Site logo
Sticky header logo
GET A DEMO
  • PLATFORM
  • SOLUTIONS
    • For School Safety
    • For Event Security
    • For Law Enforcement
    • For Emergency Management
    • For Fire Safety
    • Public Safety Services
  • ABOUT
    • Leadership Team
    • Our Data Science
    • Careers
    • Case Studies
    • Awards
    • Login
  • BLOG
  • RESOURCES
  • CONTACT
Mobile logo
Sticky header logo
Mobile logo
Sticky header logo
Advanced Threat Analytics Analytics artificial intelligence Bayesian networks cloud solutions cybersecurity emergency response Enterprise Threat Management events field intelligence first responders Haystax Haystax Analytics Haystax Analytics Platform Haystax Technology incident management Insider Threat law enforcement Media Coverage mobile apps Modeling public safety Public Safety Cloud risk management school safety security analytics situational awareness threat analytics threat monitoring user behavior analytics

threat analytics

Company News CSO logo
October 2, 2017in Company News 0 Comments 2 Likes

CSO: Avoiding Hype Around User Behavior Analytics

User behavior analytics (UBA) is enjoying its own moment of high expectations in the security risk community. But many hot technologies and techniques before it (like fuzzy logic and Google

by Haystax
Policy & Practice insider threat
September 25, 2017in Policy & Practice 0 Comments 1 Likes

Six Steps Companies Can Take to Improve Insider Threat Mitigation

Companies across a wide spectrum of industries continue to wrestle with how to implement a well-designed insider threat program. The US government has provided guidelines that help but, as we’ve

by John Boatman
Company News cybersecurity
August 25, 2017in Company News 0 Comments 0 Likes

Haystax Technology Named SINET 16 Finalist

Haystax Technology has been named as a finalist for the 2017 Security Innovation Network (SINET) 16 Innovator Awards. Each year, SINET evaluates the technologies and products of hundreds of emerging

by Haystax
Technology & Data Science More Organizations Adopting UBA, Gartner Says
August 9, 2017in Technology & Data Science 0 Comments 1 Likes

More Organizations Adopting UBA, Gartner Says

Enterprises are increasingly turning to user behavior analytics (UBA) for an array of security missions, as they confront ever-more sophisticated external threats and the possibility that even their most trusted

by John Boatman
Policy & Practice UBA
June 28, 2017in Policy & Practice 0 Comments 0 Likes

Gartner: Cybersecurity Needs to Become More Continuous, Adaptable and Risk-Based

The explosive growth of cloud-based services and mobile devices in the workplace has rendered conventional approaches to cybersecurity risk management virtually obsolete, requiring a more adaptive and continuous strategy towards

by John Boatman
Technology & Data Science Insider Threat, Security Analytics
June 23, 2017in Technology & Data Science 0 Comments 0 Likes

Why We Need More Shades of Gray in Security

Few things in life can be expressed in black and white terms. Sure, a light switch is either on or it’s off; one baseball team wins the World Series each

by Kirk Cerny
Technology & Data Science Network Data is Not Enough
June 8, 2017in Technology & Data Science 0 Comments 1 Likes

Network Data is Not Enough

Can organizations identify insider threats or high-risk individuals using network data alone? Consider that many security software solutions today are optimized to perform network log monitoring and aggregation. They excel

by Peter DiBenedetto
Company News CSO logo
May 11, 2017in Company News 0 Comments 2 Likes

Haystax Technology CTO Cited in CSO Article on ‘Security Alert Fatigue’

It’s not uncommon for large enterprises to receive thousands of security alerts each month, thanks to analytics software configured to identify anomalies that may indicate a potential threat. However, an

by Haystax
Prev

Posts navigation

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
Next

The Latest at Haystax

Using Commercially Available Data to Detect Insider Threats
Using Commercially Available Data to Detect Insider Threats
Fishtech Group CYDERES to Offer Insider Threat Monitoring as a Service
Fishtech Group CYDERES to Offer Insider Threat Monitoring as a Service
Two Essential Tools for Successful Insider Risk Mitigation – Part 2
Two Essential Tools for Successful Insider Risk Mitigation – Part 2

DOWNLOAD FREE GUIDE

READ THE LATEST INSIDER THREAT REPORT

Tags

Advanced Threat Analytics Analytics cybersecurity Enterprise Threat Management first responders Haystax Analytics Haystax Analytics Platform Haystax Technology Insider Threat Media Coverage public safety risk management security analytics situational awareness threat monitoring

Follow Haystax on Social

Categories

  • Company News (147)
  • Policy & Practice (67)
  • Product Updates (48)
  • Success Stories (32)
  • Technology & Data Science (52)
  • Uncategorized (1)

Haystax’s security analytics platform applies artificial intelligence techniques to reason like a team of analysts and prioritize risks in real time at scale for more efficient protection of critical assets.

877-442-4553

Contact Haystax

© Haystax 2022 - A Fishtech LLC company. All rights reserved.
div#stuning-header .dfd-stuning-header-bg-container {background-image: url(https://haystax.com/wp-content/uploads/2019/01/haystax-web-background.jpg);background-size: initial;background-position: top center;background-attachment: initial;background-repeat: initial;}#stuning-header div.page-title-inner {min-height: 300px;}#main-content .dfd-content-wrap {margin: -10px;} #main-content .dfd-content-wrap > article {padding: 10px;}@media only screen and (min-width: 1101px) {#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars {padding: 0 20px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars > #main-content > .dfd-content-wrap:first-child {border-top: 20px solid transparent; border-bottom: 10px solid transparent;}#layout.dfd-portfolio-loop > .row.full-width #right-sidebar,#layout.dfd-gallery-loop > .row.full-width #right-sidebar {padding-top: 10px;padding-bottom: 10px;}#layout.dfd-portfolio-loop > .row.full-width > .blog-section.no-sidebars .sort-panel,#layout.dfd-gallery-loop > .row.full-width > .blog-section.no-sidebars .sort-panel {margin-left: -20px;margin-right: -20px;}}#layout .dfd-content-wrap.layout-side-image,#layout > .row.full-width .dfd-content-wrap.layout-side-image {margin-left: 0;margin-right: 0;}