Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • For School Safety
    • For Event Security
    • For Law Enforcement
    • For Emergency Management
    • For Fire Safety
    • Public Safety Services
  • ABOUT
    • Leadership Team
    • Our Data Science
    • Careers
    • Case Studies
    • Awards
    • Login
  • BLOG
  • RESOURCES
  • CONTACT
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology incident management Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring user behavior analytics
PrevHaystax Named Top Technology Innovator26 October 2016NextPublic safetyCal COP To Support Palm Springs Pride Festival03 November 2016
Bayesian Network
  • Technology & Data Science

Overcoming Objections to Bayesian Networks – Part 1

October 27, 2016

By Ryan Couch

In an earlier blog post we discussed the advantages of using Bayesian Networks as a representation for reasoning in complex problem domains. Despite these advantages, there are many who argue that Bayesian Networks are not sufficient for representing some types of real-world problems. Over the next several blog posts we will discuss some of these objections, and demonstrate that the objections can be overcome by clear thinking and appropriate models.

One objection to the use of Bayesian Networks, or of probability in general, is that the real world is too vague and imprecise to be represented by the strict rules of probability. Proponents of fuzzy logic, for example, argue that many real-world concepts do not conform to the requirements of probability, and therefore require an alternative representation like, well, fuzzy logic. Formally fuzzy logic is a “form of many-valued logic in which the truth variables may be any real number between 0 and 1, considered to be ‘fuzzy’”. In contrast, probability theory requires that the truth value of a proposition must be 0 (false) or 1 (true), with a constraint that the probability of all possible states of a variable must sum to 1. The probability of a proposition is then the proportion of a population for which the proposition is true (frequentist probability) or it is our current belief that a proposition is true (Bayesian, subjective probability).

A simple example will illustrate the issue. Suppose we have data about the height of an individual. The data we have consists of a number of text descriptions of the person that each contain a reference to the person’s height with labels of ‘tall’, ‘medium height’ or ‘short’. The fuzzy logic argument is that there is no crisp definition of these labels. What is ‘tall’ to one observer may be ‘medium height’ to another. The fuzzy solution is to admit that someone can be simultaneously ‘tall’ and of ‘medium height’, or simultaneously ‘medium height’ and ‘short.’ Or potentially even members of all three simultaneously. This is done by membership functions to map specific heights to the three labels. Proponents of fuzzy logic argue that since an individual can be in more than one state at a time (e.g., simultaneously ‘tall’ and ‘medium height’) that this is a violation of the laws of probability – which require that only one proposition can be true – and that therefore a probabilistic model cannot represent this problem.

But in fact we can represent this problem in a Bayesian Network, using probabilities. We start with a variable that represents the true, but unknown, height of the individual. This is a continuous variable, which we can represent in a Bayesian Network as a discretized continuous variable. Then we represent the text labels that come from the descriptions as observations on the true height. (Note: The illustrations below are done using Netica, a commercial Bayesian Network development package from Norsys).

We start with a random variable that represents the individual’s true height.

blog-bn-01

For this simple example there are eight possible discrete states that cover the possible values from 0 to greater than 7 feet. If more precision is required, a finer discretization can be used. The belief bars in the node show the prior distribution, in percentages, that has been assigned to these states. (The specific numbers are neither authoritative nor important; what’s important here is the modeling approach.)

Then we need a node that represents the possible text labels: ‘tall’, ‘medium height’ or ‘short’. This node represents an observation of the true height. To reason in a causal direction, it is the true height that is the cause of the observation, so in the Bayesian Network there is an arc from the True Height node to the Height Label Observation node.

blog-bn-02

Because the Height Label Observation node has a parent, we need to define the conditional probability distribution (CPD) for the Height Label Observation node. For distributions with discrete (or discretized) variables, the CPD is a conditional probability table (CPT). Here is what it looks like in Netica (numbers in percentages).

blog-bn-03

Each row of this table is the conditional probability of Height Label Observation, given the true state of True Height. In the first row, given that the true height is SevenFeetPlus the probability distribution across the possible labels is [100, 0, 0]. So no uncertainty there. Another example is the row for FiveEight-SixFeet: given that the True Height is between 5’8” and 6’, the probability distribution for an observer assigning a height label is [22, 67, 11].

