STEALTHbits Technologies, Inc. is a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, STEALTHbits reduces security risk, fulfills compliance requirements, and decreases operations expense.


Product Vendor, CIS20 and other frameworks

CIS20 provides a prioritized set of actions to protect your organization and data from known cyberattack vectors. GBQ Technology selects products aligned with CIS20 controls to provide a foundation for basic security posture as well as a foundation for other control frameworks and regulatory authorities.

The CIS Controls are a relatively short list of high-priority, highly effective defensive actions that provide a “must-do, do-first” starting point for every enterprise seeking to improve their cyber defense. GBQ Technology works with STEALTHBits’ entire product line to meet the following CIS20 controls:

  • CIS 1 Inventory of Authorized and Unauthorized Devices
  • CIS 2 Inventory of Authorized and Unauthorized Software
  • CIS 4 Continuous Vulnerability Assessment and Remediation
  • CIS 5 Controlled Use of Administrative Privileges
  • CIS 16 Account Monitoring and Control
  • CIS 20 Penetration Tests and Red Team Exercises

Products aligned with CIS20 provide a foundation for most other control frameworks and regulatory authorities.

  • Identity Access Management Integrations
  • Security Information & Event Management Integrations
  • IT Service Management Integrations

Not sure where to start?

All it takes is a conversation to get started. Not sure what to ask or where to begin? Don’t worry. We can talk through all of that with you, too.