Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • Pandemic Response
    • Insider Threat Mitigation
    • Safety & Security
      • For Law Enforcement
      • For Fire Safety
      • For School Safety
      • For Emergency Management
      • For Event Security
    • Enterprise Security
    • Cyber Crime Prevention
    • Continuous Vetting
    • Consulting Services
  • WHO WE ARE
    • Leadership Team
    • About Fishtech Group (Parent Company)
    • Our Data Science
    • Haystax Partner Program
    • Careers
    • CASE STUDIES
    • AWARDS
  • BLOG
  • RESOURCES
  • CONTACT
  • LOGIN
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring UBA user behavior analytics

Bayesian networks

Technology & Data Science Overcoming Objections to Bayesian Networks – Part 2
January 4, 2017in Technology & Data Science 0 Comments 0 Likes

Overcoming Objections to Bayesian Networks – Part 2

This is the second in a series of blog posts that will look at how common objections to the use of Bayesian networks can be overcome by clear thinking and

by Ryan Couch
Company News Cyber security
December 8, 2016in Company News 0 Comments 0 Likes

Washington Post Reports on Haystax Technology-Fishtech Partnership

The Washington Post has published a detailed article on Fishtech’s strategic investment in Haystax Technology, which was announced this morning. Fishtech, led by Gary Fish, a Kansas City-based entrepreneur and

by admin
Technology & Data Science Bayesian Network
October 27, 2016in Technology & Data Science 0 Comments 0 Likes

Overcoming Objections to Bayesian Networks – Part 1

In an earlier blog post we discussed the advantages of using Bayesian Networks as a representation for reasoning in complex problem domains. Despite these advantages, there are many who argue

by Ryan Couch
Technology & Data Science Insider Threat, Security Analytics
October 11, 2016in Technology & Data Science 0 Comments 0 Likes

Haystax CEO: Effective Security Analytics for Insider Threat Prevention

Organizations attempting to implement a world-class insider threat program must ensure their focus is on prevention rather than detection, writes Haystax Technology CEO Bryan Ware in his most recent Security

by admin
Technology & Data Science A Security Analytics Approach That Does Work
September 29, 2016in Technology & Data Science 0 Comments 0 Likes

A Security Analytics Approach That Does Work

So far in this series, we’ve reviewed some of the more widely deployed solutions for security analytics, and explained how and why they fail most of the time. In this

by Rob Kerr
Technology & Data Science Three Weaknesses of Rules-Based Systems
September 6, 2016in Technology & Data Science 0 Comments 0 Likes

Three Weaknesses of Rules-Based Systems

Rules-based systems use ‘if-then’ rules to derive actions. For example, a fact that ‘Sally is 22 and unemployed’ is matched to a rule that ‘If a person is between 18

by Tom Read
Technology & Data Science Machine Learning vs. Model-First Approaches to Analytics
August 31, 2016in Technology & Data Science 0 Comments 0 Likes

Machine Learning vs. Model-First Approaches to Analytics

Machine learning has revolutionized our world. It powers our smart phones, determines which advertisements we view and soon it will dominate the automobile industry through self-driving cars. Even Google now

by Matt Johnson
Company News Haystax Selected to Present Advanced Threat Analytic Applications for Insider Threat Detection at STIDS – 2014 Conference
November 13, 2014in Company News 0 Comments 0 Likes

Haystax Selected to Present Advanced Threat Analytic Applications for Insider Threat Detection at STIDS – 2014 Conference

UPDATE: Haystax Technology was awarded 2nd runner-up for the Michael Dean Best Paper Award at STIDS 2014. The award recognizes innovativeness and domain thought leadership that advances the state of the

by admin
Prev

Posts navigation

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
Next

The Latest at Haystax

Can Employee Wellness Programs Help Avert an Insider Attack?
Can Employee Wellness Programs Help Avert an Insider Attack?
Haystax Product Update: New Map Functionality
Haystax Product Update: New Map Functionality
Self-Driving Cars and Insider Risk
Self-Driving Cars and Insider Risk

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (146)
  • Policy & Practice (62)
  • Product Updates (45)
  • Success Stories (30)
  • Technology & Data Science (52)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

571-297-3800

Contact Us

Haystax / Fishtech Northern Virginia
8251 Greensboro Dr., Suite 1000, McLean, VA 22102
Fishtech Headquarters
13333 Holmes Rd., Kansas City, MO 64146
Cyber Defense Center
13323 Holmes Rd., Kansas City, MO 64146

Haystax is a wholly owned subsidiary of Fishtech Group. Fishtech Group is a data-driven cybersecurity services provider ensuring our clients’ secure digital transformation.

Contact Us

© Haystax 2021 - A Fishtech Group, LLC Company. All Rights Reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}