Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • Insider Threat Mitigation
    • Public Safety
      • For Law Enforcement
      • For Fire Safety
      • For School Safety
      • For Emergency Management
      • For Event Security
    • Enterprise Security
    • Cyber Crime Prevention
    • Continuous Vetting
    • Consulting Services
  • WHO WE ARE
    • Leadership Team
    • About Fishtech Group (Parent Company)
    • Our Data Science
    • Haystax Partner Program
    • Careers
  • BLOG
  • RESOURCES
  • CONTACT
  • LOGIN
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo

Blog categories

  • Company News (142)
  • Policy & Practice (54)
  • Product Updates (41)
  • Success Stories (27)
  • Technology & Data Science (47)

Comments

Haystax Analytics Platform

Product Updates Haystax Product Update: Communications and Logging
October 18, 2019in Product Updates 0 Comments 0 Likes

Haystax Product Update: Communications and Logging

System and tenant administrators in any Haystax solution need multiple ways to communicate with their users, and they also need fine-grained visibility in the activities of users via in-built system

by John Boatman
Policy & Practice The Lessons of Umpqua
October 1, 2019in Policy & Practice 0 Comments 0 Likes

The Lessons of Umpqua

Four years ago today, a 26-year-old student at Umpqua Community College in Oregon fatally shot a professor and eight students and wounded eight others, before killing himself as police approached.

by John Boatman
Policy & Practice Continuous Evaluation Could Save Billions, RAND Says
September 30, 2019in Policy & Practice 0 Comments 0 Likes

Continuous Evaluation Could Save Billions, RAND Says

The U.S. government could save up to $30 billion in just over two decades if it were to adopt continuous evaluation of personnel with security clearances instead of sticking with

by John Boatman
Success Stories Finding Ana Montes: A Haystax Use Case
September 24, 2019in Success Stories 0 Comments 0 Likes

Finding Ana Montes: A Haystax Use Case

By Hannah Hein Robert Hanssen. Edward Snowden. Ana Montes. Ana who? These names should have equal weight when people recall some of our country’s worst insider threat incidents, but for

by Hannah Hein
Technology & Data Science A Risk-Based, Data-Driven Approach to Continuous Vetting
September 18, 2019in Technology & Data Science 0 Comments 0 Likes

A Risk-Based, Data-Driven Approach to Continuous Vetting

By Kevin Kiernan A hot topic in the personnel security field these days is the concept of ‘continuous vetting’ — the idea that automated checks of both classified and publicly

by Kevin Kiernan
Product Updates Haystax Product Update: Empowering Tenant Admins
September 12, 2019in Product Updates 0 Comments 0 Likes

Haystax Product Update: Empowering Tenant Admins

Every Haystax solution is deployed is its own tenant, and each tenant has unique app combinations and user profiles — even tailored lexicons, theming and color schemes — that reflect

by John Boatman
Policy & Practice Insider Threat
July 11, 2019in Policy & Practice 0 Comments 0 Likes

Most UBA Doesn’t Actually Focus on the User

For more than a year now, industry analysts have been warning that user behavior analytics (UBA) would become fragmented as a market segment and could eventually recede into irrelevance. In

by John Boatman
Policy & Practice new york city
July 8, 2019in Policy & Practice 0 Comments 0 Likes

The View from a DHS OpEx

Every two years or so, the U.S. Department of Homeland Security’s Science and Technology Directorate conducts what it calls an Urban Operational Experimentation, or OpEx, in a major metropolitan area.

by John Boatman
Prev

Posts navigation

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 9
Next

The Latest at Haystax

The Case for Student Threat Assessments – Part 2
The Case for Student Threat Assessments – Part 2
The Healthcare Industry Has a Remedy for Insider Threats
The Healthcare Industry Has a Remedy for Insider Threats
The Case for Student Threat Assessments – Part 1
The Case for Student Threat Assessments – Part 1

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics cloud solutions cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (142)
  • Policy & Practice (54)
  • Product Updates (41)
  • Success Stories (27)
  • Technology & Data Science (47)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

571-297-3800

Contact Us

Haystax / Fishtech Northern Virginia
8251 Greensboro Dr., Suite 1000, McLean, VA 22102
Fishtech Headquarters
13333 Holmes Rd., Kansas City, MO 64146
Cyber Defense Center
13323 Holmes Rd., Kansas City, MO 64146

Haystax is a wholly owned subsidiary of Fishtech Group. Fishtech Group is a data-driven cybersecurity services provider ensuring our clients’ secure digital transformation.

Contact Us

© Haystax 2019 - A Fishtech Group, LLC Company. All Rights Reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}