Promote this Nomination
|Company size (employees)||100 to 499|
|Headquarters Region||North America|
In 3 bullets, summarize why this company is different from the competition and deserves recognition:
• Focused on Customer Service
• Part of an integrated security strategy
IBM, Intel/McAfee, Symantec, Splunk, Alien Vault, Boldon James, LogRhythm, CyberArk, RSA, MicroFocus, Omada, Hitachi ID, Dell/EMC, NetApp, Nasuni, Dropbox, Box, ServiceNow and Microsoft.
This tight integration supports strong security services orchestration and simplifies deployments for our customers, leading to increased value, effectiveness, and efficiency for their organizations.
STEALTHbits is a customer-driven company with over 680 customers worldwide representing virtually every major industry vertical. In 2018 we added 163 new customers and our existing customers renewed at a rate of 95%. These statistics demonstrate that we are attracting new customers at a high rate and show that we take care to retain our customers once they join us.
STEALTHbits is focused on securing an organization’s sensitive data and the credentials that supply access to that data. Through a suite of industry-leading Data Access Governance, Active Directory Management and Security, and Privileged Access Management solutions, STEALTHbits provides the most comprehensive approach to the data security and privacy problem that plagues enterprises of every shape and size. Unlike other security solution providers that offer a broad range of security products and services, every product within STEALTHbits’ portfolio is designed to serve a critical function within the data protection equation, from initial discovery to active threat prevention and everywhere in between.
• StealthAUDIT – Reporting and Governance
• StealthDEFEND – Real-time Threat Detection and Response
• STEALTHbits Privileged Activity Manager – Privileged Access Management
• StealthINTERCEPT – Real-time Policy Enforcement
• StealthRECOVER – Rollback and Recovery
STEALTHbits focuses on helping our customers solve real business problems from initial introduction through implementation and beyond. Our engagements begin by offering a no cost, Proof of Concept (POC) evaluation of any of our products. We work with prospective customers to install and configure our technologies, jointly agree on specific success criteria, and run our products in their environment to demonstrate the utility, usability, and results that the client could expect after purchase. Upon POC completion, our team then works with the client to document their business use cases by creating a written Scope of Work (SOW) that documents exactly how we will install, configure, and track the deployment.