About Us

IDENTIFY THREATS. SECURE DATA. REDUCE RISK.

Stealthbits Technologies, Inc. is a customer-driven cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, our highly innovative and infinitely flexible platform delivers real protection that reduces security risk, fulfills compliance requirements, and decreases operational expense.

Watch Video

 

The Companies You Trust, Trust Us

AstraZeneca Logo
Credit Suisse Logo
John Deere Logo
Disney Logo
NBC Universal Logo

Management Team

Steve Cochran - Chief Executive Officer (CEO)

Steve Cochran

Founder, CEO
Nick Mansour - Chief Operating Officer

Nick Mansour

Chief Operating Officer
Jeff Warren - General Manager, Products

Jeff Warren

General Manager, Products
Adam Laub - Senior Vice President, Product Management

Adam Laub

Chief Marketing Officer
Jill Twomey - Director of Finance

Jill Twomey

Vice President, Finance
Larry Kraft, SVP, Global Channel & Alliances

Larry Kraft

SVP, Global Channel & Alliances
 
Gerrit Lansing, Field CTO

Gerrit Lansing

Field CTO

Steve Cochran

Founder, CEO

Steve Cochran is the CEO for Stealthbits Technologies. He has served as CEO since his founding of the company in 2001. Steve has guided the organization from its inception to eleven consecutive years of profitability and growth.

He has had a successful 20-year career in the software industry, holding senior management positions and leading the Change Management business unit at Quest Software prior to founding Stealthbits. Steve was also instrumental in the success and growth of Quest Software; an organization of less than 100 employees when he began.

Nick Mansour

Chief Operating Officer

Nick Mansour is Stealthbits’ Chief Operating Officer (COO). As COO, Nick is responsible for all day-to-day global operations, customer facing functions and go-to-market strategy. With over 19 years of experience leading sales management, marketing and customer success organizations for high growth software companies. Specialized in developing markets, implementing channel/technical alliance strategies and driving sales strategy for worldwide growth.

Adam Laub

Chief Marketing Officer

Adam Laub is Stealthbits Technologies’ Chief Marketing Officer (CMO). As CMO, Adam is responsible for corporate marketing, communications and AR/PR, demand generation, product marketing, events, and marketing operations. Additionally, he and his team participate heavily in setting product strategy, defining future roadmap, driving strategic sales engagements, supporting demand generation activities, enabling the sales organization, and all aspects of product evangelism.

Since joining Stealthbits in 2005, Adam has held multiple positions within the organization, including Sales, Marketing, Product Management, and Operational Management roles.

Adam holds a Bachelor of Science degree in Business Administration from Susquehanna University, Selinsgrove, PA.

Jeff Warren

General Manager, Products

Jeff Warren is Stealthbits’ General Manager of Products. Jeff has held multiple roles within the Technical Product Management group since joining the organization in 2010, initially building Stealthbits’ SharePoint management offerings before shifting focus to the organization’s Data Access Governance solution portfolio as a whole. Before joining Stealthbits, Jeff was a Software Engineer at Wall Street Network, a solutions provider specializing in GIS software and custom SharePoint development.

With deep knowledge and experience in technology, product and project management, Jeff and his teams are responsible for designing and delivering Stealthbits’ high quality, innovative solutions.

Jeff holds a Bachelor of Science degree in Information Systems from the University of Delaware.

Jill Twomey

Vice President, Finance

Jill Twomey is the Vice President of Finance for Stealthbits Technologies and has over 25 years of experience in accounting positions. Prior to joining Stealthbits in September 2005, Jill was the Controller for both PGI, Inc. and Arcadian Healthcare, Inc. She is responsible for all Accounting, Legal, and Human Resources in the organization. She holds a Bachelor of Science degree in Accounting from the University of Rhode Island.

Larry Kraft

SVP, Global Channel & Alliances

Larry Kraft is Stealthbits’ SVP, Global Channels and Alliances. Larry is responsible for all day-to-day global partnering initiatives and is responsible for the company’s overall partner go-to-market strategy. He brings over 20+ years of experience leading sales, channel, corporate development and marketing teams for high-growth software companies including SecureAuth, Exact, NComputing, and Quest Software.

Larry holds dual Bachelor of Business Administration degrees in Commercial Real Estate and Marketing from the University of Cincinnati.

Gerrit Lansing

Field CTO

Gerrit Lansing is Stealthbits’ Field CTO. In his role, Gerrit leads strategic initiatives to improve customer engagement and Stealthbits’ products and positioning. He brings with him over a decade of experience in information security, with a focus on identity and privileged access management. Prior to joining Stealthbits, he started his career as an Information Security Analyst at Liberty Mutual before joining CyberArk Software where he held multiple roles including Director of Consulting Services and Chief Architect.

