About Us

STEALTHbits Technologies, Inc. is a cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements, and decrease operations expense.

Identify threats. Secure data. Reduce risk.

Watch Video

 

The Companies You Trust, Trust Us

AstraZeneca Logo
Credit Suisse Logo
John Deere Logo
Disney Logo
NBC Universal Logo

Management Team

Steve Cochran - Chief Executive Officer (CEO)

Steve Cochran

Founder, CEO
Jonathan Sander - Chief Technology Officer

Jonathan Sander

Chief Technology Officer
Carol Volk - Senior Vice President, Marketing & Product Management

Carol Volk

Senior Vice President, Marketing and Product Management
Adam Laub - Senior Vice President, Product Marketing

Adam Laub

Senior Vice President, Product Marketing
Jeff Warren - Senior Vice President, Technical Product Management

Jeff Warren

Senior Vice President, Technical Product Management
Jill Twomey - Director of Finance

Jill Twomey

Vice President, Finance

Steve Cochran

Founder, CEO

Steve Cochran is the CEO for STEALTHbits Technologies. He has served as CEO since his founding of the company in 2001. Steve has guided the organization from its inception to eleven consecutive years of profitability and growth.

He has had a successful 20-year career in the software industry, holding senior management positions and leading the Change Management business unit at Quest Software prior to founding STEALTHbits. Steve was also instrumental in the success and growth of Quest Software; an organization of less than 100 employees when he began.

Jonathan Sander

Chief Technology Officer

Jonathan Sander is STEALTHbits’ Chief Technology Officer (CTO). As CTO, he is responsible for driving technical innovation, ensuring that STEALTHbits is well positioned in their current and emerging markets, and he will also lead corporate development efforts. Jonathan also plays the role of evangelist at STEALTHbits venues large and small. Prior to STEALTHbits, Jonathan was VP of Product Strategy for Lieberman Software.

As part of Quest Software from 1999 through 2013, he worked with the security and ITSM portfolios. He helped launch Quest’s IAM solutions, directing all business development and product strategy efforts. Previous to that, Mr. Sander was a consultant at Platinum Technology focusing on the security, access control and SSO solutions. He graduated from Fordham University with a degree in Philosophy.

Carol Volk

Senior Vice President, Marketing and Product Management

Carol is the Senior Vice President of Marketing and Product Management at STEALTHbits. Her team’s areas of focus include corporate marketing, communications and AR/PR, demand generation, product marketing, events and marketing operations.

Prior to joining STEALTHbits, Carol held roles in Marketing, Product Management and Engineering for several software technology companies including Oracle, McAfee, RightNow Technologies, Voxware and Prudential Investments.

Carol holds a Bachelor of Science degree in Computer Science Engineering from Lehigh University.

Adam Laub

Senior Vice President, Product Marketing

Adam Laub is the Senior Vice President of Product Marketing at STEALTHbits Technologies. He is responsible for setting product strategy, defining future roadmap, driving strategic sales engagements, supporting demand generation activities, enabling the sales organization and all aspects of product evangelism.

Since joining STEALTHbits in 2005, Adam has held multiple positions within the organization, including Sales, Marketing, and Operational Management roles.

Adam holds a Bachelor of Science degree in Business Administration from Susquehanna University, Selinsgrove, PA.

Jeff Warren

Senior Vice President, Technical Product Management

Jeff Warren is STEALTHbits’ Senior Vice President of Technical Product Management. Jeff has held multiple roles within the Technical Product Management group since joining the organization in 2010, initially building STEALTHbits’ SharePoint management offerings before shifting focus to the organization’s Data Access Governance solution portfolio as a whole. Before joining STEALTHbits, Jeff was a Software Engineer at Wall Street Network, a solutions provider specializing in GIS software and custom SharePoint development.

With deep knowledge and experience in technology, product and project management, Jeff and his teams are responsible for designing and delivering STEALTHbits’ high quality, innovative solutions.

Jeff holds a Bachelor of Science degree in Information Systems from the University of Delaware.

