Ask our experts

Ask our subject-matter experts

Tell us a bit about yourself

Haystax: Prioritized Risks, Actionable Intelligence

Platform

By using Constellation, organizations move to a dynamic and predictive risk posture, make quicker decisions and speed remediation for more effective protection of their critical systems, data, facilities and people.

 

Start your free trial

Platform

By using Constellation, organizations move to a dynamic and predictive risk posture, make quicker decisions and speed remediation for more effective protection of their critical systems, data, facilities and people.

 

Home > Security Analytics Platform

About Constellation

We’ve hit upon a novel approach to security analytics. Instead of starting with a massive pool of data and then mining it for usable threat intelligence, we first build a system for transforming human expertise into models that can evaluate complex security problems. With further analytics we can then automatically score the highest-priority threat signals and rapidly deliver them to the right people at the right time. We have also built a tightly integrated ‘ecosystem’ of web and mobile apps to enable our users to manage their critical assets and incident responses.

The result is our on-premise or cloud-based Constellation Analytics Platform™ for early threat detection, situational awareness and information sharing. Here’s how it works:

About Constellation

We’ve hit upon a novel approach to security analytics. Instead of starting with a massive pool of data and then mining it for usable threat intelligence, we first build a system for transforming human expertise into models that can evaluate complex security problems. With further analytics we can then automatically score the highest-priority threat signals and rapidly deliver them to the right people at the right time. We have also built a tightly integrated ‘ecosystem’ of web and mobile apps to enable our users to manage their critical assets and incident responses.

The result is our on-premise or cloud-based Constellation Analytics Platform™ for early threat detection, situational awareness and information sharing. Here’s how it works:

Model first

We start with a thorough understanding of an organization’s top risks by using its own experts to help us build a mathematical representation – that is, a model – of the problem, folding in such factors as existing workflows and expected user behaviors. We then transform the model into software. This method is better suited to solving those classes of hard problems for which a data-centric approach is ineffective or does not scale well.

At the core of our approach is Bayesian probability theory, an esoteric-sounding term that simply means it’s possible to come up with a surprisingly accurate prediction of the likelihood of something happening (or not happening) in a transparent and analytically defensible way. Probabilities and their relative importance are baked into each node of the model, making it an excellent tool for spotting even weak indicators of unusual activity, or unprecedented ‘black swan’ events. Because no single model will work for every situation, we tailor our models to prioritize different risks according to what’s important to a particular organization, whether its job is to prevent terrorism, detect insider threats, fight cyber-fraud or close security gaps.

Model first

We start with a thorough understanding of an organization’s top risks by using its own experts to help us build a mathematical representation – that is, a model – of the problem, folding in such factors as existing workflows and expected user behaviors. We then transform the model into software. This method is better suited to solving those classes of hard problems for which a data-centric approach is ineffective or does not scale well.

At the core of our approach is Bayesian probability theory, an esoteric-sounding term that simply means it’s possible to come up with a surprisingly accurate prediction of the likelihood of something happening (or not happening) in a transparent and analytically defensible way. Probabilities and their relative importance are baked into each node of the model, making it an excellent tool for spotting even weak indicators of unusual activity, or unprecedented ‘black swan’ events. Because no single model will work for every situation, we tailor our models to prioritize different risks according to what’s important to a particular organization, whether its job is to prevent terrorism, detect insider threats, fight cyber-fraud or close security gaps.

Bring in all relevant data

Once the model is in place, it can generate results immediately. But when data relevant to the domain problem is added, users start to get real insights. The data can come from any internal, third-party or open source – for example network activity, access records, investigations and case data, employee records, news or security sensor feeds – and be structured or unstructured, static or streaming.

Constellation components extract, disambiguate, augment, evaluate and enhance the data, and apply it to the model to make inferences. Using simple connectors and configuration tools intuitive enough for any non-technical person to grasp, users can add data as they discover it and apply it to the problem at hand. We’ve engineered Constellation from the ground up to be able to handle any size or speed of data, so it expands as the threats expand. And because Constellation continuously maps new data inputs, users get continuously updated awareness of their environment.

Bring in all relevant data

Once the model is in place, it can generate results immediately. But when data relevant to the domain problem is added, users start to get real insights. The data can come from any internal, third-party or open source – for example network activity, access records, investigations and case data, employee records, news or security sensor feeds – and be structured or unstructured, static or streaming.

Constellation components extract, disambiguate, augment, evaluate and enhance the data, and apply it to the model to make inferences. Using simple connectors and configuration tools intuitive enough for any non-technical person to grasp, users can add data as they discover it and apply it to the problem at hand. We’ve engineered Constellation from the ground up to be able to handle any size or speed of data, so it expands as the threats expand. And because Constellation continuously maps new data inputs, users get continuously updated awareness of their environment.