Gerrit holds a Bachelor of Arts in Administrative Science from Colby College in Waterville, ME.

We can not only detect the attack as its happening, but we can pinpoint the affected machines right away, accelerating remediation and recovery efforts. All this capability comes out-of-the box, without installing agents on endpoints, or employing an army of analysts peeling through logs.”

- Global Energy Company

Careers - Current Open Positions

We are always looking for talented, motivated individuals who want to make a difference in our customers' lives with award-winning solutions.

What Our Employees Say

  • Nick Nieves

    STEALTHbits provides an exciting and dynamic workplace, continually challenging me to grow in my career and expand my skill set. Each day, I look forward to delivering solutions to the complex security issues in organizations and industries all over the world - while working with some of the brightest minds in the industry at STEALTHbits.”

    - Nick Nieves, Solution Engineer

  • Kevin Horvatin

    STEALTHbits values my contributions and pushes me to be my best while providing a relaxed, yet professional environment.”

    - Kevin Horvatin, Software Architect

Press Releases

Events

  • Stealthbits Technologies Corporate Overview

    Stealthbits Technologies, Inc. is a customer-driven cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, our highly innovative and infinitely flexible platform delivers real protection that reduces security risk, fulfills compliance requirements, and decreases operational expense.

    Join this informative session led by Stealthbits’ Chief Marketing Officer, Adam Laub, to learn about our mission, solutions, products, and why the world’s most notable brands rely on Stealthbits to secure their most valuable (and often most vulnerable) assets – credentials and data.

    Register today!

    Don’t miss it! If you are unable to attend, register to receive a recording after the live session.

    • Date: Tuesday, April 7, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Adam Laub
        CMO
        Stealthbits Technologies

    Reduce Your Lateral Movement Attack Surface with SbPAM 2.0!

    Stealthbits Technologies Inc, is proud to announce the release of the award-winning Stealthbits Privileged Activity Manager™ (SbPAM) 2.0!

    In SbPAM 2.0, we bring security enhancements coupled with a completely redesigned user experience. SbPAM’s third-generation approach to PAM offers unique security features that can replace or even enhance traditional vaulting solutions.

    Please join Stealthbits’ VP of Product Strategy, Martin Cannard, as he reviews and demonstrates how SbPAM 2.0 delivers on these key capabilities and more:

    - Reduce Your Attack Surface: SbPAM allows the use of transient identities to connect administrators to privileged tasks ensuring no standing privileges are left behind.

    - Bring-Your-Own-Vault: SbPAM can leverage existing password vaults, its own vault, or no vault at all. Support even provided for LAPs! No rip and replace exercise here.

    - Access Certification: Why export to another system? Built-in access certification workflow to verify or deny access for compliance is critical.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date: Thursday, April 9, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Martin Cannard
        VP of Product Strategy - Privileged Access Management
        Stealthbits Technologies

    Stealthbits' Data Access Governance Solution Overview

    Access and permissions to data are excessive and management is highly complex and error prone. The location of sensitive data is largely unknown (especially across unstructured data repositories) and is also the primary target in virtually every breach scenario. With increasing external pressures via existing and new regulations, 3rd party demands, and customer concerns, the need to gain control over data of all types has never been more dire.

    A well-executed Data Access Governance (DAG) program is the solution to the problem. DAG is about making access to data exclusive. It's about limiting the number of people who have access to data - and their permissions to data - to the lowest levels possible. Stealthbits' Data Access Governance solution provides organizations with the capabilities and approaches needed to identify, secure, and maximize the value of data wherever it resides.

    Join Ralph Martino, Stealthbits' VP of Product Strategy - Data Access Governance, as he reviews the difficult data security and privacy challenges organizations face today and how Stealthbits can help.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date: Tuesday, April 14, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Ralph Martino
        VP of Product Strategy - Data Access Governance
        Stealthbits Technologies

    Stealthbits' Active Directory Management & Security Solution Overview

    Active Directory (AD) is leveraged by over 90% of enterprises worldwide as the authentication and authorization hub of their IT infrastructure. AD contains the most critical credentials, which is why attackers have developed sophisticated attack tactics, techniques, and procedures that work with remarkable success. Active Directory’s inherent complexity leaves it prone to misconfiguration, exposing it to security risk that most organizations can’t handle due to the lack of resources necessary to monitor AD properly and protect it.

