Bayesian networks

Enterprises are increasingly turning to user behavior analytics (UBA) for an array of security missions, as they confront ever-more sophisticated external threats and the possibility that even their most trusted…

Haystax Technology and SANS today released an industry survey titled “Defending Against the Wrong Enemy: 2017 SANS Insider Threat Survey” that illustrates the importance of managing internal threats to win…

Insider Threat, Security Analytics

Few things in life can be expressed in black and white terms. Sure, a light switch is either on or it’s off; one baseball team wins the World Series each…

Can organizations identify insider threats or high-risk individuals using network data alone? Consider that many security software solutions today are optimized to perform network log monitoring and aggregation. They excel…

Cyber security

Embedded in Jamie Dimon’s recent revelation that one of his foreign-exchange traders used a mobile device to make a $100-million trade was an important message about individual trustworthiness as a…

Constellation

Following the rollout of several new capabilities focused on insider threats and behavioral analytics, Haystax Technology’s software development team has deployed a number of functional enhancements to core apps in…

Security analytics

Bayesian modeling, machine learning and rules-based systems are often cited as three of the most useful technologies for security analytics applications. The problem is that they are often poorly implemented,…

Haystax Technology’s Constellation Analytics Platform™ has won the 2017 Cybersecurity Excellence Award in the Security Analytics product category. The excellence awards are an annual competition honoring individuals, products and companies…

Haystax Technology’s Constellation Analytics Platform™ now gives users the ability to run data through more than one risk model, a major upgrade that gives them greater flexibility in deploying the…