Analytics

Haystax risk-mitigation software products support missions as dissimilar as critical infrastructure protection and insider threat mitigation. At the core of these diverse applications, though, is a single analytics platform designed…

insider threat

We described in Part 1 of this post why access-badge data is a valuable source of evidence as to whether an employee, contractor, vendor or customer poses a risk to…

Insider Threat, Security Analytics, trust score

The financial industry’s longstanding practice of determining an individual’s suitability for a loan through the use of the personal credit score is widely accepted. Now get ready for the personal…

data

Enterprise security teams responsible for preventing insider threats have mixed feelings about acquiring and analyzing data on individuals. Sure, that data contains a wealth of knowledge about the potential for…

The best insider threat mitigation programs often use combinations of analytic techniques to assess and prioritize workforce risk, according to a recent report by the Intelligence and National Security Alliance…

The user behavior analytics market is fragmenting into fewer ‘pure-play’ UBA vendors and a larger number of more traditional security products with core UBA technologies and features embedded in them,…

cybersecurity

Cybersecurity Ventures has named Haystax Technology to its latest Cybersecurity 500 list of “the world’s hottest and most innovative cybersecurity companies to watch in 2018.” Haystax, which developed its award-winning…

Haystax Technology has been named in Gartner Inc.’s latest Market Guide for User and Entity Behavior Analytics (UEBA) as a representative vendor in the specialized use-case category of employee monitoring…

Is the European Union’s General Data Protection Regulation (GDPR) a game-changer for security analytics? The regulation enters into force on May 25, and in this regard its 99 articles and…