies

    What You Can Expect:

    • An evolving, high energy, fast-paced environment
    • To earn commission
    • To learn a lot about strategic software sales
    • Products and solutions that customers need and want
    • Competitive salary and commission
    • Opportunity for career growth

    What We Expect:

    • Someone who is eager to learn, succeed and grow
    • A competitive nature

    Desired Skills and Experience:

    • 4-6 years sales experience
    • Software sales background strongly preferred
    • Excellent verbal and written communication skills
    • Ability to work in a team
    • Self-motivated
    • Knowledge of Microsoft infrastructure management tools is preferred

    Benefits:

    • Medical & life Insurance
    • Flexible Spending
    • 401k Plan
    • Competitive base salary, and commission structure

    STEALTHbits Technologies is an Equal Opportunity Employer

    Hawthorne, NJ

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Systems Engineer

    The function of a Systems Engineer at STEALTHbits is to implement and support STEALTHbits' products in client environments, with a focus on use cases that support auditing and compliance. In particular, the Systems Engineer's key mission is to work with clients and Account Managers to understand each clients' unique needs and environment to ensure the successful implementation of STEALTHbits' products, including the design, development, and delivery of custom reports to satisfy end user requirements.

    Responsibilities:

    • To provide excellent service, including subject matter expertise, a positive attitude, and problem solving abilities
    • To provide technical guidance for STEALTHbits Technologies' auditing and compliance products
    • To identify customer requirements and to participate in technical discussions for how STEALTHbits can answer those requirements
    • To conduct product installations and customizations of STEALTHbits' products for customers' IT personnel and managers
    • To conduct product training and knowledge transfer to customers and channel partners
    • To build up and maintain relationships with client's technical decision makers
    • To manage client engagements from a project perspective, as well as provide and maintain any project management documentation

    Experience:

    • B.A./B.S. in a technical field, with a preference for CS/CIS or higher qualifications
    • A minimum of two years of relevant technical experience. Experience in a Professional or Managed Services role will be a strong added qualification.
    • Excellent presentation, analytical, and problem solving skills
    • Demonstrated ability to successfully support procurement activities (i.e. Hardware and Architecture Recommendations)
    • Good knowledge of Windows Operating Systems, Microsoft Exchange, Active Directory, and various UNIX/Linux platforms
    • Good communication skills in English (written and verbal)
    • Experience supporting enterprise software applications
    • Team oriented and self-motivated
    • Strong database SQL experience

    Additional Preferred Experience:

    • Working knowledge of Active Directory, File System, SharePoint, Microsoft Exchange, SSL, Linux-based servers, LDAP-based directories, firewalls & network protocols, web-based applications
    • Experience with enterprise auditing and compliance regulations and the tools required to address them
    • Experience in heterogeneous environments with UNIX, Linux, mainframes, etc.
    • Experience with virtualization software (VMWare, etc.)
    • Experience with writing stored procedures or Shell scripting
    • Experience with Access management and Enterprise access governance. Background in programming, scripting or QA experience

    STEALTHbits Technologies is an Equal Opportunity Employer

    United Kingdom

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Virtual/Remote

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • United Kingdom / Ireland Account Executive

    STEALTHbits Technologies is looking for an Account Executive for the UK/I Region with a successful track record selling enterprise security software.

    Responsibilities:

    • Actively selling into a geographical territory in the UK/I region
    • Working closely with existing value add partners in the region and recruiting appropriate new partners
    • Fostering relationships inside existing customer accounts, in search of up-sell opportunities and to ensure consistent renewals
    • Following up on inbound leads and referrals
    • Forecasting and closing business
    • Developing and driving selling campaigns into strategic accounts - both existing customers, and new prospect accounts
    • Developing and executing on sales strategies

    What You Can Expect:

    • An evolving, high energy, fast-paced environment
    • The opportunity to earn significant commission
    • To learn a lot about strategic software sales
    • Products and solutions that customers need and want

    What We Expect:

    • Someone who is based in the UK (ideally commutable to our Farnborough, Hants office)
    • Someone who is eager to learn, succeed and grow
    • A competitive nature
    • A strong desire to close business
    • A strong drive for customer satisfaction

    Experience:

    • Track record of sales success in the region
    • Software sales background strongly preferred
    • Excellent verbal and written communication skills
    • Self-motivated
    • Knowledge of Microsoft infrastructure management tools is a bonus

    STEALTHbits Technologies is an Equal Opportunity Employer

    United Kingdom

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Ireland

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • VP, Research & Development

    STEALTHbits Technologies is a leading provider of data security solutions. For over a decade, STEALTHbits Technologies has been enabling organizations large and small to secure their data, prevent advanced attacks, and detect malicious insider activity.