Let’s consider what this CPT means. For any true height, there may be uncertainty in what label a random observer may apply. If we knew something about a specific observer, or about the conditions under which the observation was made, we could tailor a CPT to an individual observer. For example, a short observer is probably more likely to assign a label of ‘tall’, and there would likely be more uncertainty if the observer was a half mile away. This kind of contextual information could be captured as additional context variables in a more complete model.

Using this CPT in the Height Label Observation node, we get this display in Netica:

blog-bn-04

The probability distribution across the states of the Height Label Observation node are calculated (by Netica) from the prior distribution of the True Height Node, and the CPT of the Height Label Observation node. Already we can apply a common-sense filter: this distribution says that our prior belief, before we read the first description, is that the height label is most likely to be ‘medium height’, with a smaller but roughly equal probability of either ‘tall’ or ‘short’. That seems reasonable.

To use these definitions to fuse multiple descriptions, we can make copies of the Height Label Observation node.

blog-bn-05

We then can apply evidence to the different observations. Suppose we have three descriptions where the three height descriptions are: ‘tall’, ‘medium height’ and ‘tall’. Here is what we get:

blog-bn-06

If the observations were ‘short’, ‘short’, and ‘tall’, we would get this:

blog-bn-07

In these examples we end up with a posterior probability distribution across the states of the True Height node. This means that whatever the actual value of the (unknown) true height is, the actual true value will fall in one and only one of the available states. We don’t know for sure which state is the correct one, but we now have an updated posterior belief, given the data and the model, across the possible states of True Height.

[Note: The example Bayesian Network discussed in this post, FuzzyObservation.neta, is available for download here. The example runs in Netica, a commercial Bayesian Network software application developed by Norsys Software Corp.  A demo version of Netica is available for free at the Norsys website that is more than sufficient to run the example Bayesian Network.]

The above example is simple, but it does illustrate that for the same kind of simple problem that is often used to justify the need for fuzzy logic, it is very straightforward to build a Bayesian Network model. Is this a better representation of this problem then a fuzzy logic model? It has the advantages of being an explicit, causal, representation of the problem, with all the advantages of being able to exploit both the laws of probabilities and all of the available statistical techniques.

Critics might ask: “where did the numbers come from?”, referring to the values in the prior and in the conditional probability distributions. In this simple example, the prior on true height could be obtained from population statistics. The conditional probability distributions could be obtained by straightforward statistical experiments or elicitation from experts. In both cases we are trying to estimate a well-known concept – a statistical probability distribution.

The counter-argument about fuzzy methods is: “where do the membership functions come from?” At least with probability distributions we can use the methods of statistics, or expert judgment (i.e., subjective beliefs of experts), to estimate distributions. Additionally, the Bayesian Network model is easy to extend, if needed, with appropriate context variables – for example, for the height of the observer, or for the conditions under which the observations were made.

All of this is not to say that fuzzy logic methods do not work. There have been lots of successful applications of fuzzy logic, and fuzzy methods are appropriate to many problems. But especially when a problem domain is complex – such as insider threat or financial fraud detection – the ability to include concepts that are often considered to be beyond the application of probability, in a consistent probabilistic model, can be very powerful. That is, the above observed height fusion model may be a small part of a much more complex Bayesian Network.

In future posts, we will examine other perceived obstacles to the use of Bayesian Networks, and show how they can be overcome.

Ed Wright, Ph.D., is a Senior Scientist at Haystax Technology.

 

  • Analytics
  • Bayesian networks
  • Modeling

Related posts

Policy & Practice Insider Threat
September 3, 2021in Policy & Practice 0 Comments 4 Likes

Insider Threats Are Evolving – Fast

Policy & Practice Using Commercially Available Data to Detect Insider Threats
April 7, 2021in Policy & Practice 0 Comments 2 Likes

Using Commercially Available Data to Detect Insider Threats

Technology & Data Science Two Essential Tools for Successful Insider Risk Mitigation – Part 1
October 11, 2020in Technology & Data Science 0 Comments 5 Likes

Two Essential Tools for Successful Insider Risk Mitigation – Part 1

Policy & Practice Insider Threat Program Lessons Learned
September 29, 2020in Policy & Practice 0 Comments 0 Likes

