Events

  • Prioritizing Password Security with Troy Hunt - The Good, the Bad, and the Ineffective

    The worldwide COVID-19 pandemic hasn't necessarily changed how we do business, but almost instantly has changed where many of us do it from. Safe within the confines of our brick and mortar facilities and shielded LANs, we pushed stringent password security to the side in favor of other pressing projects. Now out in the open and spread across potentially thousands of locations, password security must rise to the top of the priority list.

    Partnering with our APAC distributor, emt Distribution, Stealthbits Technologies encourages you to join Microsoft Regional Director and MVP for Developer Security, Troy Hunt, for an informative overview of password security and why prioritizing it now is more important than ever before. Learn more about his work on the Have I been Pwned (HIBP) database and how it can help keep your organization more secure. We’ll also have Rod Simmons, VP of Product Strategy for Active Directory (AD) from Stealthbits join to share his experience from the field and discuss the differences between on-premises password controls via AD and Microsoft Azure Password Protect, how your organization can align with popular NIST guidelines, and what stronger password policy means for risk reduction.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date:
      • United States: Wednesday, June 24, 2020 | 9 PM ET / 6 PM PT

      • Australia: Thursday, June 25th | 11 AM AEST
    • Duration: 60 Minutes
    • Presenter:
      • Troy Hunt
        Microsoft Regional Director and MVP for Developer Security
        EMT Technology Distribution

      • Rod Simmons
        Stealthbits Technologies' VP of Product Strategy - Active Directory
        Stealthbits Technologies

    Introduction to Stealthbits Technologies

    Stealthbits Technologies, Inc. is a customer-driven cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, our highly innovative and infinitely flexible platform delivers real protection that reduces security risk, fulfills compliance requirements, and decreases operational expense.

    Join this informative session led by Stealthbits' Chief Marketing Officer, Adam Laub, to learn about our mission, solutions, products, and why the world's most notable brands rely on Stealthbits to secure their most valuable (and often most vulnerable) assets - credentials and data.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date: Tuesday, July 7, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Adam Laub
        Chief Marketing Officer
        Stealthbits Technologies

    Stealthbits' Data Access Governance Solution Overview

    Access and permissions to data are excessive and management is highly complex and error prone. The location of sensitive data is largely unknown (especially across unstructured data repositories) and is also the primary target in virtually every breach scenario. With increasing external pressures via existing and new regulations, 3rd party demands, and customer concerns, the need to gain control over data of all types has never been more dire.

    A well-executed Data Access Governance (DAG) program is the solution to the problem. DAG is about making access to data exclusive. It's about limiting the number of people who have access to data - and their permissions to data - to the lowest levels possible. Stealthbits' Data Access Governance solution provides organizations with the capabilities and approaches needed to identify, secure, and maximize the value of data wherever it resides.

    Join Adam Laub, Chief Marketing Officer, as he reviews the difficult data security and privacy challenges organizations face today and how Stealthbits can help.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date: Tuesday, July 14, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Adam Laub
        Chief Marketing Officer
        Stealthbits Technologies

    Stealthbits' Active Directory Management & Security Solution Overview

    Active Directory (AD) is leveraged by over 90% of enterprises worldwide as the authentication and authorization hub of their IT infrastructure. AD contains the most critical credentials, which is why attackers have developed sophisticated attack tactics, techniques, and procedures that work with remarkable success. Active Directory’s inherent complexity leaves it prone to misconfiguration, exposing it to security risk that most organizations can’t handle due to the lack of resources necessary to monitor AD properly and protect it.

    Stealthbits believes AD is secure and efficient when it's clean, understood, configured properly, monitored closely, and controlled tightly. Our industry-leading suite of AD solutions enable organizations to effectively manage and secure AD at the levels required to mitigate the risks of advanced attacks, compliance failure, and operational outage.

