skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration


STEALTHbits, which offers data access governance and Active Directory Security, has added a privileged access management (PAM) product to its portfolio, with the option for customers to integrate their own password vault into its technology.


  • STEALTHbits describes itself as "focused on protecting an organization's sensitive data and the credentials attackers use to steal that data," and as such, its products have traditionally coexisted with PAM platforms from vendors such as CyberArk (the market leader), BeyondTrust, and Thycotic within the infrastructure of its 700 or so customers.

Features and Benefits

  • Explains how STEALTHbits seeks to differentiate its PAM offering from what's currenlty available.
  • Describes how PAM has evolved beyond password vaults.

Key questions answered

  • How has PAM evolved and why are password vaults no longer the central plank of any PAM infrastructure?
  • How is STEALTHbits taking its PAM product to market and how is it charging for it?

Table of contents

Ovum view

  • Summary
  • STEALTHbits' background is in data access governance
  • PAM is a logical extension of STEALTHbits' portfolio
  • STEALTHbits envisages life beyond password vaults
  • Third-generation PAM can be vaultless
  • STEALTHbits customers are the low-hanging fruit for SbPAM


  • Further reading
  • Author

Recommended Articles


Have any questions? Speak to a Specialist

Europe, Middle East & Africa team: +44 7771 980316

Asia-Pacific team: +61 (0)3 960 16700

US team: +1 212-652-5335

Email us at

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Email us at

Contact marketing -

Already an Ovum client? Login to the Knowledge Center now