    Stealthbits believes AD is secure and efficient when it's clean, understood, configured properly, monitored closely, and controlled tightly. Our industry-leading suite of AD solutions enable organizations to effectively manage and secure AD at the levels required to mitigate the risks of advanced attacks, compliance failure, and operational outage.

    Join Rod Simmons, Stealthbits Technologies' VP of Product Strategy - Active Directory, as he reviews the many challenges organizations face in the management and security of AD and how Stealthbits can help.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date: Tuesday, April 21, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Rod Simmons
        VP of Product Strategy - Active Directory
        Stealthbits Technologies

    Stealthbits' Privileged Access Management Overview

    Privileged Access Management (PAM) tools have proven to be essential components of information security and compliance programs, yet privileged account compromise remains a nagging issue despite broad scale adoption of password vaults.

    Stealthbits' approach to Privileged Access Management fills the gaps and overcomes the challenges of traditional PAM solutions, providing comprehensive visibility into an organization's privileged account footprint, surgical control over privileged account usage, and the ability to effectively eliminate the sizable threat surface privileged accounts represent through the reduction of privileged accounts.

    Join Martin Cannard, Stealthbits Technologies' VP of Product Strategy - Privileged Access Management, as he outlines the challenges organizations face with traditional PAM tools and how Stealthbits can help.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date: Tuesday, April 28, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Martin Cannard
        VP of Product Strategy - Privileged Access Management
        Stealthbits Technologies
  • TechTalk

    • When: April 7th, 2020
    • Where: Kansas City, MO

    Attend Event

    TechTalk

    • When: May 12th, 2020
    • Where: New York, NY

    Attend Event

    TechTalk

    • When: May 13th, 2020
    • Where: Philadelphia, PA

    Attend Event

    Gartner 2020 NA Security & Risk Management Summit

    • When: June 1 - 4, 2020
    • Where: National Harbor, MD

    Register Now & Save $350 using code: SECSP224

    Attend Event

    InfoSecurity London 2020

    • When: June 2-4, 2020
    • Where: Olympia, London

    Attend Event

    TechTalk

    • When: June 16th, 2020
    • Where: Columbus, OH

    Attend Event

  • Stealthbits’ Active Directory Management and Security Solutions

    On-Demand Product Demos

    Learn More

    Stealthbits’ Data Access Governance Solutions

    On-Demand Product Demos

    Learn More

    Stealthbits' Privileged Access Management Solutions

    On-Demand Product Demos

    Learn More

  • Stealthbits Technologies Corporate Overview On-Demand Webinar

    On-Demand Webinar

    Learn More

    3 Modern Active Directory Attack Scenarios and How to Detect Them with Randy Franklin Smith

    On-Demand Webinar

    Learn More

    4 Active Directory Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More

    4 Service Account Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More

    10+ Up-To-Date Ways to Harden Windows Against Modern Active Directory Attacks with Randy Franklin Smith

    On-Demand Webinar

    Learn More

    Active Directory Botnets & DACL Backdoors

    On-Demand Webinar

    Learn More

    Anatomy of a Hack: How TEMP.Mixmaster Attackers Use TrickBot and Ryuk To Poach Big Game

    On-Demand Webinar

    Learn More

    Best Practices for Auditing Active Directory

    On-Demand Webinar

    Learn More

    CQURE’s Overview of STEALTHbits Cyber Kill Chain Attack Catalog

    On-Demand Webinar

    Learn More

    Detecting Pass-the-Hash Honeypots with Honeypots

    On-Demand Webinar

    Learn More

    Entitlement Reviews: The Secret Ingredient To A Successful Data Access Governance Program

    On-Demand Webinar

    Learn More

    FCW & STEALTHbits: The Problem with Privileged Access Management

    On-Demand Webinar

    Learn More

    International Traffic in Arms Regulations (ITAR) Compliance

    On-Demand Webinar

    Learn More

    Introducing STEALTHbits Privileged Activity Manager 1.2

    On-Demand Webinar

    Learn More

    Lateral Movement Techniques and How to Detect Them

    On-Demand Webinar

    Learn More

    PCI-DSS Compliance - More Than Just Staying out of the Headlines

    On-Demand Webinar

    Learn More

    Simple Worthwhile Database Security Practices

    On-Demand Webinar

    Learn More

    Storage Reclamation Across a Distributed Environment

    On-Demand Webinar

    Learn More

    What You Need to Know About NYCRR 500

    On-Demand Webinar

    Learn More

Awards and Recognition

Stealthbits has earned several leading industry awards and has been named in Gartner’s Cool Vendors in Security Report.

Free Risk Analysis Stealthbits' Credentials and Data Security Assessment is your Business-Justification-in-a-Box!x