    Join Rod Simmons, Stealthbits Technologies' VP of Product Strategy - Active Directory, as he reviews the many challenges organizations face in the management and security of AD and how Stealthbits can help.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date: Tuesday, July 21, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Rod Simmons
        Stealthbits Technologies' VP of Product Strategy - Active Directory
        Stealthbits Technologies

    Stealthbits' Privileged Access Management Solution Overview

    Privileged Access Management (PAM) tools have proven to be essential components of information security and compliance programs, yet privileged account compromise remains a nagging issue despite broad scale adoption of password vaults.

    Stealthbits' approach to Privileged Access Management fills the gaps and overcomes the challenges of traditional PAM solutions, providing comprehensive visibility into an organization's privileged account footprint, surgical control over privileged account usage, and the ability to effectively eliminate the sizable threat surface privileged accounts represent through the reduction of privileged accounts.

    Join Martin Cannard, Stealthbits Technologies' VP of Product Strategy - Privileged Access Management, as he outlines the challenges organizations face with traditional PAM tools and how Stealthbits can help.

    Register today!

    If you are unable to attend, register to receive a recording after the live session.

    • Date: Tuesday, July 28, 2020
    • Time: 11:00 AM ET/8:00 AM PT
    • Duration: 60 Minutes
    • Presenter:
      • Martin Cannard
        Stealthbits Technologies' VP of Product Strategy - Privileged Access Management
        Stealthbits Technologies
  • The global COVID-19 pandemic has resulted in the cancellation of most in-person events, but you can still join us for a live webinar or access our on-demand product demos and past webinars anytime!

  • Stealthbits’ Active Directory Management and Security Solutions

    On-Demand Product Demos

    Learn More

    Stealthbits’ Data Access Governance Solutions

    On-Demand Product Demos

    Learn More

    Stealthbits' Privileged Access Management Solutions

    On-Demand Product Demos

    Learn More

  • Stealthbits Technologies Corporate Overview On-Demand Webinar

    On-Demand Webinar

    Learn More

    3 Modern Active Directory Attack Scenarios and How to Detect Them with Randy Franklin Smith

    On-Demand Webinar

    Learn More

    4 Active Directory Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More

    4 Service Account Attacks and How to Protect Against Them

    On-Demand Webinar

    Learn More

    10+ Up-To-Date Ways to Harden Windows Against Modern Active Directory Attacks with Randy Franklin Smith

    On-Demand Webinar

    Learn More

    Anatomy of a Hack: How TEMP.Mixmaster Attackers Use TrickBot and Ryuk To Poach Big Game

    On-Demand Webinar

    Learn More

    Are Standing Privileges Making You a Sitting Duck?

    On-Demand Webinar

    Learn More

    Attackers Are Bypassing MFA - What You Need to Know and How Your Remote Workforce is Affected

    On-Demand Webinar

    Learn More

    Best Practices for Auditing Active Directory

    On-Demand Webinar

    Learn More

    CQURE’s Overview of Stealthbits Cyber Kill Chain Attack Catalog

    On-Demand Webinar

    Learn More

    Detecting Pass-the-Hash Honeypots with Honeypots

    On-Demand Webinar

    Learn More

    Entitlement Reviews: The Secret Ingredient To A Successful Data Access Governance Program

    On-Demand Webinar

    Learn More

    FCW & Stealthbits: The Problem with Privileged Access Management

    On-Demand Webinar

    Learn More

    International Traffic in Arms Regulations (ITAR) Compliance

    On-Demand Webinar

    Learn More

    Introducing Stealthbits Privileged Activity Manager 1.2

    On-Demand Webinar

    Learn More

    Lateral Movement Techniques and How to Detect Them

    On-Demand Webinar

    Learn More

    Prioritizing Password Security for Your Suddenly Remote Workforce

    On-Demand Webinar

    Learn More

    Simple Worthwhile Database Security Practices

    On-Demand Webinar

    Learn More

    Storage Reclamation Across a Distributed Environment

    On-Demand Webinar

    Learn More

    What You Need to Know About NYCRR 500

    On-Demand Webinar

    Learn More