DataStealth Logo 2018 WHITE-2

Because Intruders Cannot Steal What Is Not There



Let's Chat


     |     1-855-55-DATEX      Twitter   LinkedIn  



What is DataStealth


DataStealth is a revolutionary new approach to data security - one that can truly achieve what virtually all the other available data security technologies cannot - actually prevent hackers from accessing and stealing your sensitive data. 


Isn’t that way too bold a claim?

Not at all. In fact, we’ll be bolder. Had DataStealth been used instead of more traditional solutions, most companies that have been breached would not have had their most valuable asset stolen ... their data.



How does DataStealth work


DataStealth is a data protection platform that applies data protection policies to network traffic in real-time, on the fly.

From a technical perspective, DataStealth inspects network traffic at the packet level, extracts data that matches the Data Protection Policy, replaces the extracted data with substitutes to be sent downstream, and secures the original data using a unique secure storage methodology.

From a business perspective, DataStealth takes your organizations privacy, compliance, governance and regulatory requirements, and combines them with our tokenization, anonymization and encryption technologies to create a Data Protection Policy, which is then applied to all network traffic passing through DataStealth.

The original data elements can be restored at any point in the future, but only for authorized users, and for authorized use cases.

The real data isn't transmitted or stored downstream of DataStealth. In the event of a network breach, there is no sensitive data for an intruder to steal. 

Intruders Cannot Steal What Is Not There.


Learn More

What is so different about DataStealth 



DataStealth is Fast and Easy

DataStealth is a plug- and-play solution that does not need to be integrated with any down- stream technologies. There is no requirement for application changes, no software to install, no databases, no agents, no APIs, no browser plugins to install, and no key management required.

DataStealth is for Everything

DataStealth supports a very large number of payloads and protocols and can protect many types of data, documents, databases, applications, Cloud apps and more.

DataStealth works Everywhere

DataStealth can be deployed as a physical or virtual appliance, can be deployed on-premise, hosted, or in any Cloud platform, and can be run as a managed service or self- managed.






What problems can DataStealth solve

payment card

Tokenization for PCI Compliance

Scope Reduction

DataStealth removes all payment card information from data and documents BEFORE it enters a customer’s network, removing their network from the scope of a PCI Compliance audit, which can decrease the scope of an annual PCI Compliance audit by up to 95%. 

Tell Me More ...


Anonymization for GDPR and

Data Residency

DataStealth identifies personal information embedded within data and documents, and replaces that data with substitute values, in real-time, on the fly. DataStealth can cascade through an entire set of data or documents for personal information and automatically apply data protection. 

Tell Me More ...

hidden eye-1

Attribute Based Access Controls for Data Privacy

Controlling and managing access to sensitive data has been an ongoing challenge for decades. DataStealth's Attribute Based Access Control (ABAC) provides an attribute-based approach to accommodate a wide breadth of policies, and simplifies access control management by putting the control of private data back to the control organization. 

Tell Me More ...


Obfuscation for Test Data Management

When moving data from a production environment to a development environment, DataStealth can obfuscate regulated and/or restricted information as the data flows across the network. Developers, analysts, and researchers are able to work with fully obfuscated data, significantly reducing the risk profile.

Tell Me More ...

Why have I never heard of DataStealth


Every once in a while, an innovative and revolutionary idea is developed on a napkin, or in a small garage, somewhere in the world. You don't need to look further than companies like HPE, Dell, Apple or Uber for historical examples of this phenomenon. And now you can add DataStealth to that list.

As we have grown, so have our relationships, with some of the largest global technology companies in the world. They understand how we are changing the game in data protection, and we are proud that they stand behind us.

  • DataStealth is a Global HPE OEM Partner
  • DataStealth is a Global Ingram Micro Partner 

Customer Success Stories

Our customers are solving some interesting challenges when deploying DataStealth

A picture is worth a thousand words


Watch our video

60 seconds is all it takes.



Learn about DataStealth

See DataStealth in action.

Hear from our customers

Our customers love to brag about how well they sleep at night.

Contact Us

Find out how to take the next steps.


How can I prove it works


We understand that you may want to try before you buy. And we are perfectly fine with that. That is why we offer a 100% risk free Proof of Concept to our customers.

Our Proof of Concept is not just a slick sales deck or a smoke and mirrors show. We will show you how DataStealth will work for your use case, with your data, in your environment. And we will do all of the heavy lifting to make it happen.

If DataStealth cannot do what we say it can do, you just walk away without any obligations. You won't even receive an invoice to pay. We have never had a POC fail, and are happy to put our money where our mouth is.


Let's Chat

Upcoming Events


  • Collision 2019

    May 20 - 23, Toronto ON

  • HPE Discover 2019

    June 18 - 20, Las Vegas NV

  • SecTor 2019

    October 7 10, Toronto ON

The Stealth Report

 What is happening in the world of Cybersecurity
Go to our Blog

Looking to have "The Stealth Report" delivered to your inbox each month.

Our Team

Our Mission Statement:

Allowing our customers to sleep at night knowing that their most valuable assets are protected

Abe Schwartz


Abe has spent the last 40 years successfully launching, funding, and commercializing emerging technology companies.


Ed Leavens


Ed is a motivational leader that initiates and executes new and advanced technologies, with proven success in complex environments.

Marc Carrafiello


Marc has significant IT experience as an infrastructure specialist both with enterprise architecture and information security

Derek Schenk


Derek is a seasoned technologist with significant experience implementing software solutions and authoring top quality, high performance code.

Allan Kennedy

Director, Channel Sales

Allan is a goal-oriented technology executive with a consistent track record of delivering results, with 20+ years of experience in providing technology solutions to organizations that align with their long term business goals. 


Every technology company needs a dog, don't they?