About Us

STEALTHbits Technologies, Inc. is a cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements, and decrease operations expense.

Identify threats. Secure data. Reduce risk.

Watch Video

 

The Companies You Trust, Trust Us

AstraZeneca Logo
Credit Suisse Logo
John Deere Logo
Disney Logo
NBC Universal Logo

Management Team

Steve Cochran - Chief Executive Officer (CEO)

Steve Cochran

Founder, CEO
Nick Mansour - Chief Operating Officer

Nick Mansour

Chief Operating Officer
Jeff Warren - General Manager, Products

Jeff Warren

General Manager, Products
 
Adam Laub - Senior Vice President, Product Management

Adam Laub

Chief Marketing Officer

Jill Twomey - Director of Finance

Jill Twomey

Vice President, Finance

Steve Cochran

Founder, CEO

Steve Cochran is the CEO for STEALTHbits Technologies. He has served as CEO since his founding of the company in 2001. Steve has guided the organization from its inception to eleven consecutive years of profitability and growth.

He has had a successful 20-year career in the software industry, holding senior management positions and leading the Change Management business unit at Quest Software prior to founding STEALTHbits. Steve was also instrumental in the success and growth of Quest Software; an organization of less than 100 employees when he began.

Nick Mansour

Chief Operating Officer

Nick Mansour is STEALTHbits’ Chief Operating Officer (COO). As COO, Nick is responsible for all day-to-day global operations, customer facing functions and go-to-market strategy. With over 19 years of experience leading sales management, marketing and customer success organizations for high growth software companies. Specialized in developing markets, implementing channel/technical alliance strategies and driving sales strategy for worldwide growth.

Adam Laub

Chief Marketing Officer

Adam Laub is STEALTHbits Technologies’ Chief Marketing Officer (CMO). As CMO, Adam is responsible for corporate marketing, communications and AR/PR, demand generation, product marketing, events, and marketing operations. Additionally, he and his team participate heavily in setting product strategy, defining future roadmap, driving strategic sales engagements, supporting demand generation activities, enabling the sales organization, and all aspects of product evangelism.

Since joining STEALTHbits in 2005, Adam has held multiple positions within the organization, including Sales, Marketing, Product Management, and Operational Management roles.

Adam holds a Bachelor of Science degree in Business Administration from Susquehanna University, Selinsgrove, PA.

Jeff Warren

General Manager, Products

Jeff Warren is STEALTHbits’ General Manager of Products. Jeff has held multiple roles within the Technical Product Management group since joining the organization in 2010, initially building STEALTHbits’ SharePoint management offerings before shifting focus to the organization’s Data Access Governance solution portfolio as a whole. Before joining STEALTHbits, Jeff was a Software Engineer at Wall Street Network, a solutions provider specializing in GIS software and custom SharePoint development.

With deep knowledge and experience in technology, product and project management, Jeff and his teams are responsible for designing and delivering STEALTHbits’ high quality, innovative solutions.

Jeff holds a Bachelor of Science degree in Information Systems from the University of Delaware.

Jill Twomey

Vice President, Finance

Jill Twomey is the Vice President of Finance for STEALTHbits Technologies and has over 25 years of experience in accounting positions. Prior to joining STEALTHbits in September 2005, Jill was the Controller for both PGI, Inc. and Arcadian Healthcare, Inc. She is responsible for all Accounting, Legal, and Human Resources in the organization. She holds a Bachelor of Science degree in Accounting from the University of Rhode Island.

We can not only detect the attack as its happening, but we can pinpoint the affected machines right away, accelerating remediation and recovery efforts. All this capability comes out-of-the box, without installing agents on endpoints, or employing an army of analysts peeling through logs.”

- Global Energy Company

Careers - Current Open Positions

We are always looking for talented, motivated individuals who want to make a difference in our customers' lives with award-winning solutions.

What Our Employees Say

  • Nick Nieves

    STEALTHbits provides an exciting and dynamic workplace, continually challenging me to grow in my career and expand my skill set. Each day, I look forward to delivering solutions to the complex security issues in organizations and industries all over the world - while working with some of the brightest minds in the industry at STEALTHbits.”

    - Nick Nieves, Solution Engineer

  • Kevin Horvatin

    STEALTHbits values my contributions and pushes me to be my best while providing a relaxed, yet professional environment.”

    - Kevin Horvatin, Software Architect

Press Releases

Events

  • CQURE & STEALTHbits - Defending Against Modern Ransomware Threats

    In the last few years, and really in the last few months, ransomware outbreaks have tested the mettle of state agencies, communities, hospitals and organizations across the country.