Insider Threat Program Lessons Learned

Technology & Data Science Counting the Costs of an Insider Attack
September 9, 2020in Technology & Data Science 0 Comments 4 Likes

Counting the Costs of an Insider Attack

Policy & Practice CDM Publishes Haystax Article on Proactive Insider Threat Mitigation
July 13, 2020in Policy & Practice 0 Comments 3 Likes

CDM Publishes Haystax Article on Proactive Insider Threat Mitigation

Product Updates assessment
April 15, 2020in Product Updates 0 Comments 7 Likes

Haystax Product Update: Insider Threat and Facility Assessments

Product Updates Using Risk Analysis to Mitigate State and Local Cyber Threats
March 18, 2020in Product Updates 0 Comments 2 Likes

Using Risk Analysis to Mitigate State and Local Cyber Threats

Company News Haystax Wins Triple Gold in Cybersecurity Excellence Awards
February 21, 2020in Company News 0 Comments 6 Likes

Haystax Wins Triple Gold in Cybersecurity Excellence Awards

Technology & Data Science Can Employee Wellness Programs Help Avert an Insider Attack?
January 17, 2020in Technology & Data Science 0 Comments 3 Likes

Can Employee Wellness Programs Help Avert an Insider Attack?

Technology & Data Science Self-Driving Cars and Insider Risk
December 27, 2019in Technology & Data Science 0 Comments 6 Likes

Self-Driving Cars and Insider Risk

Policy & Practice Insider Threat Mitigation: The ‘Whole’ Story
December 18, 2019in Policy & Practice 0 Comments 0 Likes

Insider Threat Mitigation: The ‘Whole’ Story

Policy & Practice Finding Edward Snowden: A Haystax Use Case
December 6, 2019in Policy & Practice 0 Comments 3 Likes

Finding Edward Snowden: A Haystax Use Case

Policy & Practice The doctor supports a symbol of protection of health.
November 22, 2019in Policy & Practice 0 Comments 1 Likes

The Healthcare Industry Has a Remedy for Insider Threats

Product Updates Haystax Product Update: Communications and Logging
October 18, 2019in Product Updates 0 Comments 3 Likes

Haystax Product Update: Communications and Logging

Policy & Practice Continuous Evaluation Could Save Billions, RAND Says
September 30, 2019in Policy & Practice 0 Comments 0 Likes

Continuous Evaluation Could Save Billions, RAND Says

Policy & Practice Finding Ana Montes: A Haystax Use Case
September 24, 2019in Policy & Practice 0 Comments 0 Likes

Finding Ana Montes: A Haystax Use Case

Technology & Data Science A Risk-Based, Data-Driven Approach to Continuous Vetting
September 18, 2019in Technology & Data Science 0 Comments 0 Likes

A Risk-Based, Data-Driven Approach to Continuous Vetting

Policy & Practice Insider Threat
July 11, 2019in Policy & Practice 0 Comments 2 Likes

Most UBA Doesn’t Actually Focus on the User

Policy & Practice GDPR, One Year Later
May 25, 2019in Policy & Practice 0 Comments 1 Likes

GDPR, One Year Later

Technology & Data Science Multiple-Persona Disorder: Understanding All Your Insider Threats
April 30, 2019in Technology & Data Science 0 Comments 1 Likes

Multiple-Persona Disorder: Understanding All Your Insider Threats

Company News cybersecurity
February 22, 2019in Company News 0 Comments 1 Likes

Haystax Wins Cybersecurity Excellence Gold Award

Technology & Data Science Fraud
January 31, 2019in Technology & Data Science 0 Comments 3 Likes

Small Businesses Most Vulnerable to Insider Fraud

Product Updates Haystax Product Update: Functionality Enhancements
November 19, 2018in Product Updates 0 Comments 4 Likes

Haystax Product Update: Functionality Enhancements

Policy & Practice h
October 29, 2018in Policy & Practice 0 Comments 1 Likes

‘Last-Mile’ Workflows for Tighter SOC Responses

Technology & Data Science Gleaning Deeper Insights from Badge Data – Part 2
October 8, 2018in Technology & Data Science 0 Comments 3 Likes

Gleaning Deeper Insights from Badge Data – Part 2

Company News Haystax Talks Probabilistic Modeling at MIT
October 2, 2018in Company News 0 Comments 0 Likes

