StealthBits Technologies, Inc.

 StealthBits Technologies, Inc. contact information is shown below
Owner:STEALTHBITS TECHNOLOGIES, INC.
Owner Address:200 Central Ave Hawthorne NJ 07506
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byStealthBits Technologies, Inc.

Brand:

ANYDATA

Description:

Downloadable computer software for ingesting data from any data repository into a separate sensitive data scanner to find sensitive information within custom, outdated, or unsupported data repositories and applications;ANY DATA;

Category: DOWNLOADABLE COMPUTER SOFTWARE INGESTING
Brand:

ANYID

Description:

Downloadable computer software for managing data, namely, a connector framework to map information and attributes from any application or repository to a normalized schema;

Category: DOWNLOADABLE COMPUTER SOFTWARE MANAGING
Brand:

BRING YOUR OWN VAULT

Description:

Downloadable computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; Downloadable computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; Downloadable computer software for automating, controlling, improving, managing and administering computer security and compliance; Downloadable computer software for management of information technology compliance and information technology governance; Downloadable computer software for managing configuration of computers, software, and network devices;

Category: DOWNLOADABLE COMPUTER SOFTWARE MANAGEMENT
Brand:

BYOV

Description:

Downloadable computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; Downloadable computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; Downloadable computer software for automating, controlling, improving, managing and administering computer security and compliance; Downloadable computer software for management of information technology compliance and information technology governance; Downloadable computer software for managing configuration of computers, software, and network devices;BRING YOUR OWN VAULT;

Category: DOWNLOADABLE COMPUTER SOFTWARE MANAGEMENT
Brand:

ID INDEX

Description:

Downloadable computer software for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; Downloadable computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; Downloadable computer software for automating, controlling, improving, managing and administering computer security and compliance; Downloadable computer software for information technology risk and compliance, and information technology governance; Downloadable computer software for managing the configuration of computers, software and network devices;IDENTIFICATION INDEX; IDENTIFY INDEX; IDENTITY INDEX;

Category: DOWNLOADABLE COMPUTER SOFTWARE COLLECTING
Brand:

IDENTITY INDEX

Description:

Downloadable computer software for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; Downloadable computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; Downloadable computer software for automating, controlling, improving, managing and administering computer security and compliance; Downloadable computer software for information technology risk and compliance, and information technology governance; Downloadable computer software for managing the configuration of computers, software and network devices;ID INDEX; IDENTIFY INDEX; IDENTIFICATION INDEX;

Category: DOWNLOADABLE COMPUTER SOFTWARE COLLECTING
Brand:

IDENTITYINDEX

Description:

Downloadable computer software for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; Downloadable computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; Downloadable computer software for automating, controlling, improving, managing and administering computer security and compliance; Downloadable computer software for information technology risk and compliance, and information technology governance; Downloadable computer software for managing the configuration of computers, software and network devices;IDENTITY INDEX; ID INDEX; IDENTIFY INDEX; IDENTIFICATION INDEX;

Category: DOWNLOADABLE COMPUTER SOFTWARE COLLECTING
Brand:

IDINDEX

Description:

Downloadable computer software for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; Downloadable computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; Downloadable computer software for automating, controlling, improving, managing and administering computer security and compliance; Downloadable computer software for information technology risk and compliance, and information technology governance; Downloadable computer software for managing the configuration of computers, software and network devices;ID INDEX; IDENTIFICATION INDEX; IDENTIFY INDEX; IDENTITY INDEX;

Category: DOWNLOADABLE COMPUTER SOFTWARE COLLECTING
Brand:

PRIVILEGED ACTIVITY MANAGEMENT

Description:

Downloadable computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; Downloadable computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; Downloadable computer software for automating, controlling, improving, managing and administering computer security and compliance; Downloadable computer software for management of information technology compliance and information technology governance; Downloadable computer software for managing configuration of computers, software, and network devices;

Category: DOWNLOADABLE COMPUTER SOFTWARE MANAGEMENT
Brand:

SBPAM

Description:

Downloadable computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; Downloadable computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; Downloadable computer software for automating, controlling, improving, managing and administering computer security and compliance; Downloadable computer software for management of information technology compliance and information technology governance; Downloadable computer software for managing configuration of computers, software, and network devices;STEALTHBITS PRIVILEGED ACTIVITY MANAGER;

Category: DOWNLOADABLE COMPUTER SOFTWARE MANAGEMENT
Brand:

STEALTHAUDIT

Description:

Computer hardware; computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; computer software to automate, control, improve, manage and administer computer security and compliance; computer software for information technology risk and compliance, and information technology governance; and computer software to manage configuration of computers, software, and network devices;STEALTH AUDIT;[ Computer programming services; technical and strategic consultation in the field of computer software, network management and network security, and information technology governance; and technical support services, namely, providing updates to software applications, building and creating custom solutions utilizing techniques and operations provided within software applications, and providing assistance in the nature of troubleshooting software problems for users of software applications via the world wide web, Internet, and/or telephone ];

Category: COMPUTER HARDWARE
Brand:

STEALTHBITS

Description:

Computer hardware; computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; computer software to automate, control, improve, manage and administer computer security and compliance; computer software for information technology risk and compliance, and information technology governance; and computer software to manage configuration of computers, software, and network devices;STEALTH BITS;[ Computer programming services; technical and strategic consultation in the field of computer software, network management and network security, and information technology governance; and technical support services, namely, providing updates to software applications, building and creating custom solutions utilizing techniques and operations provided within software applications, and providing assistance in the nature of troubleshooting software problems for users of software applications via the world wide web, Internet, and/or telephone ];

Category: COMPUTER HARDWARE
Brand:

STEALTHBITS ACTIVITY MONITOR

Description:

Downloadable computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; Downloadable computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; Downloadable computer software for automating, controlling, improving, managing and administering computer security and compliance; Downloadable computer software for management of information technology compliance and information technology governance; Downloadable computer software for managing configuration of computers, software, and network devices;ACTIVITY MONITOR;

Category: DOWNLOADABLE COMPUTER SOFTWARE MANAGEMENT
Brand:

STEALTHBITS FILE ACTIVITY MONITOR

Description:

Downloadable computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; Downloadable computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; Downloadable computer software for automating, controlling, improving, managing and administering computer security and compliance; Downloadable computer software for management of information technology compliance and information technology governance; Downloadable computer software for managing configuration of computers, software, and network devices;FILE ACTIVITY MONITOR;

Category: DOWNLOADABLE COMPUTER SOFTWARE MANAGEMENT
Brand:

STEALTHBITS PRIVILEGED ACTIVITY MANAGER

Description:

Downloadable computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; Downloadable computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; Downloadable computer software for automating, controlling, improving, managing and administering computer security and compliance; Downloadable computer software for management of information technology compliance and information technology governance; Downloadable computer software for managing configuration of computers, software, and network devices;STEALTHBITS PAM; SBPAM;PRIVILEGED ACTIVITY MANAGER;

Category: DOWNLOADABLE COMPUTER SOFTWARE MANAGEMENT
Brand:

STEALTHDEFEND

Description:

Software that detects authentication-based attacks in real time by leveraging user behavior analytics to profile user behavior and discerns abnormalities indicative of an attack;STEALTH DEFEND;

Category: SOFTWARE THAT DETECTS AUTHENTICATION BASED ATTACKS
Brand:

STEALTHINTERCEPT

Description:

Computer hardware; Computer software for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; computer software to automate, control, improve, manage and administer computer security and compliance; computer software for information technology risk and compliance and information technology governance; and computer software to manage configuration of computers, software, and network devices;STEALTH INTERCEPT;

Category: COMPUTER HARDWARE
Brand:

STEALTHRECOVER

Description:

Software that provides rollback and recovery options for objects in active directories;STEALTH RECOVER;

Category: SOFTWARE THAT PROVIDES ROLLBACK
Brand:

WHO? WHAT? WHERE? WHEN?

Description:

Computer hardware; Computer software used for collecting and analyzing data, to identify, assess and manage risks, manage network devices, enforce policies, deploy checks and controls, assess vulnerabilities, manage compliance, all in the area of enterprise information technology; computer for management and administration of regulatory, security, audit, legal, and corporate compliance requirements; computer software to automate, control, improve, manage and administer computer security and compliance; computer software for information technology risk and compliance, and information technology governance; and computer software to manage configuration of computers, software and network devices;Strategic consultation in the field of computer software, compliance and risk management, network management and network security, information technology risk and compliance, and information technology governance, namely, business analysis and business strategic planning services in the technology industry;Computer programming services; technical consultation in the field of computer software, compliance and risk management, network management and network security, information technology risk and compliance, and information technology governance; computer support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems and help desk services;

Category: COMPUTER HARDWARE
Brand:

WHO? WHAT? WHERE? WHEN?

Description:

Computer programming services; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technological consultation in the technology field of computer software, compliance and risk management, network management and network security, information technology risk and compliance, and information technology governance;

Category: COMPUTER PROGRAMMING SERVICES