    In the early days, ransomware’s presence and execution could be detected by combining observation of abnormal file system activity with the presence of a few key signatures. As time has gone on, however, ransomware detection has become much more difficult, requiring organizations to implement detections much earlier in the attack kill chain and mitigations for the vulnerabilities modern variants exploit.

    The more recent ransomware variants like Trickbot/Ryuk and LockerGaGa are sophisticated enough to spread laterally on their own through embedded versions of Metasploit and Mimikatz, allowing them to pull passwords out of memory and escalate privileges to critical systems such as Active Directory Domain Controllers.

    Join CQURE’s CEO and Founder, Paula Januszkiewicz and STEALTHbits’ General Manager – Products, Jeff Warren, for an informative webinar on these new, modern ransomware attacks, and how to protect your organization.

    During this 60 min session, we’ll review:

    • Characteristics of Modern Ransomware Attacks
    • Five Approaches for Thwarting Modern Ransomware Attacks
    • • Detection & Response
      • Mitigation
      • Control
      • Enforcement
      • Recovery

    Whether and how much damage is caused by these modern ransomware attacks is within your control!

    Register for our session on Tuesday, October 15th, at 1 PM ET/ 10 AM PT to learn more!


    Register Now!
    • Date: October 15th, 2019
    • Time: 1PM ET/10AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Paula Januszkiewicz
        Founder and CEO, CQURE

      • Jeff Warren
        General Manager, Products, STEALTHbits Technologies



    Introduction to StealthDEFEND

    Please register to join us for the next STEALTHbits' Customer Training Webinar: Introduction to StealthDEFEND.

    Join Andy Muschlewski, one of our professional Support Engineers, who will cover an in-depth review of StealthDEFEND, including a live demo! No prior knowledge or current install of the product is required.

    Topics to be covered:

    • What is StealthDEFEND?
    • Settings
    • Integrations for other STEALTHbits products (SAM, INTERCEPT, AUDIT)
    • Threats and response
    • Investigations

    Andy will also do a live demo of the UI and show a few threats as well as explore custom investigations.

    No prior knowledge of the product is required for this course.

    Andy will conclude the webinar with a Q&A session.

    If you are unable to join, register to receive the recording after the webinar.


    Register Now!
    • Date: October 17th, 2019
    • Time: 11AM ET/8AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Andy Muschlewski
        STEALTHbits Support Engineer



    Introduction to STEALTHbits Activity Monitor (SAM)

    Please register to join us for the next STEALTHbits' Customer Training Webinar: Introduction to STEALTHbits Activity Monitor (SAM).

    Andy Muschlewski, a STEALTHbits' Support Engineer will review SAM.

    Topics to be covered:

    • What is the SAM?
    • Where does the SAM get data?
    • Interface tour including:
    • • Agents
      • Monitored Domains
      • Monitored Hosts
      • Search
      • File System Monitoring
      • Active Directory Monitoring
      • Other Features

    Andy will conclude the webinar with a Q&A session.

    Andy will conclude the webinar with a Q&A session.

    If you are unable to join, register to receive the recording after the webinar.


    Register Now!
    • Date: October 24th, 2019
    • Time: 11AM ET/8AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Andy Muschlewski
        STEALTHbits Support Engineer



  • Gartner IAM Summit

    • When: December 10th-12th, 2019
    • Where: Las Vegas, Nevada

    Attend Event

    RSA 2020

    • When: February 24th-28th, 2020
    • Where: San Francisco, CA

    Attend Event

  • Active Directory Solutions

    On-Demand Product Demos

    Learn More

    Data Access Governance Solutions

    On-Demand Product Demos

    Learn More

    StealthINTERCEPT Active Directory Firewall

    On-Demand Product Demos

    Learn More

  • 3 Modern Active Directory Attack Scenarios and How to Detect Them with Randy Franklin Smith

    On-Demand Webinar

    Learn More


    4 Active Directory Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More


    4 Active Directory Password Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More

    4 Attacks that Exploit Active Directory Permissions and How to Protect Against Them

    On-Demand Webinar

    Learn More


    4 Service Account Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More

    5 Challenges Combining Data and Privileged Access Governance with IAM

    On-Demand Webinar

    Learn More


    5 Steps for Cleaning up Active Directory

    On-Demand Webinar

    Learn More


    5 Steps for Setting up File Activity Monitoring on Storage Devices

    On-Demand Webinar

    Learn More

    5 Steps to Building a Successful Data Access Governance Program to Control Unstructured Data

    On-Demand Webinar

    Learn More


    5 Steps to Faster GDPR Compliance

    On-Demand Webinar

    Learn More


    5 Steps to Faster GDPR Compliance for US Companies

    On-Demand Webinar

    Learn More

    5 Ways to Improve Active Directory and Operating System Security in 2017

    On-Demand Webinar

    Learn More



    7 Steps to EU GDPR Compliance

    On-Demand Webinar

    Learn More

    10+ Up-To-Date Ways to Harden Windows Against Modern Active Directory Attacks with Randy Franklin Smith