Jill Twomey

Vice President, Finance

Jill Twomey is the Vice President of Finance for STEALTHbits Technologies and has over 25 years of experience in accounting positions. Prior to joining STEALTHbits in September 2005, Jill was the Controller for both PGI, Inc. and Arcadian Healthcare, Inc. She is responsible for all Accounting, Legal, and Human Resources in the organization. She holds a Bachelor of Science degree in Accounting from the University of Rhode Island.

We can not only detect the attack as its happening, but we can pinpoint the affected machines right away, accelerating remediation and recovery efforts. All this capability comes out-of-the box, without installing agents on endpoints, or employing an army of analysts peeling through logs.”

- Global Energy Company

Careers - Current Open Positions

We are always looking for talented, motivated individuals who want to make a difference in our customers' lives with award-winning solutions.

What Our Employees Say

  • Nick Nieves

    STEALTHbits provides an exciting and dynamic workplace, continually challenging me to grow in my career and expand my skill set. Each day, I look forward to delivering solutions to the complex security issues in organizations and industries all over the world - while working with some of the brightest minds in the industry at STEALTHbits.”

    - Nick Nieves, Solution Engineer

  • Kevin Horvatin

    STEALTHbits values my contributions and pushes me to be my best while providing a relaxed, yet professional environment.”

    - Kevin Horvatin, Software Architect

Press Releases

Events

  • Moving From Checkbox Compliance to True Data Security

    With the prevalence of data theft among companies like Yahoo! and Cambridge Analytica, Data Security has come to the forefront of conversations in the Information Security community. Establishing a core set of principles around protecting credentials and data is fundamental to defending against a data breach.

    Having a Data Access Governance (DAG) program where a least privilege access model is established is key to achieving true data security. We have broken down the steps to a successful DAG program into 5 phases: discovery, collect and analyze, monitor, restructure, and govern. Building a successful DAG program will lead to data specific compliance with virtually any regulation so that operational standards are being met.

    Join Adam Laub, SVP of Product Marketing at STEALTHbits Technologies, for the first webinar of the 3 part series where he’ll give a brief overview of DAG and how it can lead to compliance. At the end of this webinar you’ll have a deeper understanding of why the 5 phases are crucial to creating a true data security program.

    Participants will learn:

    • Why you need to know your sensitive data footprint
    • How to determine which data is at risk
    • How to identify data stakeholders
    • Which step will help you achieve a least privilege access model
    • What processes can be instantiated to keep data and the places data lives clean, secure, and compliant

    This webinar series qualifies for CPE credit.

    If you are unable to join the live webinar, register to receive a video recording after the event.

    • Date: Wednesday, August 8th, 2018
    • Time: 11:00 AM EDT
    • Presenter:
      • Adam Laub - SVP of Product Marketing
                  Register Now

    Detecting Pass-the-Hash with Honeypots

    Pass-the-hash and pass-the-ticket attacks can be some of the most effective techniques for attackers to use to move laterally throughout your organization, and also the most difficult to detect. Most detections rely on differentiating between what is normal behavior for a user and what is abnormal. While this can be effective, it is also time consuming and results in lots of false positives. In this webinar, we will explore how to use modern honeypot techniques to lay traps for attackers and emphatically detect the use of the pass-the-hash technique within your organization.

    If you are unable to join the live webinar, register to receive a video recording after the event.

    • Date: Thursday, August 9th, 2018
    • Time: 1:00 PM EDT
    • Presenter:
      • Jeff Warren - SVP of Technical Product Management & Development
                  Register Now
  • Active Directory Management & Security

    Active Directory is leveraged by over 90% of organizations worldwide as the authentication and authorization hub of their IT infrastructures. Containing the vast majority of user credentials within any business - and the most important ones too - it’s no wonder why AD is a primary target in virtually every breach scenario.

    Active Directory’s complexity leaves it prone to misconfiguration, exposing it to unnecessary security risk. Adding insult to injury, most organizations lack the resources to monitor AD properly and protect it from modern attacks, let alone enforce security policies that prevent self-inflicted risks like the abuse of privileged credentials.