Haystax Talks Probabilistic Modeling at MIT

Technology & Data Science Gleaning Deeper Insights from Badge Data – Part 1
September 23, 2018in Technology & Data Science 0 Comments 1 Likes

Gleaning Deeper Insights from Badge Data – Part 1

Policy & Practice Insider Threat, Security Analytics
September 21, 2018in Policy & Practice 0 Comments 0 Likes

Personal Trust Scoring Gains Acceptance

Technology & Data Science Get the Data You Need
September 17, 2018in Technology & Data Science 0 Comments 4 Likes

Get the Data You Need

Company News x
September 7, 2018in Company News 0 Comments 1 Likes

Haystax VP Writes Article on Insider Threat Mitigation Techniques

Company News Fishtech
August 20, 2018in Company News 0 Comments 1 Likes

At the Fishtech Pro Tour: UBA for Insider Threat

Technology & Data Science Image of Cyber Fraud model on laptop
July 5, 2018in Technology & Data Science 0 Comments 2 Likes

How Bayesian Networks Glean Better Insights During Clearance Investigations

Technology & Data Science insider threat
June 25, 2018in Technology & Data Science 0 Comments 1 Likes

The Case of the ‘Disgruntled’ Tesla Insider

Technology & Data Science Principled AI with Probabilistic Machine Learning
May 29, 2018in Technology & Data Science 0 Comments 3 Likes

Principled AI with Probabilistic Machine Learning

Technology & Data Science Gartner Sees Evolving UBA Market
May 20, 2018in Technology & Data Science 0 Comments 1 Likes

Gartner Sees Evolving UBA Market

Company News cybersecurity
May 16, 2018in Company News 0 Comments 1 Likes

Haystax Technology Named to Cybersecurity 500 List

Company News Gartner Highlights Haystax Technology in UEBA Guide
May 11, 2018in Company News 0 Comments 0 Likes

Gartner Highlights Haystax Technology in UEBA Guide

Technology & Data Science Gaussian processes
March 20, 2018in Technology & Data Science 0 Comments 0 Likes

Gaussian Processes with Spectral Mixture Kernels to Implicitly Capture Hidden Structure from Data

Product Updates Haystax Product Update: Workflow-Driven Analytics for Actionable Threat Hunting
March 19, 2018in Product Updates 0 Comments 0 Likes

Haystax Product Update: Workflow-Driven Analytics for Actionable Threat Hunting

Company News cyber
February 28, 2018in Company News 0 Comments 0 Likes

Haystax Technology is Red Hot Cyber Awardee

Policy & Practice Security Analytics and the GDPR’s ‘Right to Explanation’
February 26, 2018in Policy & Practice 0 Comments 0 Likes

Security Analytics and the GDPR’s ‘Right to Explanation’

Company News cybersecurity
February 8, 2018in Company News 0 Comments 1 Likes

Haystax Technology Takes Gold in Cybersecurity Excellence

Company News Cybersecurity
February 2, 2018in Company News 0 Comments 1 Likes

Haystax Technology is Finalist for 2018 Cybersecurity Excellence Award

Technology & Data Science Insider threats
January 8, 2018in Technology & Data Science 0 Comments 3 Likes

Mitigating Insider Threats Using Bayesian Models

Technology & Data Science Machine Learning: Expertise vs. Coverage
December 26, 2017in Technology & Data Science 0 Comments 1 Likes

Machine Learning: Expertise vs. Coverage

Technology & Data Science Using AI to Extract High-Value Threat Intel from Data
November 30, 2017in Technology & Data Science 0 Comments 2 Likes

Using AI to Extract High-Value Threat Intel from Data

Company News Haystax Technology Named Red Herring 2017 Top 100 Global Winner
November 20, 2017in Company News 0 Comments 1 Likes

Haystax Technology Named Red Herring 2017 Top 100 Global Winner

Product Updates insider threat
November 8, 2017in Product Updates 0 Comments 1 Likes

Haystax Product Update: Enhanced Insider Risk Management

Company News Haystax Technology Expands Field Ops Organization with World-Class Software Sales Executives
November 6, 2017in Company News 0 Comments 0 Likes

Haystax Technology Expands Field Ops Organization with World-Class Software Sales Executives