    We’re looking for a hands-on software engineering leader to help us build the team and software that will continue to set the standard for data security around the world. Come lead an existing team of engineers to design and develop a large-scale application to help some of the world’s largest organizations identify security issues. Work amongst a highly collaborative team of architects, developers, quality assurance engineers and product managers.

    What does an ideal Vice President of Research & Development candidate look like? You have demonstrated strong technical, project management, and leadership skills by leading a team of software engineers to develop products used by some of the biggest companies in the world. You love attracting and growing high-caliber talent, and have a track record to prove it.

    Responsibilities:

    • Build and manage a team of highly skilled engineers
    • Oversee the technical on-time product delivery based on agreed upon requirements
    • Work closely with architecture and management teams to drive requirements and overall project success

    Requirements:

    • Bachelor’s degree in Computer Science, Computer Engineering or related technical discipline
    • 5+ years development experience
    • 5+ years in a development leadership role
    • Experience with Agile, OOD and other software development best practices
    • A deep understanding of software development in a team environment, and a track record of shipping software on time
    • A proven track record of building, and developing high performing engineering teams
    • Strong business and technical vision
    • A passion for people management and mentorship
    • Exceptional customer relationship skills
    • Deep hands-on technical expertise
    • Strong verbal and written communication skills
    • Strong analytic and problem solving skills

    STEALTHbits Technologies is an Equal Opportunity Employer

    Hawthorne, NJ

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Virtual / Remote

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Technical Product Manager

    STEALTHbits Technologies is a leading provider of data security solutions. For over a decade, STEALTHbits Technologies has been enabling organizations large and small to secure their mission-critical assets, satisfy audit requirements, automate tedious, time-consuming tasks, and consolidate their expensive, disjointed point products through a single, powerful, integrated platform.

    We are looking for a technical product manager to join our product team and help us continue to set the standard for data security around the world. This person will take ownership of key solutions within an existing product line. This person will be expected to work closely with management, engineering and quality assurance to develop and deliver on an exciting product roadmap.

    Responsibilities:

    • Serve as Product Owner for a Scrum Team, drive feature development and prioritization of the product roadmap and backlog
    • Write product requirements and work with development to deliver on those plans
    • Know and understand the market and product positioning
    • Create product marketing collateral that may be leveraged by the company
    • Work with senior leadership, software development and engineering to implement new products or features
    • Be a subject matter expert on the product's business and determine competitive landscape
    • Exhibit thought leadership both internally and externally
    • Serve as the product representative to Sales, Marketing, Senior Management and other internal teams
    • Serve as the product representative to customers in determining needs and communicating value propositions
    • Work in a collaborative and team-oriented environment
    • Manage relationships with key technology partners

    Requirements:

    • Degree in Computer Science or equivalent work experience
    • Strong project management background
    • Experience with Windows Server, Active Directory, SharePoint and SQL Server a plus
    • 3+ years of experience at a software company in a similar role a plus

    STEALTHbits Technologies is an Equal Opportunity Employer

    Hawthorne, NJ

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Madison, WI

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Virtual / Remote

    This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Senior Technical Writer

    STEALTHbits is a data security software company. We help organizations ensure the right people have the right access to the right information. By giving our customers insight into who has access and ownership of their unstructured data, and protecting against malicious access, we reduce security risk, fulfill compliance requirements, and decrease operations expense.

    We are looking for a full-time Senior Technical Writer to document products and solutions and work as part of a talented team spread across multiple US offices. He or she should have proven experience with technologies and be a true user advocate.