    Join STEALTHbits for a live, technical webinar and we’ll demonstrate how our Active Directory Management & Security suite of solutions is the most comprehensive and capable in the industry. In less than 60 minutes, we’ll cover how we:

    • Inventory all objects, policies, and configurations to obtain a complete view of Active Directory’s footprint
    • Analyze relationships between objects, permissions, privileged access rights, and toxic and vulnerable conditions to prioritize risks and remediation efforts
    • Clean up stale and unneeded objects to limit risk and unnecessary exposure, as well as ease the administrative burden
    • Monitor changes, access, and queries to and against critical objects, attempts to compromise credentials, achieve persistence, and circumvent security controls
    • Protect critical objects from unauthorized change or access, identify and remediate easily compromised accounts, and follow best practices designed to prevent credential abuse and privilege escalation

    Active Directory is secure when it’s clean, understood, configured properly, monitored closely, and controlled tightly. Register now and we’ll show you how.

    • Date/Time:
      • Click Registration Button For More Details

    Threat Analytics

    Despite significant investments made in perimeter, network, and endpoint defenses, organizations still don’t have adequate resources to understand or address all the different threats they face. Most organizations continue to struggle with foundation-level security best practices, resulting in reduced effectiveness of the other investments they’ve made. Furthermore, the volume of events produced by native logging is overwhelming, making the data difficult to consume, and the inadequacy of the data produced by native logging makes the data even more difficult to understand.

    Join STEALTHbits for a live, technical webinar and we’ll demonstrate how our Threat Analytics suite of solutions empower and enrich all the other efforts and investments you’ve made by addressing root cause issues that affect their effectiveness. In less than 60 minutes, we’ll cover how we:

    • Surface, evaluate, and subsequently limit privileged access rights to reduce an attackers ability to move laterally and compromise credentials
    • Assess and remediate conditions and misconfigurations across systems, data, and applications that attackers use to compromise credentials and circumvent security controls
    • Monitor user behavior and prevent violations of security policy and attempts to compromise data and credentials, mitigating successful breach scenarios
    • Baseline configurations and continually assess adherence to desired standards across all applicable assets
    • Integrate data, alerts, context, and intelligence with appropriate technologies to increase the value and ROI in existing investments

    Threat Analytics is more than analyzing user behavior and pretty dashboards. It’s about proactively understanding the threats against your various assets, where vulnerabilities exist that those threats exploit, and employing detection, protection, and mitigation controls to neutralize threats and reduce risk. Register now and we’ll show you how.

    • Date/Time:
      • Click Registration Button For More Details

    Data Access Governance

    Across unstructured and structured data repositories in organizations of every shape and size, user access rights and permissions to data are excessive, the location of sensitive data is largely unknown, and managing it all is highly complex and error-prone.

    Given that data is the primary target in virtually every breach scenario and external pressures to secure company and customer data are only increasing due to existing and new regulations, third-party demands, and customer concerns, it’s no wonder why the subject of data security has risen all the way to the boardrooms of organizations worldwide.

    Join STEALTHbits for a live, technical webinar and we’ll demonstrate how our full-featured Data Access Governance (DAG) platform can help you achieve real results through a proven process. In less than 60 minutes, we’ll cover how we:

    Participants will learn:

    • Discover where data lives to obtain a complete view of your data footprint
    • Collect & Analyze relevant data points to answer critical questions (e.g. data sensitivity, access, permissions, ownership, age, etc.)
    • Monitor activity to understand user interactions with data
    • Restructure access to achieve Least Privilege principles and position the environment for effective governance
    • Govern access ongoing to ensure security, compliance, and operational standards are met

    Data Access Governance (DAG) is about making access to data exclusive. Register now and we’ll show you how.

    • Date/Time:
      • Click Registration Button For More Details

  • SHI Global Sales Conference
    • When: July 26th, 2018
    • Where: Orlando, FL
    Data Connectors Sacramento Cybersecurity Conference 2018
    • When: August 9th, 2018
    • Where: Sacramento, CA

    Customer Appreciation Event
    • When: September 5th, 2018
    • Where: San Diego, CA
    Sirius Computer Solutions-Kansas City Ironhorse Golf Event
    • When: September 13th, 2018
    • Where: Leawood, KS
    Microsoft Ignite
    • When: September 24th-28th, 2018
    • Where: Orlando, FL

    Attend Event

    NetApp Insight 2018
    • When: October 22th - 24th, 2018
    • Where: Las Vegas, NV