    On-Demand Webinar

    Learn More



    A Countdown to Compliance - The EU GDPR Time Bomb Part 1

    On-Demand Webinar

    Learn More

    Active Directory Botnets & DACL Backdoors

    On-Demand Webinar

    Learn More

    Active Directory Migration Planning and Assessment

    On-Demand Webinar

    Learn More

    Advanced Threat Detection with StealthINTERCEPT

    On-Demand Webinar

    Learn More

    Anatomy of a Hack: How TEMP.Mixmaster Attackers Use TrickBot and Ryuk To Poach Big Game

    On-Demand Webinar

    Learn More

    Announcing the NEW STEALTHbits File Activity Monitor

    On-Demand Webinar

    Learn More

    Announcing the New StealthINTERCEPT

    On-Demand Webinar

    Learn More

    Attacking Microsoft SQL Server Databases

    On-Demand Webinar

    Learn More

    Best Practices for Auditing Active Directory

    On-Demand Webinar

    Learn More

    Best Practices for Privileged Local Account Auditing

    On-Demand Webinar

    Learn More

    Big Advancements in Data Access Governance - StealthAUDIT 8.0

    On-Demand Webinar

    Learn More

    Build Threat Response Playbooks with the New Action Engine – StealthDEFEND v1.2

    On-Demand Webinar

    Learn More


    China's New Cybersecurity Law

    On-Demand Webinar

    Learn More


    Clean Up Active Directory Once and for All

    On-Demand Webinar

    Learn More

    Closing the Door on Today's Threats with StealthINTERCEPT and RSA Security Analytics

    On-Demand Webinar

    Learn More

    Come Learn About our MVP Award Winning Data Access Governance Solution

    On-Demand Webinar

    Learn More

    Compliance Methods for the Enterprise You May Not Know About

    On-Demand Webinar

    Learn More

    CQURE’s Overview of STEALTHbits Cyber Kill Chain Attack Catalog

    On-Demand Webinar

    Learn More

    Data Footprint: Understanding Data Sensitivity and Prioritizing Risk

    On-Demand Webinar

    Learn More


    Detecting Pass-the-Hash Honeypots with Honeypots

    On-Demand Webinar

    Learn More


    Don't be the Next Ransomware Headline

    On-Demand Webinar

    Learn More

    EIC 2018 Presentation - Starting Real Cybersecurity Means Protecting Credentials

    On-Demand Webinar

    Learn More

    Emerging & Continuing Trends in 2019: Privacy Regulations, Active Directory Security & Machine Learning with Security Weekly

    On-Demand Webinar

    Learn More


    Entitlement Reviews: The Secret Ingredient To A Successful Data Access Governance Program

    On-Demand Webinar

    Learn More


    EU GDPR - You have Question, We have Answers

    On-Demand Webinar

    Learn More

    Extend IAM into Unstructured Data and Privileged Access Management with STEALTHbits and Thycotic

    On-Demand Webinar

    Learn More


    Extending IAM into Unstructured Data

    On-Demand Webinar

    Learn More


    Extending SailPoint IdentityIQ into Unstructured Data

    On-Demand Webinar

    Learn More

    Fast, Safe AD Rollback and Recovery: An Insider's Look at StealthRECOVER

    On-Demand Webinar

    Learn More

    FCW & STEALTHbits: The Problem with Privileged Access Management

    On-Demand Webinar

    Learn More


    Feed Your Qradar® Intelligence, Not Just Data

    On-Demand Webinar

    Learn More


    File Activity Monitoring with STEALTHbits

    On-Demand Webinar

    Learn More

    Get Control of Active Directory with STEALTHbits

    On-Demand Webinar

    Learn More

    Getting Ahead of the IAM Game with a Clean AD

    On-Demand Webinar

    Learn More

    Governing Access to Unstructured Data with the AIC

    On-Demand Webinar

    Learn More

    How Attackers Are Using Mimikatz to Steal Your Credentials

    On-Demand Webinar

    Learn More

    How Important is Active Directory to Successful IAM?