    Responsibilities:

    • Researches, outlines, writes, and edits new and existing content with a minimum of supervision
    • Independently gathers information from subject matter experts
    • Leads documentation projects and provides status to manager
    • Follows department guidelines and editorial standards

    Basic Qualifications:

    • Bachelor’s degree with 5-8 years’ experience developing technical documentation
    • Master’s degree with 3 years’ experience

    Preferred Skills:

    • Superior writing and communication skills
    • Good interpersonal skills
    • Good organizational skills
    • Flexibility
    • Attention to detail

    Technical and Technical Writing Skills:

    • Technically savvy
    • Understanding of software concepts
    • Strong working knowledge of content development
    • Familiarity with style guides
    • Solid usability experience
    • Experience gleaning information from subject matter experts

    Application Skills:

    • Microsoft® Office (especially Word)
    • Screen capture tool

    Management Skills:

    • Experience leading technical documentation projects
    • Experience working with a senior-level documentation team, including both conducting and receiving constructive peer review

    STEALTHbits Technologies is an Equal Opportunity Employer

    Hawthorne, NJ

    This email address is being protected from spambots. You need JavaScript enabled to view it.

    Virtual/Remote

    This email address is being protected from spambots. You need JavaScript enabled to view it.

What Our Employees Say

  • Nick Nieves

    STEALTHbits provides an exciting and dynamic workplace, continually challenging me to grow in my career and expand my skill set. Each day, I look forward to delivering solutions to the complex security issues in organizations and industries all over the world - while working with some of the brightest minds in the industry at STEALTHbits.”

    - Nick Nieves, Solution Engineer

  • Kevin Horvatin

    STEALTHbits values my contributions and pushes me to be my best while providing a relaxed, yet professional environment.”

    - Kevin Horvatin, Software Architect

Press Releases

Events

  • Active Directory Permissions Audits – What You Need To Know

    With data privacy regulations top of mind, permission management and governance on file systems and other data repositories has come into focus. However, all identity and group membership used to validate access goes through Active Directory. Active Directory has its own detailed set of often overlooked or under managed permissions which must also be properly governed.

    In this webinar, Fred Pinkett, VP of Product Strategy will review Active Directory permissions, how they work, what you need to report to keep your data safe, and how to keep your regulatory audits clean.

    Participants will learn:

    • How Active Directory permissions can be audited
    • What Active Directory permissions to audit
    • How the adversary can take advantage of poorly managed Active Directory permissions
    • Date: Wednesday, May 23rd, 2018
    • Time: 11:00 AM EDT
    • Presenters:
      • Fred Pinkett - VP of Product Strategy

    Storage Reclamation Across a Distributed Environment

    The Enterprise Strategy Group (ESG) estimates that the annual cost of storage is $4,025 per terabyte. Organizations are finding that more than 60% of all stored data is inactive and with storage rates growing at 50%-80% a year that can become costly. By identifying and removing old data from file systems, file shares, and collaboration sites, organizations can reduce cost.

    In this webinar, Ian Andersen, VP of Professional Services will cover why Storage Reclamation is important and the risk and reward when executed properly.

    Participants will learn:

    • Identify data owners
    • Assess and prioritize data structures
    • Mitigate risks associated with clean up
    • Clean up data structures
    • Measure process
    • Date: Wednesday, May 30th, 2018
    • Time: 11:00 AM EDT
    • Presenters:
      • Ian Andersen - VP of Professional Services

    Automation – The Key to Achieving a Least Privilege Access Model Across Your Network File Shares

    The basis of any Data Access Governance program is a clean consistent permissions model for least-privilege access.

    Correcting inappropriate access across all of your network file shares might sound daunting. In this session, Adam Rosen, VP of Sales Engineering, will walk through a five step plan to ensure your organization has its data properly secured. At the end of the webinar, you will know how to survey your organization’s data, how to focus attention where it matters most, where to get the right stakeholders involved, when to review and remediate access, and how to arrive at a working security model to meet both security and compliance needs.

    In this webinar, Adam will cover how automation is the key to achieving and maintaining least privilege access controls.

    Participants will learn:

    • What classifies as unstructured data
    • What is the scope of the problem
    • Why controlling unstructured data is critical
    • How automation can help
    • How to build a successful Data Access Governance (DAG) program
    • Date: Wednesday, June 6th, 2018
    • Time: 11:00 AM EDT
    • Presenters:
      • Adam Rosen - VP of Sales Engineering
                  Register Now
  • Active Directory Management & Security

    Active Directory is leveraged by over 90% of organizations worldwide as the authentication and authorization hub of their IT infrastructures. Containing the vast majority of user credentials within any business - and the most important ones too - it’s no wonder why AD is a primary target in virtually every breach scenario.

