STEALTHbits Technologies, Inc.

STEALTHbits Technologies, Inc.

  • X70
  • Product Information
  • Images
  • Document
  • Social Media
  • Video
  • New Exhibitor

STEALTHbits’ mission is protect an organization’s sensitive data and the credentials attackers use to steal that data. As a result, we provide the most comprehensive Data Access Governance and Active Directory Management & Security portfolio in the industry.


  • StealthAUDIT

    StealthAUDIT is an auditing, reporting, and governance platform designed to control access to unstructured and structured data, systems, and critical ...

  • StealthDEFEND

    StealthDEFEND is a real-time threat detection and response solution purpose-built to protect an organization's credentials and data. For Active Direct...

  • StealthINTERCEPT

    StealthINTERCEPT provides real-time monitoring and control over Active Directory change and authentication activities, allowing organizations to enfor...

Please wait loading...

Please wait loading...



  • 2019 STEALTHbits Corporate Overview 462 KB

    STEALTHbits Technologies is a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data.

    17 Apr 2019


  • Contact Information

    STEALTHbits Technologies, Inc.
    Ferneberga House Alexandra Road Farnborough GU14 6DQ United Kingdom
    Tel:  +44 1252 918 141

Product Categories

  1. Product Categories
    • AI/Machine Learning
    Business Continuity / Incident Response
    • Data Breach Incident Management
    • Incident Response
    • Audit
    • Governance
    • PCI-DSS
    Data Protection
    • Data Breaches
    • Database Security
    Human Factors
    • Insider Threat
    Network Security
    • Access Rights Management
    • End Point Security
    • Security Monitoring
    Risk Management
    • Risk & Vulnerability Assessment
    • Security Analytics
    • Threat Intelligence

Case Studies

  • STEALTHbits’ Credential and Data...

    Regardless of an attacker’s entry point into an organization, they’re always after the same two things – credentials & data. In response, STEALTHbits...

White Papers

  • 3 Steps to Getting Data Access...

    Data Access Governance (DAG) has been that to-do item IT Security has had for years, but they just kept pushing it aside for other goals. Today, howev...

Press Releases

  • STEALTHbits Teams Up with RSA...

    21 Feb 2019

    STEALTHbits Technologies, a cybersecurity company focused on protecting an organization's sensitive data and the credentials attackers use to steal th...

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.