STEALTHbits Technologies, Inc. is a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, STEALTHbits reduces security risk, fulfills compliance requirements, and decreases operations expense.
Product Vendor, CIS20 and other frameworks
CIS20 provides a prioritized set of actions to protect your organization and data from known cyberattack vectors. GBQ Technology selects products aligned with CIS20 controls to provide a foundation for basic security posture as well as a foundation for other control frameworks and regulatory authorities.
The CIS Controls
- CIS 1 Inventory of Authorized and Unauthorized Devices
- CIS 2 Inventory of Authorized and Unauthorized Software
- CIS 4 Continuous Vulnerability Assessment and Remediation
- CIS 5 Controlled Use of Administrative Privileges
- CIS 16 Account Monitoring and Control
- CIS 20 Penetration Tests and Red Team Exercises
Products aligned with CIS20 provide a foundation for most other control frameworks and regulatory authorities.
- Identity Access Management Integrations
- Security Information & Event Management Integrations
- IT Service Management Integrations
Not sure where to start?
All it takes is a conversation to get started. Not sure what to ask or where to begin? Don’t worry. We can talk through all of that with you, too.