    Active Directory’s complexity leaves it prone to misconfiguration, exposing it to unnecessary security risk. Adding insult to injury, most organizations lack the resources to monitor AD properly and protect it from modern attacks, let alone enforce security policies that prevent self-inflicted risks like the abuse of privileged credentials.

    Join STEALTHbits for a live, technical webinar and we’ll demonstrate how our Active Directory Management & Security suite of solutions is the most comprehensive and capable in the industry. In less than 60 minutes, we’ll cover how we:

    • Inventory all objects, policies, and configurations to obtain a complete view of Active Directory’s footprint
    • Analyze relationships between objects, permissions, privileged access rights, and toxic and vulnerable conditions to prioritize risks and remediation efforts
    • Clean up stale and unneeded objects to limit risk and unnecessary exposure, as well as ease the administrative burden
    • Monitor changes, access, and queries to and against critical objects, attempts to compromise credentials, achieve persistence, and circumvent security controls
    • Protect critical objects from unauthorized change or access, identify and remediate easily compromised accounts, and follow best practices designed to prevent credential abuse and privilege escalation

    Active Directory is secure when it’s clean, understood, configured properly, monitored closely, and controlled tightly. Register now and we’ll show you how.

    • Date/Time:
      • Click Registration Button For More Details

    Threat Analytics

    Despite significant investments made in perimeter, network, and endpoint defenses, organizations still don’t have adequate resources to understand or address all the different threats they face. Most organizations continue to struggle with foundation-level security best practices, resulting in reduced effectiveness of the other investments they’ve made. Furthermore, the volume of events produced by native logging is overwhelming, making the data difficult to consume, and the inadequacy of the data produced by native logging makes the data even more difficult to understand.

    Join STEALTHbits for a live, technical webinar and we’ll demonstrate how our Threat Analytics suite of solutions empower and enrich all the other efforts and investments you’ve made by addressing root cause issues that affect their effectiveness. In less than 60 minutes, we’ll cover how we:

    • Surface, evaluate, and subsequently limit privileged access rights to reduce an attackers ability to move laterally and compromise credentials
    • Assess and remediate conditions and misconfigurations across systems, data, and applications that attackers use to compromise credentials and circumvent security controls
    • Monitor user behavior and prevent violations of security policy and attempts to compromise data and credentials, mitigating successful breach scenarios
    • Baseline configurations and continually assess adherence to desired standards across all applicable assets
    • Integrate data, alerts, context, and intelligence with appropriate technologies to increase the value and ROI in existing investments

    Threat Analytics is more than analyzing user behavior and pretty dashboards. It’s about proactively understanding the threats against your various assets, where vulnerabilities exist that those threats exploit, and employing detection, protection, and mitigation controls to neutralize threats and reduce risk. Register now and we’ll show you how.

    • Date/Time:
      • Click Registration Button For More Details

    Data Access Governance

    Across unstructured and structured data repositories in organizations of every shape and size, user access rights and permissions to data are excessive, the location of sensitive data is largely unknown, and managing it all is highly complex and error-prone.

    Given that data is the primary target in virtually every breach scenario and external pressures to secure company and customer data are only increasing due to existing and new regulations, third-party demands, and customer concerns, it’s no wonder why the subject of data security has risen all the way to the boardrooms of organizations worldwide.

    Join STEALTHbits for a live, technical webinar and we’ll demonstrate how our full-featured Data Access Governance (DAG) platform can help you achieve real results through a proven process. In less than 60 minutes, we’ll cover how we:

    Participants will learn:

    • Discover where data lives to obtain a complete view of your data footprint
    • Collect & Analyze relevant data points to answer critical questions (e.g. data sensitivity, access, permissions, ownership, age, etc.)
    • Monitor activity to understand user interactions with data
    • Restructure access to achieve Least Privilege principles and position the environment for effective governance
    • Govern access ongoing to ensure security, compliance, and operational standards are met

    Data Access Governance (DAG) is about making access to data exclusive. Register now and we’ll show you how.

