Stealthbits Named an Innovation Leader in KuppingerCole’s Privileged Access Management Leadership Compass

5/27/20

HAWTHORNE, N.J.--(BUSINESS WIRE)--Stealthbits Technologies, Inc., a customer-driven cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, today announced it has earned a leadership position for Innovation in KuppingerCole’s Privileged Access Management (PAM) Leadership Compass, as well as recognition for usability in comparison with the market’s leading competitors.

The PAM segment has become one of the fastest growing areas of the cybersecurity and risk management markets. KuppingerCole Analysts estimates annual revenue from PAM vendors at $2.2 billion/year and predicts growth to $5.4 billion by 2025, with a compound annual growth rate (CAGR) of 20%. Stay at home directives have put more pressure on cybersecurity controls with more users (including admins) accessing systems remotely, just like most attackers would.

KuppingerCole released its Leadership Compass for Privileged Access Management in May 2020 and as well as rating Stealthbits as an Innovation Leader, had this praise for Stealthbits Privileged Activity Manager® (SbPAM). “[SbPAM is] Potentially the future of PAM in terms of ease of use and ephemerality”; “Highly suitable for DevOps environments”; “Easy to use and administer, very rapid deployment”; “Ephemeral approach means a reduced attack surface.”

Stealthbits’ innovation comes from its unique, task-based approach to Privileged Access Management, where access is not only delivered just-in-time and with just-enough-privilege, but the accounts used to provide that privilege are automatically created at the time of use and subsequently destroyed upon task completion. The use of ephemeral accounts reduces or eliminates the standing privileges most privileged accounts maintain to critical infrastructure, and thus an attacker’s ability to leverage account artifacts to move laterally throughout an environment. The product offers the ability for users to Bring Your Own Vault® (BYOV) from an alternative provider or perform vault-less operations. This gives customers the choice to build PAM their way.

In addition, deployments are much simpler than competing products. As was noted in the report, Stealthbits’ solution is “easy to use and administer, very rapid deployment”. They also noted that customer implementations and proof-of-concepts (POCs) are often deployed in hours, not weeks and months.

Customers are amazed at the simple installation process. “Honestly, SbPAM is so simple to install and get running that we probably could have done it ourselves,” said Craig Larsen, Information Systems Administrator at Eastern Carver County Schools. In relation to the product’s ease of use and ability to reduce the attack surface, KuppingerCole’s Paul Fisher stated the following in his report, “On the dashboard there is no long list of accounts, instead users select what they want to do and then the system provides access and provisions the account. When the session is finished the user is automatically logged out and all privileges are removed.”

“We see the PAM market as ripe for a different approach. With many competitive solutions 10 to 15 years old and a market that kept expressing its dissatisfaction, we purpose-built a solution that was easy to use, and simple to install. SbPAM gives our customers options, and significantly reduces or eliminates standing privileges and the ability for attackers to move laterally,” said Steve Cochran, Founder and CEO of Stealthbits.

Download a complimentary copy of KuppingerCole Analysts 2020 “Leadership Compass: Privileged Access Management” report: https://go.stealthbits.com/kuppingercole-pam-leadership-compass

Visit https://www.stealthbits.com/privileged-access-management-solution to learn more about Stealthbits’ award-winning Privileged Access Management approach.

About Stealthbits Technologies

Identify threats. Secure data. Reduce risk.

Stealthbits Technologies, Inc., is a customer-driven cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, our highly innovative and infinitely flexible platform delivers real protection that reduces security risk, fulfills compliance requirements, and decreases operational expense.

Recent Deals

Interested in advertising your deals? Contact Edwin Warfield.