    Attend Event

    Hybrid Identity Protection Conference 2018
    • When: November 5th - 6th, 2018
    • Where: New York City, NY
    Gartner IAM
    • When: December 3rd-5th, 2018
    • Where: Las Vegas, NV

    Attend Event

  • Active Directory Solutions

    On-Demand Product Demos

    Learn More

    Data Access Governance Solutions

    On-Demand Product Demos

    Learn More

    StealthINTERCEPT Active Directory Firewall

    On-Demand Product Demos

    Learn More

  • 3 Modern Active Directory Attack Scenarios and How to Detect Them with Randy Franklin Smith

    On-Demand Webinar

    Learn More


    4 Active Directory Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More


    4 Active Directory Password Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More

    4 Attacks that Exploit Active Directory Permissions and How to Protect Against Them

    On-Demand Webinar

    Learn More


    4 Service Account Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More

    5 Challenges Combining Data and Privileged Access Governance with IAM

    On-Demand Webinar

    Learn More


    5 Steps for Cleaning up Active Directory

    On-Demand Webinar

    Learn More


    5 Steps for Setting up File Activity Monitoring on Storage Devices

    On-Demand Webinar

    Learn More

    5 Steps to Building a Successful Data Access Governance Program to Control Unstructured Data

    On-Demand Webinar

    Learn More


    5 Steps to Faster GDPR Compliance

    On-Demand Webinar

    Learn More


    5 Steps to Faster GDPR Compliance for US Companies

    On-Demand Webinar

    Learn More

    5 Ways to Improve Active Directory and Operating System Security in 2017

    On-Demand Webinar

    Learn More



    7 Steps to EU GDPR Compliance

    On-Demand Webinar

    Learn More

    10+ Up-To-Date Ways to Harden Windows Against Modern Active Directory Attacks with Randy Franklin Smith

    On-Demand Webinar

    Learn More



    A Countdown to Compliance - The EU GDPR Time Bomb Part 1

    On-Demand Webinar

    Learn More

    Active Directory Botnets & DACL Backdoors

    On-Demand Webinar

    Learn More

    Active Directory Migration Planning and Assessment

    On-Demand Webinar

    Learn More

    Advanced Threat Detection with StealthINTERCEPT

    On-Demand Webinar

    Learn More

    Announcing the NEW STEALTHbits File Activity Monitor

    On-Demand Webinar

    Learn More

    Announcing the New StealthINTERCEPT

    On-Demand Webinar

    Learn More

    Attacking Microsoft SQL Server Databases

    On-Demand Webinar

    Learn More

    Best Practices for Auditing Active Directory

    On-Demand Webinar

    Learn More

    Best Practices for Privileged Local Account Auditing

    On-Demand Webinar

    Learn More

    Big Advancements in Data Access Governance - StealthAUDIT 8.0

    On-Demand Webinar

    Learn More


    China's New Cybersecurity Law

    On-Demand Webinar

    Learn More


    Clean Up Active Directory Once and for All

    On-Demand Webinar

    Learn More

    Closing the Door on Today's Threats with StealthINTERCEPT and RSA Security Analytics

    On-Demand Webinar

    Learn More

    Come Learn About our MVP Award Winning Data Access Governance Solution

    On-Demand Webinar

    Learn More


    Don't be the Next Ransomware Headline

    On-Demand Webinar

    Learn More


    EU GDPR - You have Question, We have Answers

    On-Demand Webinar

    Learn More

    Extend IAM into Unstructured Data and Privileged Access Management with STEALTHbits and Thycotic

    On-Demand Webinar

    Learn More


    Extending IAM into Unstructured Data

    On-Demand Webinar

    Learn More


    Extending SailPoint IdentityIQ into Unstructured Data

    On-Demand Webinar

    Learn More

    Fast, Safe AD Rollback and Recovery: An Insider's Look at StealthRECOVER

    On-Demand Webinar

    Learn More


    Feed Your Qradar® Intelligence, Not Just Data

    On-Demand Webinar

    Learn More


    File Activity Monitoring with STEALTHbits

    On-Demand Webinar

    Learn More

    Get Control of Active Directory with STEALTHbits

    On-Demand Webinar

    Learn More

    Getting Ahead of the IAM Game with a Clean AD

    On-Demand Webinar

    Learn More

    Governing Access to Unstructured Data with the AIC

    On-Demand Webinar

    Learn More

    How Attackers Are Using Mimikatz to Steal Your Credentials

    On-Demand Webinar

    Learn More

    How Important is Active Directory to Successful IAM?