    • Date/Time:
      • Click Registration Button For More Details

  • ISC2 Cleveland Chapter

    • When: May 29th, 2018
    • Where: Cleveland, OH

    AusCERT Cyber Security Conference
    • When: May 31st, 2018
    • Where: Gold Coast, Australia
    Gartner Information Security & Risk Management Conference 2018
    • When: June 4th, 2018
    • Where: National Harbor, MD

    Attend Event


    Executive Dinner Summit
    • When: June 12th, 2018
    • Where: Amherst, Massachusetts
    Microsoft Ignite
    • When: September 24th-28th, 2018
    • Where: Orlando, FL

    Attend Event

    Gartner IAM
    • When: December 3rd-5th, 2018
    • Where: Las Vegas, NV

    Attend Event

  • Active Directory Solutions

    On-Demand Product Demos

    Learn More

    Data Access Governance Solutions

    On-Demand Product Demos

    Learn More

    StealthINTERCEPT Active Directory Firewall

    On-Demand Product Demos

    Learn More

  • 3 Modern Active Directory Attack Scenarios and How to Detect Them with Randy Franklin Smith

    On-Demand Webinar

    Learn More


    4 Active Directory Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More


    4 Active Directory Password Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More

    4 Attacks that Exploit Active Directory Permissions and How to Protect Against Them

    On-Demand Webinar

    Learn More


    4 Service Account Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More

    5 Challenges Combining Data and Privileged Access Governance with IAM

    On-Demand Webinar

    Learn More


    5 Steps for Cleaning up Active Directory

    On-Demand Webinar

    Learn More


    5 Steps for Setting up File Activity Monitoring on Storage Devices

    On-Demand Webinar

    Learn More

    5 Steps to Building a Successful Data Access Governance Program to Control Unstructured Data

    On-Demand Webinar

    Learn More


    5 Steps to Faster GDPR Compliance

    On-Demand Webinar

    Learn More


    5 Steps to Faster GDPR Compliance for US Companies

    On-Demand Webinar

    Learn More

    5 Ways to Improve Active Directory and Operating System Security in 2017

    On-Demand Webinar

    Learn More



    7 Steps to EU GDPR Compliance

    On-Demand Webinar

    Learn More

    10+ Up-To-Date Ways to Harden Windows Against Modern Active Directory Attacks with Randy Franklin Smith

    On-Demand Webinar

    Learn More



    A Countdown to Compliance - The EU GDPR Time Bomb Part 1

    On-Demand Webinar

    Learn More

    Active Directory Botnets & DACL Backdoors

    On-Demand Webinar

    Learn More

    Active Directory Migration Planning and Assessment

    On-Demand Webinar

    Learn More

    Advanced Threat Detection with StealthINTERCEPT

    On-Demand Webinar

    Learn More

    Announcing the NEW STEALTHbits File Activity Monitor

    On-Demand Webinar

    Learn More

    Announcing the New StealthINTERCEPT

    On-Demand Webinar

    Learn More

    Attacking Microsoft SQL Server Databases

    On-Demand Webinar

    Learn More

    Best Practices for Auditing Active Directory

    On-Demand Webinar

    Learn More

    Best Practices for Privileged Local Account Auditing

    On-Demand Webinar

    Learn More

    Big Advancements in Data Access Governance - StealthAUDIT 8.0

    On-Demand Webinar

    Learn More


    China's New Cybersecurity Law

    On-Demand Webinar

    Learn More


    Clean Up Active Directory Once and for All

    On-Demand Webinar

    Learn More

    Closing the Door on Today's Threats with StealthINTERCEPT and RSA Security Analytics

    On-Demand Webinar

    Learn More

    Come Learn About our MVP Award Winning Data Access Governance Solution

    On-Demand Webinar

    Learn More


    Don't be the Next Ransomware Headline

    On-Demand Webinar

    Learn More


    EU GDPR - You have Question, We have Answers

    On-Demand Webinar

    Learn More

    Extend IAM into Unstructured Data and Privileged Access Management with STEALTHbits and Thycotic

    On-Demand Webinar

    Learn More


    Extending IAM into Unstructured Data

    On-Demand Webinar

    Learn More


    Extending SailPoint IdentityIQ into Unstructured Data

    On-Demand Webinar

    Learn More

    Fast, Safe AD Rollback and Recovery: An Insider's Look at StealthRECOVER

    On-Demand Webinar

    Learn More


    Feed Your Qradar® Intelligence, Not Just Data

    On-Demand Webinar

    Learn More


    File Activity Monitoring with STEALTHbits

    On-Demand Webinar

    Learn More

    Get Control of Active Directory with STEALTHbits

    On-Demand Webinar

    Learn More

    Getting Ahead of the IAM Game with a Clean AD

    On-Demand Webinar

    Learn More

    Governing Access to Unstructured Data with the AIC

    On-Demand Webinar

    Learn More

    How Attackers Are Using Mimikatz to Steal Your Credentials

    On-Demand Webinar

    Learn More

    How Important is Active Directory to Successful IAM?

