Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • Insider Threat
    • Corporate Security
    • Public Safety
      • For Law Enforcement
      • For School Safety
      • For Event Security
      • For Emergency Management
      • For Fire Safety
    • Continuous Evaluation
    • Pandemic Response
  • CUSTOMERS
  • ABOUT
    • Leadership Team
    • About Fishtech Group (Parent Company)
    • Our Data Science
    • Careers
    • Case Studies
    • Awards
  • BLOG
  • RESOURCES
  • CONTACT
  • LOGIN
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring UBA user behavior analytics

Haystax Analytics Platform

Policy & Practice Finding Ana Montes: A Haystax Use Case
September 24, 2019in Policy & Practice 0 Comments 0 Likes

Finding Ana Montes: A Haystax Use Case

By Hannah Hein Robert Hanssen. Edward Snowden. Ana Montes. Ana who? These names should have equal weight when people recall some of our country’s worst insider threat incidents, but for

by Hannah Hein
Technology & Data Science A Risk-Based, Data-Driven Approach to Continuous Vetting
September 18, 2019in Technology & Data Science 0 Comments 0 Likes

A Risk-Based, Data-Driven Approach to Continuous Vetting

By Kevin Kiernan A hot topic in the personnel security field these days is the concept of ‘continuous vetting’ — the idea that automated checks of both classified and publicly

by Kevin Kiernan
Product Updates Haystax Product Update: Empowering Tenant Admins
September 12, 2019in Product Updates 0 Comments 0 Likes

Haystax Product Update: Empowering Tenant Admins

Every Haystax solution is deployed is its own tenant, and each tenant has unique app combinations and user profiles — even tailored lexicons, theming and color schemes — that reflect

by John Boatman
Policy & Practice Insider Threat
July 11, 2019in Policy & Practice 0 Comments 0 Likes

Most UBA Doesn’t Actually Focus on the User

For more than a year now, industry analysts have been warning that user behavior analytics (UBA) would become fragmented as a market segment and could eventually recede into irrelevance. In

by John Boatman
Policy & Practice new york city
July 8, 2019in Policy & Practice 0 Comments 0 Likes

The View from a DHS OpEx

Every two years or so, the U.S. Department of Homeland Security’s Science and Technology Directorate conducts what it calls an Urban Operational Experimentation, or OpEx, in a major metropolitan area.

by John Boatman
Product Updates Haystax Product Update: Inviting New Users
June 13, 2019in Product Updates 0 Comments 0 Likes

Haystax Product Update: Inviting New Users

Last year, one of Haystax’s state-level customers was required to register several thousand new users in a very short period of time, to meet a legislatively-mandated statewide safety assessment initiative.

by John Boatman
Product Updates Haystax Product Update: Improved Critical Asset Protection
May 15, 2019in Product Updates 0 Comments 0 Likes

Haystax Product Update: Improved Critical Asset Protection

Security teams tasked with maintaining complete domain awareness of their most critical facilities will find greater flexibility and useful new features in recent product releases of our Haystax Analytics Platform.

by John Boatman
Technology & Data Science Multiple-Persona Disorder: Understanding All Your Insider Threats
April 30, 2019in Technology & Data Science 0 Comments 0 Likes

Multiple-Persona Disorder: Understanding All Your Insider Threats

Enterprises with insider threat mitigation programs often focus primarily on detecting and responding to malicious actors. At best, they may subdivide their threats into either malicious or negligent personas. These

by John Boatman
Prev

Posts navigation

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 11
Next

The Latest at Haystax

Counting the Costs of an Insider Attack
Counting the Costs of an Insider Attack
DoJ Deems Risk Assessments ‘Essential’ for School Safety
DoJ Deems Risk Assessments ‘Essential’ for School Safety
Hurricanes Add to Risks in a Multi-Hazard Year
Hurricanes Add to Risks in a Multi-Hazard Year

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (146)
  • Policy & Practice (63)
  • Product Updates (45)
  • Success Stories (30)
  • Technology & Data Science (52)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

571-297-3800

Contact Us

Haystax / Fishtech Northern Virginia
8251 Greensboro Dr., Suite 1000, McLean, VA 22102
Fishtech Headquarters
13333 Holmes Rd., Kansas City, MO 64146
Cyber Defense Center
13323 Holmes Rd., Kansas City, MO 64146

Haystax is a wholly owned subsidiary of Fishtech Group. Fishtech Group is a data-driven cybersecurity services provider ensuring our clients’ secure digital transformation.

Contact Us

© Haystax 2021 - A Fishtech Group, LLC Company. All Rights Reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}