Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • For School Safety
    • For Event Security
    • For Law Enforcement
    • For Emergency Management
    • For Fire Safety
    • Public Safety Services
  • ABOUT
    • Leadership Team
    • Our Data Science
    • Careers
    • Case Studies
    • Awards
    • Login
  • BLOG
  • RESOURCES
  • CONTACT
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology incident management Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring user behavior analytics

cybersecurity

Company News Cybersecurity
February 2, 2018in Company News 0 Comments 1 Likes

Haystax Technology is Finalist for 2018 Cybersecurity Excellence Award

Haystax Technology has been chosen as a Finalist for the 2018 Cybersecurity Excellence Awards, in the category of Most Innovative Cybersecurity Company between 50 and 100 employees. The Excellence Awards

by Haystax
Company News Haystax Technology
January 31, 2018in Company News 0 Comments 1 Likes

Haystax Technology Named as Key Risk Management Platform Company

One World Identity (OWI) has named Haystax Technology as a key player in its 2018 Identity Landscape. OWI, an identity research and strategy company founded in 2016, included Haystax in

by Haystax
Technology & Data Science Insider threats
January 8, 2018in Technology & Data Science 0 Comments 3 Likes

Mitigating Insider Threats Using Bayesian Models

Trusted insiders can harm an enterprise in all kinds of ways, from intellectual property theft, financial fraud and data breaches to espionage, sabotage and even terrorism. Moreover, the root causes

by Kirk Cerny
Technology & Data Science Machine Learning: Expertise vs. Coverage
December 26, 2017in Technology & Data Science 0 Comments 1 Likes

Machine Learning: Expertise vs. Coverage

Critics of machine learning (ML) often point out that it can’t come close to emulating a subject-matter expert working at his or her maximum potential. Sure, ML powers our smart

by Haystax
Technology & Data Science Using AI to Extract High-Value Threat Intel from Data
November 30, 2017in Technology & Data Science 0 Comments 2 Likes

Using AI to Extract High-Value Threat Intel from Data

Today’s security and risk analysts have access to oceans of raw data, thanks to a proliferation of information sources, drastically improved computing power and dirt-cheap storage. Paradoxically, though, they’re having

by John Boatman
Company News Haystax Technology Named Red Herring 2017 Top 100 Global Winner
November 20, 2017in Company News 0 Comments 1 Likes

Haystax Technology Named Red Herring 2017 Top 100 Global Winner

Haystax Technology, a leading user behavior analytics (UBA) platform provider, has been selected as one of Red Herring’s 2017 Top 100 Global companies. This prominent award recognizes the most innovative

by Haystax
Technology & Data Science UBA Is Just Getting Warmed Up
October 30, 2017in Technology & Data Science 0 Comments 1 Likes

UBA Is Just Getting Warmed Up

Anyone who has worked long enough in the data analytics and high-tech industries will have a favorite story about some new technology that was subjected to a degree of hype

by Kirk Cerny
Technology & Data Science artificial intelligence
October 20, 2017in Technology & Data Science 0 Comments 0 Likes

Beyond Machine Learning: Using Models in AI for Security

Some impressive people have said bearish things recently about the use of artificial intelligence (AI) in cybersecurity. A recent example is Heather Adkins, who for 15 years has been director

by Kirk Cerny
Prev

Posts navigation

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 13
Next

The Latest at Haystax

Using Commercially Available Data to Detect Insider Threats
Using Commercially Available Data to Detect Insider Threats
Fishtech Group CYDERES to Offer Insider Threat Monitoring as a Service
Fishtech Group CYDERES to Offer Insider Threat Monitoring as a Service
Two Essential Tools for Successful Insider Risk Mitigation – Part 2
Two Essential Tools for Successful Insider Risk Mitigation – Part 2

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (147)
  • Policy & Practice (67)
  • Product Updates (48)
  • Success Stories (32)
  • Technology & Data Science (52)
  • Uncategorized (1)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

877-442-4553

Contact Haystax

© Haystax 2022 - A Fishtech LLC company. All rights reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}