Connect the dots at scale

The Constellation platform for security analytics is designed to separate critical signals from insignificant noise. A library of ingestion and extraction rules enables the data to be processed at scale and used as evidence of anomalous behavior and malicious intent. The system analyzes and scores data, using the model to identify hidden causalities and relationships or expose potential blind spots, then assigns a priority level to each risk event. Automated messages are generated from the alerting engine on indications of an emerging or high risk. The net effect is a drastic reduction in data overload and analyst fatigue, and earlier detection of the most important threats. As a result, decision-makers are better prepared, empowering them to act with confidence when a crisis strikes.

Connect the dots at scale

The Constellation platform for security analytics is designed to separate critical signals from insignificant noise. A library of ingestion and extraction rules enables the data to be processed at scale and used as evidence of anomalous behavior and malicious intent. The system analyzes and scores data, using the model to identify hidden causalities and relationships or expose potential blind spots, then assigns a priority level to each risk event. Automated messages are generated from the alerting engine on indications of an emerging or high risk. The net effect is a drastic reduction in data overload and analyst fatigue, and earlier detection of the most important threats. As a result, decision-makers are better prepared, empowering them to act with confidence when a crisis strikes.

Anticipate and respond with confidence

The Constellation ecosystem includes ready-to-use apps for collaborative visualization, threat alerting, asset cataloging, event monitoring and incident reporting – all viewable on a single screen, on any device. Our apps were designed with the user in mind and are easy to learn. A powerful set of administrator functions gives authorized personnel extensive control over inviting and registering new users, and in deciding their roles, access levels and functional permissions. Operationally, Constellation apps have been deployed with major commercial, local, state and federal agencies during routine security operations, large special events, and all manner of natural disasters and major incidents.

Anticipate and respond with confidence

The Constellation ecosystem includes ready-to-use apps for collaborative visualization, threat alerting, asset cataloging, event monitoring and incident reporting – all viewable on a single screen, on any device. Our apps were designed with the user in mind and are easy to learn. A powerful set of administrator functions gives authorized personnel extensive control over inviting and registering new users, and in deciding their roles, access levels and functional permissions. Operationally, Constellation apps have been deployed with major commercial, local, state and federal agencies during routine security operations, large special events, and all manner of natural disasters and major incidents.

The technical part

The Constellation Analytics Platform™ is designed to scale and work in mission critical environments. Users need only to bring us their interesting challenges, and the system will deliver results at the volume and speed required. Constellation uses the Apache Storm stream processing engine to ingest, process and score incoming data streams. The processed and analyzed items are stored as objects in a no-SQL MongoDB data store for later retrieval and further processing. Various map-reduce and other scripted algorithms are run on the entire data set to compute aggregate information and trends. The data and operations are accessed through self-documented REST API calls served over HTTP. Open APIs and Webhooks ensure our system is not a walled garden: it’s easy to get data in, and easy to get insight out. The entire platform runs on the Linux operating system.

The technical part

The Constellation Analytics Platform™ is designed to scale and work in mission critical environments. Users need only to bring us their interesting challenges, and the system will deliver results at the volume and speed required. Constellation uses the Apache Storm stream processing engine to ingest, process and score incoming data streams. The processed and analyzed items are stored as objects in a no-SQL MongoDB data store for later retrieval and further processing. Various map-reduce and other scripted algorithms are run on the entire data set to compute aggregate information and trends. The data and operations are accessed through self-documented REST API calls served over HTTP. Open APIs and Webhooks ensure our system is not a walled garden: it’s easy to get data in, and easy to get insight out. The entire platform runs on the Linux operating system.

Please click on the links below to learn more about our mission-specific products.

_

Insider Threat

Converged Security

Financial Fraud

Learn more

_

White Paper: Three Security Analytics Approaches That (Mostly) Don't Work

We're hiring!

_

At Haystax Technology, we’re always on the lookout for top-flight software developers, analysts, data scientists, professional services engineers, sales engineers and more. Check out our Jobs page for our latest open positions.

Scientific White Paper: Target Beliefs for SME-oriented, Bayesian Network-based Modeling

Learn more

_

White Paper: Three Security Analytics Approaches That (Mostly) Don't Work

_

Scientific White Paper: Target Beliefs for SME-oriented, Bayesian Network-based Modeling

We're hiring!

_

At Haystax Technology, we’re always on the lookout for top-flight software developers, analysts, data scientists, professional services engineers, sales engineers and more. Check out our Jobs page for our latest open positions.

What is Constellation?


Constellation is a platform that analytically monitors threats and prioritizes risk, allowing leaders and operators to act with confidence when it matters most. Download the Constellation information sheet for additional details and answers to frequently asked questions.

Diagram for Constellation
_