Haystax risk-mitigation software products support missions as dissimilar as critical infrastructure protection and insider threat mitigation. At the core of these diverse applications, though, is a single analytics platform designed
Gartner Sees Evolving UBA Market
The user behavior analytics market is fragmenting into fewer ‘pure-play’ UBA vendors and a larger number of more traditional security products with core UBA technologies and features embedded in them,
Using AI to Extract High-Value Threat Intel from Data
Today’s security and risk analysts have access to oceans of raw data, thanks to a proliferation of information sources, drastically improved computing power and dirt-cheap storage. Paradoxically, though, they’re having
Haystax Technology VP Comments on FY18 Insider Threat Program Language
Separate drafts of the fiscal-year 2018 National Defense Authorization Act (NDAA) are currently making their way through the House and Senate. Haystax Technology’s Vice President of Security Analytics, Tom Read,
Haystax Technology Again Makes Cybersecurity 500 List
Cybersecurity Ventures has released its latest Cybersecurity 500 list, naming Haystax Technology as a top cybersecurity company for Q2 2017. Haystax is specifically recognized for its award-winning Haystax Analytics Platform™.
More Organizations Adopting UBA, Gartner Says
Enterprises are increasingly turning to user behavior analytics (UBA) for an array of security missions, as they confront ever-more sophisticated external threats and the possibility that even their most trusted
New SANS, Haystax Technology Insider Threat Survey Reveals Malicious Actors as the Most Damaging Threat Vector for Companies
Haystax Technology and SANS today released an industry survey titled “Defending Against the Wrong Enemy: 2017 SANS Insider Threat Survey” that illustrates the importance of managing internal threats to win
Coping with Security Data Overload in Today’s Connected World
The way we generate information about ourselves today — increasingly through social media, computer networks and connected devices — has forced security professionals to re-evaluate how they capture data, analyze