Overview

Haystax Technology develops advanced security analytics and out-of-the-box risk management software applications that enable decision-makers, analysts and operational security teams to quickly understand and act on virtually any type of threat in real-time. Our ultimate goal has been to improve the safety and security of all enterprises, regardless of the threat, by prioritizing the world’s risks.

Some of the most high-profile institutions in the world rely on our security analytics platform to mitigate their highest-priority threats. Every day, some 50 million people and more than 100,000 national critical infrastructure assets are protected by organizations using our platform and security applications. They range from top federal government agencies and large commercial enterprises to local and state agencies and major metropolitan areas. We’ve even helped secure the last seven Super Bowls.

Products

  • Constellation for Insider Threat

    Constellation for Insider Threat is a sophisticated end to end Insider Risk Security Operations Center (SOC) platform for risk and security professionals looking to enable their existing program with speed, confidence and compliance. Constellation provides the SOC with the ability to foresee potential risk, speed existing workflow processes and confidently apply controls, all from one centralized and shared platform.

  • Constellation for Continuous Evaluation (CE)

    Constellation for Continuous Evaluation is an analytically defensible personnel security investigation platform for agencies tasked with improving the timeliness between periodic investigation cycles. Constellation for CE cost-effectively measures the clearance-worthiness of entire populations by applying Model-first User Behavior Analytics (Model-first UBA) with other Artificial Intelligence (AI) Techniques to process big data to identify individuals with risky behaviors that warrant further investigation prior to updating their clearance.

  • Constellation for Account Compromise

    Constellation for Account Compromise is a Security Operations Center platform for organizations looking to upgrade the SOC’s ability to quickly surface compromised accounts. Constellation advances the SOC by eliminating the burden of alert fatigue with patented Model-first User Behavior Analytics and a blend of proven artificial intelligence techniques that together automate and substitute account compromise detection subject matter expertise. The platform also spares analysts from time-consuming facets of investigations by systematizing complex workflows via user-friendly customizable Apps that enhance collaboration and speed across the SOC.

  • Constellation for Safety & Security

    Constellation for Safety & Security is an Incident management platform for agencies looking to respond with confidence to all threats. The platform provides security operation centers with full domain awareness and complete control of the chain of command in real-time. With Constellation, threat mitigation is supported with an expansive intelligence approach achieved by correlating suspicious activity and field interview reports, threatening social media feeds, sensor data, scheduled events, crime stats, traffic and weather data and much more on your own custom map or timeline feed, filtered so that you see all the key signals – with none of the noise. Security operations centers monitor, report, alert and respond to incidents from a single unified environment in the command center or from a mobile device.

Law Enforcement

Law Enforcement Fact Sheet


Police chiefs, commanders and officers rely on Haystax applications every day for an array of tasks from routine intelligence and operations to major incident responses.

Mobile Field Interview


Based on Haystax Technology’s Constellation Analytics Platform, our Mobile Field Interview application is designed to digitize and streamline the field interview (FI) process from end to end, eliminating the need for cumbersome hand-written FI notecards. FI data can be rapidly accessed to identify emerging threats, patterns and trends, boosting analytical capabilities while saving thousands of labor hours.

Additional Resources

User Behavior Analytics

  • User Behavior Analytics, Redefined
  • Security Analytics Approaches that Don’t Work

  • Artificial Intelligence

  • Forrester: AI for Security
  • Data Science Packet

  • Insider Threats

  • Haystax Insights: To Catch an IP Thief
  • Top 5 Insider Threat Predictions
  • Insider Attacks Trends & Predictions 2018
  • SANS Institute: Defending Against the Wrong Enemy
  • Insider Attacks Insider Threat Study
  • 6 Steps to Reducing Risks from Malicious Insiders

  • Product Fact Sheets

  • Constellation for Insider Threats
  • Constellation for Account Compromise
  • Constellation for Continuous Evaluation
  • Constellation for Safety & Security_LE
  • Mobile Field Interview

  • Video: Insider Threat SOC Automation

    Constellation for Insider Threat is a sophisticated end-to-end Insider Threat Security Operations Center (InTh SOC) platform brought to you by Haystax Technology. Constellation’s model-first User Behavior Analytics (UBA) continuously measures the trustworthiness of personnel in an organization, pinpointing early indications of the most serious risk from IP theft, sabotage, fraud, policy violations and other damaging behaviors. Starting with an expert model of insider risk behaviors, the platform integrates a wide array of network and non-network data that’s analyzed using a patented technology, and prioritized against the model. The system then displays the results within a sophisticated interface that interlaces multiple applications that automate or replace the SOC’s investigative workflow. With Constellation, risk and security professionals enable their existing program with speed, confidence and compliance.

    Federal SME Panel Webcast “Insider Attacks Survey”

    Our panel of subject matter experts as they discuss the latest findings from the “Insider Attacks” survey. Panelists will analyze results, share use cases and exchange lessons learned with the audience that will dynamically participate in the discussion during this live Webcast. Participants will leave with a strong sense of what the industry is experiencing and what peers are doing to tackle this growing threat.

    • The “Insider Attacks” study of more than 600 risk & InfoSec professionals found that privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations.
    • 56% percent of respondents reported that insider threats have become more frequent in the last 12 months.
    • 74 percent of organizations feel vulnerable to malicious insiders — a dramatic seven percentage point increase over last year’s survey.
    • Over 75 percent of companies estimating that insider breach remediation costs could reach $500,000.

    This webcast will provide attendees with:

    • The latest findings from Crowdsource Partners on the breath of the Insider Threat problem today.
    • Discussions on varying insider threat problems and use cases – Federal, Commercial & Public-Sector lessons learned.
    • Best practices to combat this growing challenge, to make sure you are taking efficient steps to reduce the risk.

