Constellation Analytics Platform

insider threat

Organizations with established insider threat detection programs often deploy security solutions that are optimized to perform network log monitoring and aggregation, which makes sense given that these systems excel at…

Insider Threat, Security Analytics, trust score

The financial industry’s longstanding practice of determining an individual’s suitability for a loan through the use of the personal credit score is widely accepted. Now get ready for the personal…

data

Enterprise security teams responsible for preventing insider threats have mixed feelings about acquiring and analyzing data on individuals. Sure, that data contains a wealth of knowledge about the potential for…

Fishtech

Almost every organization feels vulnerable to some form of insider threat, be it from a malicious actor, a staffer who inadvertently creates an exploitable vulnerability or a negligent employee who…

Security operations teams in search of deeper threat hunting capabilities and more streamlined investigations of workforce risks will find the enhancements they seek in the latest release of Haystax Technology’s…

insider threat

Tom Read, Haystax Technology’s Vice President of Security Analytics, has been chosen to lead a breakout session at this year’s Department of Defense Intelligence Information System (DoDIIS) Worldwide Conference in…

Fishtech

The Washington Business Journal and Kansas City Business Journal are among the media outlets that have published in-depth reports on Fishtech Group’s acquisition of Haystax Technology, which was announced on…

security risk management

IT Business Edge has identified Haystax Technology’s Constellation Analytics Platform as a top security risk management tool in a recent article. “Threats are out there,” the publication states, “and you…

The user behavior analytics market is fragmenting into fewer ‘pure-play’ UBA vendors and a larger number of more traditional security products with core UBA technologies and features embedded in them,…