Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • Pandemic Response
    • Insider Threat Mitigation
    • Safety & Security
      • For Law Enforcement
      • For Fire Safety
      • For School Safety
      • For Emergency Management
      • For Event Security
    • Enterprise Security
    • Cyber Crime Prevention
    • Continuous Vetting
    • Consulting Services
  • WHO WE ARE
    • Leadership Team
    • About Fishtech Group (Parent Company)
    • Our Data Science
    • Haystax Partner Program
    • Careers
    • CASE STUDIES
    • AWARDS
  • BLOG
  • RESOURCES
  • CONTACT
  • LOGIN
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring UBA user behavior analytics

Enterprise Threat Management

Company News Haystax Wins Triple Gold in Cybersecurity Excellence Awards
February 21, 2020in Company News 0 Comments 0 Likes

Haystax Wins Triple Gold in Cybersecurity Excellence Awards

The 2020 Cybersecurity Excellence Awards have been announced, and Haystax has won Gold awards in all three categories for which it was nominated. Haystax, a business unit of Fishtech Group,

by John Boatman
Product Updates Haystax Product Update: New Map Functionality
January 7, 2020in Product Updates 0 Comments 0 Likes

Haystax Product Update: New Map Functionality

New year, new features! Haystax software engineers have been busy rolling out a variety of enhancements and added functionality to the Haystax Analytics Platform, focused on delivering critical operational capabilities

by John Boatman
Product Updates Haystax Product Update: Communications and Logging
October 18, 2019in Product Updates 0 Comments 0 Likes

Haystax Product Update: Communications and Logging

System and tenant administrators in any Haystax solution need multiple ways to communicate with their users, and they also need fine-grained visibility in the activities of users via in-built system

by John Boatman
Technology & Data Science Insider threats
January 8, 2018in Technology & Data Science 0 Comments 0 Likes

Mitigating Insider Threats Using Bayesian Models

Trusted insiders can harm an enterprise in all kinds of ways, from intellectual property theft, financial fraud and data breaches to espionage, sabotage and even terrorism. Moreover, the root causes

by Bryan Ware
Company News NSA; insider threat
June 28, 2017in Company News 0 Comments 0 Likes

McClatchy Quotes Haystax CEO on Finding Rogue Insiders

Not too long ago, external espionage was viewed as the biggest threat to national intelligence agencies. But McClatchy national security correspondent Tim Johnson reports on a trend of rogue insiders

by Haystax
Technology & Data Science Network Data is Not Enough
June 8, 2017in Technology & Data Science 0 Comments 0 Likes

Network Data is Not Enough

Can organizations identify insider threats or high-risk individuals using network data alone? Consider that many security software solutions today are optimized to perform network log monitoring and aggregation. They excel

by Peter DiBenedetto
Company News Dark Reading logo
March 31, 2017in Company News 0 Comments 0 Likes

Insider Threat Programs “Need Full Engagement,” Haystax Technology VP Tells Dark Reading

Organizations that succeed in tackling insider threats have done so by building mitigation programs with full engagement and support from both leadership and employees, says Tom Read, Haystax Technology’s VP

by admin
Technology & Data Science Insider threat
March 29, 2017in Technology & Data Science 0 Comments 0 Likes

New Haystax Technology Survey Shows Most Organizations Ill-Prepared for Insider Threats

Haystax Technology, a leading security analytics platform provider, is today releasing an industry survey, titled Insider Attacks, that provides new data and insights into the current state of the insider

by admin
Prev

Posts navigation

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 9
Next

The Latest at Haystax

Two Essential Tools for Successful Insider Risk Mitigation – Part 2
Two Essential Tools for Successful Insider Risk Mitigation – Part 2
Two Essential Tools for Successful Insider Risk Mitigation – Part 1
Two Essential Tools for Successful Insider Risk Mitigation – Part 1
Insider Threat Program Lessons Learned
Insider Threat Program Lessons Learned

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (145)
  • Policy & Practice (62)
  • Product Updates (45)
  • Success Stories (30)
  • Technology & Data Science (52)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

571-297-3800

Contact Us

Haystax / Fishtech Northern Virginia
8251 Greensboro Dr., Suite 1000, McLean, VA 22102
Fishtech Headquarters
13333 Holmes Rd., Kansas City, MO 64146
Cyber Defense Center
13323 Holmes Rd., Kansas City, MO 64146

Haystax is a wholly owned subsidiary of Fishtech Group. Fishtech Group is a data-driven cybersecurity services provider ensuring our clients’ secure digital transformation.

Contact Us

© Haystax 2021 - A Fishtech Group, LLC Company. All Rights Reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}