    SANS Institute 2017 Insider Threat Survey Results: Defending Against the Wrong Enemy:

    Information security pros consistently rate insider threats as one of their top concerns, but often don't do much about it. According to the results of the 2015 SANS insider threat survey, 74% list insiders as among their top concerns, with 34% admitting to having been a victim of a successful insider breach that is estimated to cost their organization more than $1 million. Breaches caused by the misuse of insider credentials are so difficult to spot that 70% aren't noticed for months, according to the 2016 Verizon Data Breach Investigations Report. Sixty-three percent of breaches involving privileged access involved weak or stolen passwords, which is why the rapid growth of phishing and other credential-stealing tactics are growing so quickly. When it comes to preventing insider attacks, "prevention is more a state of mind than reality," according to SANS expert Eric Cole, Ph.D., author of the 2015 report Insider Threats and the Need for Fast and Directed Response. "Many organizations are still not creating and implementing insider threat programs and need to aggressively increase their focus to better protect the organization," Dr. Cole wrote in 2015. "They need to take aggressive steps to implement administrative and technical solutions for controlling the damage an insider can cause."

    This webcast will explore the survey results with emphasis on:

    • Top concerns related to internal threats.
    • What insider threat programs entail.
    • Maturity of such programs.
    • Tools used to detect and deter insider threats.
    • Whether organizations have improved their abilities to stop.malicious insiders without interfering with those doing their jobs.

    Research and Webinar lead by: Eric Cole, PhD Eric Cole, PhD, is a SANS faculty fellow, course author and instructor who has served as CTO of McAfee and chief scientist at Lockheed Martin. He is credited on more than 20 patents, sits on several executive advisory boards and is a member of the Center for Strategic and International Studies' Commission on Cybersecurity for the 44th Presidency. Eric's books include Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible and Insider Threat. As founder of Secure Anchor Consulting, Eric puts his 20-plus years of hands-on security experience to work helping customers build dynamic defenses against advanced threats.

    Contracts

    GSA Schedule Contracts

    GSA Schedule 70

    GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


    SEWP Contracts

    SEWP V

    Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


    State & Local Contracts

    City of Seattle Contract

    Contract #0000003265 Term: December 19, 2021

    CMAS

    Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

    Fairfax County IT Hardware, Software, & Services

    Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

    National Intergovernmental Purchasing Alliance (National IPA - TCPN)

    Term: through May 31, 2019 (with 2 option renewal years)

    Ohio State Contract- 534354

    Contract # 534354 Term: December 19, 2021

    Orange County National IPA Co-Op

    Through May 31, 2019 (with 2 option years)

    State of New Mexico Contract

    Contract Number: 80-000-18-00002 Contract Period: August 1, 2017 – August 1, 2021

    Texas DIR-TSO-3149

    DIR-TSO-3149 Contract Period: June 22, 2015 - June 22, 2019(with 1 option year)

    VASCUPP

    Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021


    Events

    Archived Events

    News

    Latest News

    Haystax Technology has been designated as one of only a handful of public safety industry innovators by MarketsandMarkets, a B2B research and competitive intelligence firm that counts 80% of global ...
    READ MORE >
    DCA Live has named Haystax Technology as one of its 2018 Red Hot Cyber Companies.
    READ MORE >
    Haystax Technology today released a first-of-its-kind report, Insider Threats In 2018: Predictions On What To Look For To Minimize Your Risk, based on interviews with nearly 1,500 cybersecurity ...
    READ MORE >
    Haystax Technology has been named the top company in its category in the 2018 Cybersecurity Excellence Awards.
    READ MORE >
    One World Identity (OWI) has named Haystax Technology as a key player in its 2018 Identity Landscape.
    READ MORE >

    Resources

    SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC

    Datasheet

    Visualize and keep up with emerging threat activity in and around schools using news, public safety, social media and other digital feeds.

    Police chiefs, commanders and officers rely on Haystax applications every day for an array of tasks from routine intelligence and operations to major incident responses.

    Resource

    Our threat intelligence solutions enable organizations to rapidly understand threats and to optimize investigation and response processes. We developed patented analytics that continuously monitor threats and incidents by integrating organizational data, plus open-source, commercial and publicly a...

    By integrating a comprehensive critical asset database with assessment forms; threat, vulnerability, and consequence data; and its patented risk analytics,our applications provide a total solution for managing an enterprise's risks to its critical assets. 

    haystax-FINAL-logo-color.png
    Resource
    A risk-based approach is in our DNA. Our analytic foundation is based on multiple patents we earned in our quest to design predictive and prescriptive systems to understand and manage complex threats from known and unknown adversaries. We have successfully developed and deployed advanced threat inte...

    Haystax pioneered the use of commercial off-the-shelf mobile devices for major public safety operations. Haystax Mobile Applications provide a wide range of capabilities from field reporting, real time interactive monitoring to detailed ground assessments that can fully deployed in minutes and hours...

    Our fire safety solutions go beyond just digitizing paper based plans to ensure that fire fighters have access to critical information such floor plans and building details before they arrive on the scene. The system also proactively identifies data quality issues to ensure that the available inform...

    The people of Indianapolis are no strangers to large sporting events. Indiana'slargest city,which is also the statecapital,has run itsannual Indy500auto race since 1911and has served as the v...

    Protecting your organization from abuse, loss and misuse of proprietary information requires not only knowingwhat data people can access and how it moves across the network, but more importantly that you can trust thepeople with access to it.

    Haystax provides threat analysts with powerful tools for gathering relevant, timely threat information, analyzing itfrom local to global perspectives, and visualizing it within appropriate contexts. Our innovative platform filters and prioritizes an extensive range of threat-related data feeds, extr...