Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • Pandemic Response
    • Insider Threat Mitigation
    • Public Safety
      • For Law Enforcement
      • For Fire Safety
      • For School Safety
      • For Emergency Management
      • For Event Security
    • Enterprise Security
    • Cyber Crime Prevention
    • Continuous Evaluation
    • Consulting Services
  • WHO WE ARE
    • Leadership Team
    • About Fishtech Group (Parent Company)
    • Our Data Science
    • Haystax Partner Program
    • Careers
    • CASE STUDIES
    • AWARDS
  • BLOG
  • RESOURCES
  • CONTACT
  • LOGIN
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring UBA user behavior analytics

Technology & Data Science

Technology & Data Science Coping with Security Data Overload in Today’s Connected World
July 10, 2017in Technology & Data Science 0 Comments 0 Likes

Coping with Security Data Overload in Today’s Connected World

The way we generate information about ourselves today — increasingly through social media, computer networks and connected devices — has forced security professionals to re-evaluate how they capture data, analyze

by admin
Technology & Data Science Insider Threat, Security Analytics
June 23, 2017in Technology & Data Science 0 Comments 0 Likes

Why We Need More Shades of Gray in Security

Few things in life can be expressed in black and white terms. Sure, a light switch is either on or it’s off; one baseball team wins the World Series each

by Bryan Ware
Technology & Data Science Network Data is Not Enough
June 8, 2017in Technology & Data Science 0 Comments 0 Likes

Network Data is Not Enough

Can organizations identify insider threats or high-risk individuals using network data alone? Consider that many security software solutions today are optimized to perform network log monitoring and aggregation. They excel

by Peter DiBenedetto
Technology & Data Science Cyber security
April 12, 2017in Technology & Data Science 0 Comments 0 Likes

Managing Insider Risk: Breathalyzers and Behavioral Analytics

Embedded in Jamie Dimon’s recent revelation that one of his foreign-exchange traders used a mobile device to make a $100-million trade was an important message about individual trustworthiness as a

by John Boatman
Technology & Data Science Insider threat
March 29, 2017in Technology & Data Science 0 Comments 0 Likes

New Haystax Technology Survey Shows Most Organizations Ill-Prepared for Insider Threats

Haystax Technology, a leading security analytics platform provider, is today releasing an industry survey, titled Insider Attacks, that provides new data and insights into the current state of the insider

by admin
Technology & Data Science Security analytics
February 24, 2017in Technology & Data Science 0 Comments 0 Likes

Network World: Haystax CEO Bryan Ware On Security Analytics, Redefined

Haystax Technology CEO Bryan Ware has written the second of a two-part series on how three well-known security analytics approaches can be vital tools for organizations and security analysts, provided

by admin
Technology & Data Science Security analytics
February 23, 2017in Technology & Data Science 0 Comments 0 Likes

Haystax Technology Publishes Security Analytics White Paper

Bayesian modeling, machine learning and rules-based systems are often cited as three of the most useful technologies for security analytics applications. The problem is that they are often poorly implemented,

by admin
Technology & Data Science Security analytics
January 13, 2017in Technology & Data Science 0 Comments 0 Likes

Haystax Technology CEO on Security Analytics

Bryan Ware, Haystax Technology’s CEO and a regular contributor to Network World, today published his insights on three popular security analytics approaches – Bayesian networks, machine learning and rules-based systems

by admin
Prev

Posts navigation

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
Next

The Latest at Haystax

Haystax School Safety Users to Speak at ASIS Conference
Haystax School Safety Users to Speak at ASIS Conference
Haystax Product Update: Insider Threat and Facility Assessments
Haystax Product Update: Insider Threat and Facility Assessments
Dark Reading: Haystax Insider Threat Expert Discusses High-Risk Assets
Dark Reading: Haystax Insider Threat Expert Discusses High-Risk Assets

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (146)
  • Policy & Practice (62)
  • Product Updates (45)
  • Success Stories (30)
  • Technology & Data Science (52)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

571-297-3800

Contact Us

Haystax / Fishtech Northern Virginia
8251 Greensboro Dr., Suite 1000, McLean, VA 22102
Fishtech Headquarters
13333 Holmes Rd., Kansas City, MO 64146
Cyber Defense Center
13323 Holmes Rd., Kansas City, MO 64146

Haystax is a wholly owned subsidiary of Fishtech Group. Fishtech Group is a data-driven cybersecurity services provider ensuring our clients’ secure digital transformation.

Contact Us

© Haystax 2021 - A Fishtech Group, LLC Company. All Rights Reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}