    On-Demand Webinar

    Learn More

    How to Protect Against File System Attacks

    On-Demand Webinar

    Learn More

    How to Protect Against Ransomware with the Shadow Brokers Vulnerability Utility

    On-Demand Webinar

    Learn More


    International Traffic in Arms Regulations (ITAR) Compliance

    On-Demand Webinar

    Learn More


    Introducing StealthDEFEND: Purpose-Built UEBA

    On-Demand Webinar

    Learn More

    Keeping Cloud Security Grounded

    On-Demand Webinar

    Learn More

    Learn How to Protect Sensitive Data - A High Value Target for Hackers

    On-Demand Webinar

    Learn More

    Lock Down Your Local Administrators

    On-Demand Webinar

    Learn More


    Making Open Access Compliant and Secure

    On-Demand Webinar

    Learn More


    Managing Enterprise Storage Systems with StealthAUDIT

    On-Demand Webinar

    Learn More

    No Longer the Same Check Boxes - Achieving Compliance and Data Security with EU GDPR

    On-Demand Webinar

    Learn More

    Obtaining Visibility and Control when Outsourcing AD Operations

    On-Demand Webinar

    Learn More

    PCI-DSS Compliance - More Than Just Staying out of the Headlines

    On-Demand Webinar

    Learn More

    Pragmatic Approaches to Advanced Threat Detection and Data Security

    On-Demand Webinar

    Learn More

    Proactive Threat Hunting – How To Secure Active Directory and Incorporate File Activity Monitoring

    On-Demand Webinar

    Learn More

    Preventing Outsiders from Becoming Insiders - Moving Beyond Change Auditing

    On-Demand Webinar

    Learn More


    Preventing SharePoint from Becoming ScarePoint

    On-Demand Webinar

    Learn More


    Protecting Exchange from the Insider Threat

    On-Demand Webinar

    Learn More

    Ransomware 101: Understand, Detect, and Minimize the Risk to Your Business

    On-Demand Webinar

    Learn More


    Recovering from Active Directory Disasters – StealthRECOVER v1.1

    On-Demand Webinar

    Learn More

    Secure Your Organization's Sensitive Data with STEALTHbits

    On-Demand Webinar

    Learn More

    Seven Critical Security Activities to Monitor in Active Directory

    On-Demand Webinar

    Learn More

    Solving SIEM's File Activity Monitoring Blind Spot

    On-Demand Webinar

    Learn More


    StealthAUDIT Expands to Structured Data and more with StealthAUDIT v8.1

    On-Demand Webinar

    Learn More


    StealthDEFEND: Leveraging Behavioral Analytics to Reduce Insider Threat

    On-Demand Webinar

    Learn More

    Systematically Identifying Absolutely Every Privileged User and Detecting New Ones with Randy Franklin Smith

    On-Demand Webinar

    Learn More

    The 2018 Data Security Agenda: Mastering Your Data Security Privacy Practices

    On-Demand Webinar

    Learn More


    Top Causes of Security Breaches in 2016

    On-Demand Webinar

    Learn More


    Trust is Not an Effective Security Control for Privileged Access

    On-Demand Webinar

    Learn More

    Understanding the Sony Breach - How STEALTHbits Could Have Prevented the Sony Hack

    On-Demand Webinar

    Learn More


    What You Need to Know About NYCRR 500

    On-Demand Webinar

    Learn More


    What's New in StealthAUDIT v7.2?

    On-Demand Webinar

    Learn More

    What's New in StealthINTERCEPT v4.0?

    On-Demand Webinar

    Learn More

    Why We Won the Beacon Award

    On-Demand Webinar

    Learn More

    Workshop: CCSI & STEALTHbits’ Break Down 23 NYCRR 500

    On-Demand Webinar

    Learn More

Awards and Recognition

STEALTHbits has earned several leading industry awards and has been named in Gartner’s Cool Vendors in Security Report.