STEALTHbits Technologies, Inc., a cybersecurity software company focused on protecting organizations credentials and data, today announced it has for the eighth time in the past 10 years outperformed the Rule of 40, the principle that a companys combined growth rate and profit margin should exceed 40%. The Rule is a hugely popular venture capital and growth equity framework for assessing a software companys comprehensive financial performance.
According to the widely cited Bain & Company article from December 20, 2018 by Thierry Depeyrot and Simon Heap, Consistently outperforming the Rule of 40 is difficult. In an analysis of 86 companies researched from 2013 to 2017, just 25% outperformed the Rule of 40 for three or more years, and only 16% outperformed for all five years¦ . The fact that STEALTHbits reliably surpasses the 40% mark underscores the organizations financial strength and puts STEALTHbits in an elite class of software companies one that does not include either of its public competitors.
As STEALTHbits faces off against publicly-traded competitors like SailPoint and Varonis, its important for the market to be aware of STEALTHbits financial strength, longevity, and trusted status in the industry. With global deployments in many of the worlds largest, most complex IT infrastructures, STEALTHbits financial accolades are underwritten by a comprehensive portfolio of products and solutions that continually exceed the high expectations of the most demanding businesses in the world.
Its important to emphasize that financial outperformance is always driven by a match between customers demands, and the breadth, depth, and quality of a product offering, said Vinny Smith, founder of STEALTHbits investor Toba Capital. As STEALTHbits outperforms its competitors, we will maintain our tenacious focus on R&D, product innovation, and customer success.
ABOUT STEALTHBITS TECHNOLOGIES
STEALTHbits Technologies, Inc. is a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements, and decrease operations expense.
Identify threats. Secure data. Reduce risk.
Madison Alexander PR
Mobile: +1 949-231-2965