    On-Demand Webinar

    Learn More

    How to Protect Against File System Attacks

    On-Demand Webinar

    Learn More

    How to Protect Against Ransomware with the Shadow Brokers Vulnerability Utility

    On-Demand Webinar

    Learn More

    Impact of APRA’s CPS 234 on Organizational Data

    On-Demand Webinar

    Learn More


    International Traffic in Arms Regulations (ITAR) Compliance

    On-Demand Webinar

    Learn More

    Introducing STEALTHbits Privileged Activity Manager 1.2

    On-Demand Webinar

    Learn More


    Introducing StealthDEFEND: Purpose-Built UEBA

    On-Demand Webinar

    Learn More

    Introducing StealthINTERCEPT 6.1

    On-Demand Webinar

    Learn More

    Keeping Cloud Security Grounded

    On-Demand Webinar

    Learn More

    Lateral Movement Techniques and How to Detect Them

    On-Demand Webinar

    Learn More

    Learn How to Protect Sensitive Data - A High Value Target for Hackers

    On-Demand Webinar

    Learn More

    Lock Down Your Local Administrators

    On-Demand Webinar

    Learn More

    Making Open Access Compliant and Secure

    On-Demand Webinar

    Learn More

    Managing Enterprise Storage Systems with StealthAUDIT

    On-Demand Webinar

    Learn More

    Modern Content Collaboration and Shadow IT

    On-Demand Webinar

    Learn More

    Moving from Checkbox Compliance to True Data Security

    On-Demand Webinar

    Learn More

    No Longer the Same Check Boxes - Achieving Compliance and Data Security with EU GDPR

    On-Demand Webinar

    Learn More


    Obtaining Visibility and Control when Outsourcing AD Operations

    On-Demand Webinar

    Learn More


    PCI-DSS Compliance - More Than Just Staying out of the Headlines

    On-Demand Webinar

    Learn More


    Pragmatic Approaches to Advanced Threat Detection and Data Security

    On-Demand Webinar

    Learn More

    Preventing Outsiders from Becoming Insiders - Moving Beyond Change Auditing

    On-Demand Webinar

    Learn More


    Preventing SharePoint from Becoming ScarePoint

    On-Demand Webinar

    Learn More

    Proactive Threat Hunting – How To Secure Active Directory and Incorporate File Activity Monitoring

    On-Demand Webinar

    Learn More


    Protecting Exchange from the Insider Threat

    On-Demand Webinar

    Learn More

    Ransomware 101: Understand, Detect, and Minimize the Risk to Your Business

    On-Demand Webinar

    Learn More


    Recovering from Active Directory Disasters – StealthRECOVER v1.1

    On-Demand Webinar

    Learn More

    Restructure Access to Implement and Maintain a Least Privilege Access Model

    On-Demand Webinar

    Learn More


    Secure Your Organization's Sensitive Data with STEALTHbits

    On-Demand Webinar

    Learn More


    Seven Critical Security Activities to Monitor in Active Directory

    On-Demand Webinar

    Learn More

    Simple Worthwhile Database Security Practices

    On-Demand Webinar

    Learn More


    Solving SIEM's File Activity Monitoring Blind Spot

    On-Demand Webinar

    Learn More

    StealthAUDIT Adds Extended Support for Hybrid Cloud Storage and More with StealthAUDIT v8.2

    On-Demand Webinar

    Learn More


    StealthAUDIT Expands to Structured Data and more with StealthAUDIT v8.1

    On-Demand Webinar

    Learn More


    StealthDEFEND: Leveraging Behavioral Analytics to Reduce Insider Threat

    On-Demand Webinar

    Learn More

    Systematically Identifying Absolutely Every Privileged User and Detecting New Ones with Randy Franklin Smith

    On-Demand Webinar

    Learn More

    The 2018 Data Security Agenda: Mastering Your Data Security Privacy Practices

    On-Demand Webinar

    Learn More

    The 2018 State of Data Access Governance with STEALTHbits and the Ponemon Institute

    On-Demand Webinar

    Learn More


    Top Causes of Security Breaches in 2016

    On-Demand Webinar

    Learn More


    Trust is Not an Effective Security Control for Privileged Access

    On-Demand Webinar

    Learn More

    Two Sides of the Same Coin: IT Security and Compliance – What Don’t You Know?

    On-Demand Webinar

    Learn More

    Understanding the Sony Breach - How STEALTHbits Could Have Prevented the Sony Hack

    On-Demand Webinar

    Learn More

    What's New in StealthAUDIT v7.2?

    On-Demand Webinar

    Learn More

    What's New in StealthINTERCEPT v4.0?

    On-Demand Webinar

    Learn More


    What You Need to Know About NYCRR 500

    On-Demand Webinar

    Learn More

    Why We Won the Beacon Award

    On-Demand Webinar

    Learn More

    Workshop: CCSI & STEALTHbits’ Break Down 23 NYCRR 500

    On-Demand Webinar

    Learn More

Awards and Recognition

STEALTHbits has earned several leading industry awards and has been named in Gartner’s Cool Vendors in Security Report.

Free Risk Analysis STEALTHbits' Credentials and Data Security Assessment is your Business-Justification-in-a-Box!x