    On-Demand Webinar

    Learn More

    How to Protect Against File System Attacks

    On-Demand Webinar

    Learn More

    How to Protect Against Ransomware with the Shadow Brokers Vulnerability Utility

    On-Demand Webinar

    Learn More


    International Traffic in Arms Regulations (ITAR) Compliance

    On-Demand Webinar

    Learn More


    Introducing StealthDEFEND: Purpose-Built UEBA

    On-Demand Webinar

    Learn More

    Keeping Cloud Security Grounded

    On-Demand Webinar

    Learn More

    Learn How to Protect Sensitive Data - A High Value Target for Hackers

    On-Demand Webinar

    Learn More

    Lock Down Your Local Administrators

    On-Demand Webinar

    Learn More


    Making Open Access Compliant and Secure

    On-Demand Webinar

    Learn More


    Managing Enterprise Storage Systems with StealthAUDIT

    On-Demand Webinar

    Learn More

    No Longer the Same Check Boxes - Achieving Compliance and Data Security with EU GDPR

    On-Demand Webinar

    Learn More

    Obtaining Visibility and Control when Outsourcing AD Operations

    On-Demand Webinar

    Learn More

    PCI-DSS Compliance - More Than Just Staying out of the Headlines

    On-Demand Webinar

    Learn More

    Pragmatic Approaches to Advanced Threat Detection and Data Security

    On-Demand Webinar

    Learn More

    Proactive Threat Hunting – How To Secure Active Directory and Incorporate File Activity Monitoring

    On-Demand Webinar

    Learn More

    Preventing Outsiders from Becoming Insiders - Moving Beyond Change Auditing

    On-Demand Webinar

    Learn More


    Preventing SharePoint from Becoming ScarePoint

    On-Demand Webinar

    Learn More


    Protecting Exchange from the Insider Threat

    On-Demand Webinar

    Learn More

    Ransomware 101: Understand, Detect, and Minimize the Risk to Your Business

    On-Demand Webinar

    Learn More


    Recovering from Active Directory Disasters – StealthRECOVER v1.1

    On-Demand Webinar

    Learn More

    Secure Your Organization's Sensitive Data with STEALTHbits

    On-Demand Webinar

    Learn More

    Seven Critical Security Activities to Monitor in Active Directory

    On-Demand Webinar

    Learn More

    Solving SIEM's File Activity Monitoring Blind Spot

    On-Demand Webinar

    Learn More


    StealthAUDIT Expands to Structured Data and more with StealthAUDIT v8.1

    On-Demand Webinar

    Learn More


    StealthDEFEND: Leveraging Behavioral Analytics to Reduce Insider Threat

    On-Demand Webinar

    Learn More

    Systematically Identifying Absolutely Every Privileged User and Detecting New Ones with Randy Franklin Smith

    On-Demand Webinar

    Learn More

    The 2018 Data Security Agenda: Mastering Your Data Security Privacy Practices

    On-Demand Webinar

    Learn More


    Top Causes of Security Breaches in 2016

    On-Demand Webinar

    Learn More


    Trust is Not an Effective Security Control for Privileged Access

    On-Demand Webinar

    Learn More

    Understanding the Sony Breach - How STEALTHbits Could Have Prevented the Sony Hack

    On-Demand Webinar

    Learn More


    What You Need to Know About NYCRR 500

    On-Demand Webinar

    Learn More


    What's New in StealthAUDIT v7.2?

    On-Demand Webinar

    Learn More

    What's New in StealthINTERCEPT v4.0?

    On-Demand Webinar

    Learn More

    Why We Won the Beacon Award

    On-Demand Webinar

    Learn More

    Workshop: CCSI & STEALTHbits’ Break Down 23 NYCRR 500

    On-Demand Webinar

    Learn More

Awards and Recognition

STEALTHbits has earned several leading industry awards and has been named in Gartner’s Cool Vendors in Security Report.