Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • For School Safety
    • For Event Security
    • For Law Enforcement
    • For Emergency Management
    • For Fire Safety
    • Public Safety Services
  • ABOUT
    • Leadership Team
    • Our Data Science
    • Careers
    • Case Studies
    • Awards
    • Login
  • BLOG
  • RESOURCES
  • CONTACT
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology incident management Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring user behavior analytics

Analytics

Technology & Data Science Network Data is Not Enough
June 8, 2017in Technology & Data Science 0 Comments 1 Likes

Network Data is Not Enough

Can organizations identify insider threats or high-risk individuals using network data alone? Consider that many security software solutions today are optimized to perform network log monitoring and aggregation. They excel

by Peter DiBenedetto
Company News CSO logo
May 11, 2017in Company News 0 Comments 2 Likes

Haystax Technology CTO Cited in CSO Article on ‘Security Alert Fatigue’

It’s not uncommon for large enterprises to receive thousands of security alerts each month, thanks to analytics software configured to identify anomalies that may indicate a potential threat. However, an

by Haystax
Technology & Data Science Cyber security
April 12, 2017in Technology & Data Science 0 Comments 1 Likes

Managing Insider Risk: Breathalyzers and Behavioral Analytics

Embedded in Jamie Dimon’s recent revelation that one of his foreign-exchange traders used a mobile device to make a $100-million trade was an important message about individual trustworthiness as a

by John Boatman
Company News Dark Reading logo
March 31, 2017in Company News 0 Comments 2 Likes

Insider Threat Programs “Need Full Engagement,” Haystax Technology VP Tells Dark Reading

Organizations that succeed in tackling insider threats have done so by building mitigation programs with full engagement and support from both leadership and employees, says Tom Read, Haystax Technology’s VP

by John Boatman
Product Updates Haystax
March 23, 2017in Product Updates 0 Comments 0 Likes

Haystax Product Update: App, Dashboard and Map Enhancements

Following the rollout of several new capabilities focused on insider threats and behavioral analytics, Haystax Technology’s software development team has deployed a number of functional enhancements to core apps in

by John Boatman
Technology & Data Science Security analytics
February 24, 2017in Technology & Data Science 0 Comments 1 Likes

Network World: Haystax CEO Bryan Ware On Security Analytics, Redefined

Haystax Technology CEO Bryan Ware has written the second of a two-part series on how three well-known security analytics approaches can be vital tools for organizations and security analysts, provided

by Haystax
Technology & Data Science Security analytics
February 23, 2017in Technology & Data Science 0 Comments 0 Likes

Haystax Technology Publishes Security Analytics White Paper

Bayesian modeling, machine learning and rules-based systems are often cited as three of the most useful technologies for security analytics applications. The problem is that they are often poorly implemented,

by Haystax
Product Updates Assets
February 21, 2017in Product Updates 0 Comments 0 Likes

Haystax Product Update: Enhanced Behavioral Analytics

Haystax Technology has rolled out new analytic capabilities that generate more detailed, accurate and timely intelligence on adverse human activities, reducing the noise and excessive false positives that plague many

by John Boatman
Prev

Posts navigation

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
Next

The Latest at Haystax

Two Essential Tools for Successful Insider Risk Mitigation – Part 1
Two Essential Tools for Successful Insider Risk Mitigation – Part 1
Insider Threat Program Lessons Learned
Insider Threat Program Lessons Learned
Six Tips for Boosting Your Insider Threat Deterrence Capabilities
Six Tips for Boosting Your Insider Threat Deterrence Capabilities

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (147)
  • Policy & Practice (67)
  • Product Updates (48)
  • Success Stories (32)
  • Technology & Data Science (52)
  • Uncategorized (1)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

877-442-4553

Contact Haystax

© Haystax 2022 - A Fishtech LLC company. All rights reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}