Technology & Data Science UBA Is Just Getting Warmed Up
October 30, 2017in Technology & Data Science 0 Comments 1 Likes

UBA Is Just Getting Warmed Up

Technology & Data Science artificial intelligence
October 20, 2017in Technology & Data Science 0 Comments 0 Likes

Beyond Machine Learning: Using Models in AI for Security

Company News cybersecurity
October 18, 2017in Company News 0 Comments 0 Likes

Haystax Technology Named 2017 SINET 16 Innovator

Company News CSO logo
October 2, 2017in Company News 0 Comments 2 Likes

CSO: Avoiding Hype Around User Behavior Analytics

Policy & Practice insider threat
September 25, 2017in Policy & Practice 0 Comments 1 Likes

Six Steps Companies Can Take to Improve Insider Threat Mitigation

Company News insider threat
September 13, 2017in Company News 0 Comments 1 Likes

Haystax Technology VP Comments on FY18 Insider Threat Program Language

Policy & Practice insider threat
September 1, 2017in Policy & Practice 0 Comments 0 Likes

Detecting an Insider Threat in Game of Thrones

Company News cybersecurity
August 25, 2017in Company News 0 Comments 0 Likes

Haystax Technology Named SINET 16 Finalist

Company News Cybersecurity
August 14, 2017in Company News 0 Comments 1 Likes

Haystax Technology Again Makes Cybersecurity 500 List

Technology & Data Science More Organizations Adopting UBA, Gartner Says
August 9, 2017in Technology & Data Science 0 Comments 1 Likes

More Organizations Adopting UBA, Gartner Says

Technology & Data Science New SANS, Haystax Technology Insider Threat Survey Reveals Malicious Actors as the Most Damaging Threat Vector for Companies
August 1, 2017in Technology & Data Science 0 Comments 0 Likes

New SANS, Haystax Technology Insider Threat Survey Reveals Malicious Actors as the Most Damaging Threat Vector for Companies

Technology & Data Science Coping with Security Data Overload in Today’s Connected World
July 10, 2017in Technology & Data Science 0 Comments 0 Likes

Coping with Security Data Overload in Today’s Connected World

Technology & Data Science Insider Threat, Security Analytics
June 23, 2017in Technology & Data Science 0 Comments 0 Likes

Why We Need More Shades of Gray in Security

Technology & Data Science Network Data is Not Enough
June 8, 2017in Technology & Data Science 0 Comments 1 Likes

Network Data is Not Enough

Company News CSO logo
May 11, 2017in Company News 0 Comments 2 Likes

Haystax Technology CTO Cited in CSO Article on ‘Security Alert Fatigue’

Technology & Data Science Cyber security
April 12, 2017in Technology & Data Science 0 Comments 1 Likes

Managing Insider Risk: Breathalyzers and Behavioral Analytics

Company News Dark Reading logo
March 31, 2017in Company News 0 Comments 2 Likes

Insider Threat Programs “Need Full Engagement,” Haystax Technology VP Tells Dark Reading

Product Updates Haystax
March 23, 2017in Product Updates 0 Comments 0 Likes

Haystax Product Update: App, Dashboard and Map Enhancements

Technology & Data Science Security analytics
February 24, 2017in Technology & Data Science 0 Comments 1 Likes

Network World: Haystax CEO Bryan Ware On Security Analytics, Redefined

Technology & Data Science Security analytics
February 23, 2017in Technology & Data Science 0 Comments 0 Likes

Haystax Technology Publishes Security Analytics White Paper

Product Updates Assets
February 21, 2017in Product Updates 0 Comments 0 Likes

Haystax Product Update: Enhanced Behavioral Analytics

Company News Security analytics
February 13, 2017in Company News 0 Comments 0 Likes

Haystax Technology Wins Two Cybersecurity Awards Ahead of RSA Conference

Company News Haystax Technology Wins 2017 Cybersecurity Excellence Award for Security Analytics
February 8, 2017in Company News 0 Comments 0 Likes

Haystax Technology Wins 2017 Cybersecurity Excellence Award for Security Analytics

Product Updates Haystax Product Update: Multiple Model Support
February 8, 2017in Product Updates 0 Comments 0 Likes

Haystax Product Update: Multiple Model Support

Company News security analytics
February 3, 2017in Company News 0 Comments 2 Likes

