Promote this Nomination

Additional Info

Websitehttp://www.stealthbits.com
Company size (employees)100 to 499
Headquarters RegionNorth America

In 3 bullets, summarize why this company is different from the competition and deserves recognition:

• Innovative:
STEALTHbits has been an innovator since inception. We’ve developed multiple patented technologies that have shaped the direction of the primary security disciplines we focus on, including advancements in agent-less auditing techniques, kernel-level and real-time monitoring functions, access rights remediation, threat deception techniques, and Privileged Access Management approaches.
In the last three years in particular, STEALTHbits has conducted, documented, and published detailed research and information regarding credential-theft tactics, techniques, and procedures focused on Active Directory implementations. As a result, STEALTHbits’ blog and attack sites have become among the most popular resources available for security professionals looking to learn about these very real and serious attack vectors.

• Focused on Customer Service
Above-average renewal rates (95% in 2018)
Outstanding repeat business rates (>50% of net new revenue came from existing customers in 2018)
Established Customer-Success Programs including free “Wellness” hours through our Professional Services organization to assist customers in need and dedicated “Customer Success Representatives” that strive to make every customer a raving fan

• Part of an integrated security strategy
Our mission is to protect our customer’s credentials and data, but our vision is to be the most valuable contributor to the overall strength and effectiveness of our customer’s information security programs. We realize that protecting credentials and data is only part of a comprehensive security architecture, and for that reason, we make it a priority to integrate tightly with other security vendors. We have developed deep engineering relationships and have built API level integrations with top IT and security vendors including:

IBM, Intel/McAfee, Symantec, Splunk, Alien Vault, Boldon James, LogRhythm, CyberArk, RSA, MicroFocus, Omada, Hitachi ID, Dell/EMC, NetApp, Nasuni, Dropbox, Box, ServiceNow and Microsoft.

This tight integration supports strong security services orchestration and simplifies deployments for our customers, leading to increased value, effectiveness, and efficiency for their organizations.

Overview

STEALTHbits is a customer-driven company with over 680 customers worldwide representing virtually every major industry vertical. In 2018 we added 163 new customers and our existing customers renewed at a rate of 95%. These statistics demonstrate that we are attracting new customers at a high rate and show that we take care to retain our customers once they join us.

STEALTHbits is focused on securing an organization’s sensitive data and the credentials that supply access to that data. Through a suite of industry-leading Data Access Governance, Active Directory Management and Security, and Privileged Access Management solutions, STEALTHbits provides the most comprehensive approach to the data security and privacy problem that plagues enterprises of every shape and size. Unlike other security solution providers that offer a broad range of security products and services, every product within STEALTHbits’ portfolio is designed to serve a critical function within the data protection equation, from initial discovery to active threat prevention and everywhere in between.

Products include:
• StealthAUDIT – Reporting and Governance
• StealthDEFEND – Real-time Threat Detection and Response
• STEALTHbits Privileged Activity Manager – Privileged Access Management
• StealthINTERCEPT – Real-time Policy Enforcement
• StealthRECOVER – Rollback and Recovery

STEALTHbits focuses on helping our customers solve real business problems from initial introduction through implementation and beyond. Our engagements begin by offering a no cost, Proof of Concept (POC) evaluation of any of our products. We work with prospective customers to install and configure our technologies, jointly agree on specific success criteria, and run our products in their environment to demonstrate the utility, usability, and results that the client could expect after purchase. Upon POC completion, our team then works with the client to document their business use cases by creating a written Scope of Work (SOW) that documents exactly how we will install, configure, and track the deployment.