Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • For School Safety
    • For Event Security
    • For Law Enforcement
    • For Emergency Management
    • For Fire Safety
    • Public Safety Services
  • ABOUT
    • Leadership Team
    • Our Data Science
    • Careers
    • Case Studies
    • Awards
    • Login
  • BLOG
  • RESOURCES
  • CONTACT
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology incident management Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring user behavior analytics

Haystax Analytics Platform

Policy & Practice Finding Ana Montes: A Haystax Use Case
September 24, 2019in Policy & Practice 0 Comments 0 Likes

Finding Ana Montes: A Haystax Use Case

Robert Hanssen. Edward Snowden. Ana Montes. Ana who? These names should have equal weight when people recall some of our country’s worst insider threat incidents, but for many only two

by Kirk Cerny
Technology & Data Science A Risk-Based, Data-Driven Approach to Continuous Vetting
September 18, 2019in Technology & Data Science 0 Comments 0 Likes

A Risk-Based, Data-Driven Approach to Continuous Vetting

A hot topic in the personnel security field these days is the concept of ‘continuous vetting’ — the idea that automated checks of both classified and publicly available data sources

by Kirk Cerny
Product Updates Haystax Product Update: Empowering Tenant Admins
September 12, 2019in Product Updates 0 Comments 5 Likes

Haystax Product Update: Empowering Tenant Admins

Every Haystax solution is deployed is its own tenant, and each tenant has unique app combinations and user profiles — even tailored lexicons, theming and color schemes — that reflect

by John Boatman
Policy & Practice Insider Threat
July 11, 2019in Policy & Practice 0 Comments 2 Likes

Most UBA Doesn’t Actually Focus on the User

For more than a year now, industry analysts have been warning that user behavior analytics (UBA) would become fragmented as a market segment and could eventually recede into irrelevance. In

by John Boatman
Policy & Practice new york city
July 8, 2019in Policy & Practice 0 Comments 2 Likes

The View from a DHS OpEx

Every two years or so, the U.S. Department of Homeland Security’s Science and Technology Directorate conducts what it calls an Urban Operational Experimentation, or OpEx, in a major metropolitan area.

by John Boatman
Product Updates Haystax Product Update: Inviting New Users
June 13, 2019in Product Updates 0 Comments 3 Likes

Haystax Product Update: Inviting New Users

Last year, one of Haystax’s state-level customers was required to register several thousand new users in a very short period of time, to meet a legislatively-mandated statewide safety assessment initiative.

by John Boatman
Product Updates Haystax Product Update: Improved Critical Asset Protection
May 15, 2019in Product Updates 0 Comments 2 Likes

Haystax Product Update: Improved Critical Asset Protection

Security teams tasked with maintaining complete domain awareness of their most critical facilities will find greater flexibility and useful new features in recent product releases of our Haystax Analytics Platform.

by John Boatman
Technology & Data Science Multiple-Persona Disorder: Understanding All Your Insider Threats
April 30, 2019in Technology & Data Science 0 Comments 1 Likes

Multiple-Persona Disorder: Understanding All Your Insider Threats

Enterprises with insider threat mitigation programs often focus primarily on detecting and responding to malicious actors. At best, they may subdivide their threats into either malicious or negligent personas. These

by John Boatman
Prev

Posts navigation

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 11
Next

The Latest at Haystax

Insider Threats Are Evolving – Fast
Insider Threats Are Evolving – Fast
Introducing: A Managed Service for Proactive Insider Threat Detection & Response
Introducing: A Managed Service for Proactive Insider Threat Detection & Response
Haystax Product Update: Assessment Template Builder
Haystax Product Update: Assessment Template Builder

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (147)
  • Policy & Practice (67)
  • Product Updates (48)
  • Success Stories (32)
  • Technology & Data Science (52)
  • Uncategorized (1)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

877-442-4553

Contact Haystax

© Haystax 2022 - A Fishtech LLC company. All rights reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}