Haystax Named Finalist for 2017 Cybersecurity Excellence Awards

Company News Haystax Technology to Provide Security Analytics for Super Bowl
January 30, 2017in Company News 0 Comments 0 Likes

Haystax Technology to Provide Security Analytics for Super Bowl

Policy & Practice Insider Threat, Security Analytics
January 18, 2017in Policy & Practice 0 Comments 0 Likes

Insider Threat and Security Clearance Reform: A Chance to Accelerate Change

Company News Security analytics
January 11, 2017in Company News 0 Comments 1 Likes

Fortune Highlights Fishtech’s Investment in Haystax Technology

Technology & Data Science Overcoming Objections to Bayesian Networks – Part 2
January 4, 2017in Technology & Data Science 0 Comments 0 Likes

Overcoming Objections to Bayesian Networks – Part 2

Company News Cyber security
December 8, 2016in Company News 0 Comments 1 Likes

Washington Post Reports on Haystax Technology-Fishtech Partnership

Technology & Data Science Security analytics
December 2, 2016in Technology & Data Science 0 Comments 0 Likes

Network World Cites Haystax Technology CEO in AI Piece

Company News Cybersecurity
November 22, 2016in Company News 0 Comments 1 Likes

Haystax Named Top Cybersecurity Company to Watch in 2017

Technology & Data Science Insider Threat, Security Analytics
October 11, 2016in Technology & Data Science 0 Comments 1 Likes

Haystax CEO: Effective Security Analytics for Insider Threat Prevention

Technology & Data Science A Security Analytics Approach That Does Work
September 29, 2016in Technology & Data Science 0 Comments 1 Likes

A Security Analytics Approach That Does Work

Company News Haystax Technology Named Most Outstanding Analytics & Cybersecurity Company
September 20, 2016in Company News 0 Comments 0 Likes

Haystax Technology Named Most Outstanding Analytics & Cybersecurity Company

Technology & Data Science Security analytics
September 9, 2016in Technology & Data Science 0 Comments 0 Likes

Network World: Haystax CEO Bryan Ware On Managing Insider Threats

Technology & Data Science Three Weaknesses of Rules-Based Systems
September 6, 2016in Technology & Data Science 0 Comments 1 Likes

Three Weaknesses of Rules-Based Systems

Technology & Data Science Machine Learning vs. Model-First Approaches to Analytics
August 31, 2016in Technology & Data Science 0 Comments 0 Likes

Machine Learning vs. Model-First Approaches to Analytics

Policy & Practice Insider Threat, Security Analytics
August 26, 2016in Policy & Practice 0 Comments 0 Likes

Is Yesterday’s Trusted Employee Today’s Insider Threat? And How Would You Know?

Technology & Data Science Three Security Analytics Approaches That (Mostly) Don’t Work
August 15, 2016in Technology & Data Science 0 Comments 0 Likes

Three Security Analytics Approaches That (Mostly) Don’t Work

Company News Haystax Technology Named Most Innovative Analytics & Cybersecurity Company
April 5, 2016in Company News 0 Comments 1 Likes

Haystax Technology Named Most Innovative Analytics & Cybersecurity Company

Company News Haystax Selected to Present Advanced Threat Analytic Applications for Insider Threat Detection at STIDS – 2014 Conference
November 13, 2014in Company News 0 Comments 0 Likes

Haystax Selected to Present Advanced Threat Analytic Applications for Insider Threat Detection at STIDS – 2014 Conference

Company News Haystax Selected to Present at IC Cloud Technology Expo in Langley, VA
September 11, 2014in Company News 0 Comments 2 Likes

Haystax Selected to Present at IC Cloud Technology Expo in Langley, VA

The Latest at Haystax

Preventing School Violence: Challenges and Opportunities
Preventing School Violence: Challenges and Opportunities
2021 Insider Threat Lessons Learned
2021 Insider Threat Lessons Learned
Haystax Insider Threat Expert Contributes to INSA Paper
Haystax Insider Threat Expert Contributes to INSA Paper

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (147)
  • Policy & Practice (66)
  • Product Updates (48)
  • Success Stories (30)
  • Technology & Data Science (52)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

877-442-4553

Contact Haystax

© Haystax 2022 - A Fishtech LLC company. All rights reserved.