Ask our experts

Ask our subject-matter experts

Tell us a bit about yourself

Haystax: Prioritized Risks, Actionable Intelligence

Insider Threat

The only solution that establishes and continuously evaluates a ‘whole person’ model of trustworthiness to pinpoint insider threats early and accurately.

Start your free trial

Insider Threat

The only solution that establishes and continuously evaluates a ‘whole person’ model of trustworthiness to pinpoint insider threats early and accurately.

Home > Security Analytics Products > Insider Threat

Don't just detect threats, anticipate them

Today’s insider threat actors are often too well concealed for organizations to detect using traditional human-based or technological methods. Moreover, an insider who radicalizes and attacks a military base looks nothing like an insider who steals documents and compromises confidential information. They are nonetheless detectable, because they generate distinctive indicators often long before they do damage to an organization.

Don't just detect threats, anticipate them

Today’s insider threat actors are often too well concealed for organizations to detect using traditional human-based or technological methods. Moreover, an insider who radicalizes and attacks a military base looks nothing like an insider who steals documents and compromises confidential information. They are nonetheless detectable, because they generate distinctive indicators often long before they do damage to an organization.

The Haystax way

We start with our patented ‘whole-person’ model named Carbon that uses so-called Bayesian networks to prioritize and rank hundreds of different human behaviors. Data can come from an organization’s internal repositories, such as access systems, incident and case management systems, performance reviews and network monitoring systems, or from public sources. And because Constellation runs continuously, a pattern of life over time can be derived as data is added, showing when an individual is deviating or trending in a negative direction.

When threats detected by Constellation exceed pre-established thresholds, the system will prioritize them and recommended actions to the user. A working system can be deployed in a matter of weeks, not months or years.

The Haystax way

We start with our patented ‘whole-person’ model named Carbon that uses so-called Bayesian networks to prioritize and rank hundreds of different human behaviors. Data can come from an organization’s internal repositories, such as access systems, incident and case management systems, performance reviews and network monitoring systems, or from public sources. And because Constellation runs continuously, a pattern of life over time can be derived as data is added, showing when an individual is deviating or trending in a negative direction.

When threats detected by Constellation exceed pre-established thresholds, the system will prioritize them and recommended actions to the user. A working system can be deployed in a matter of weeks, not months or years.

Why is it better

The primary benefit of our approach is that it helps organizations find the needle in the haystack earlier than conventional insider threat methods and technologies. It is able to discern even weak signals and slight anomalies at machine scale and flag these up for human intervention, finding threats that other tools will miss. And because Constellation is transparent rather than ‘black-boxed’, the user can see why a risk score or probability is being calculated a certain way.

Why is it better

The primary benefit of our approach is that it helps organizations find the needle in the haystack earlier than conventional insider threat methods and technologies. It is able to discern even weak signals and slight anomalies at machine scale and flag these up for human intervention, finding threats that other tools will miss. And because Constellation is transparent rather than ‘black-boxed’, the user can see why a risk score or probability is being calculated a certain way.

Learn more

_

Product Fact Sheet: Brief overview summary of Constellation for Insider Threat

eBook: Insider Attacks, a 2017 Industry Survey on Insider Threats

Scientific White Paper: Processing Events in Probabilistic Risk Assessment (2nd runner-up for Best Paper at 9th International Conference on Semantic Technologies for Intelligence, Defense, and Security (STIDS)), 2014

Learn more about what we do

_

At Haystax Technology, we’re always writing about our underlying technologies and approaches, as well as our views on the trends that impact our community of users. Click on the link below to see what we’ve published recently in papers and on our blog.