• slide
  • slide
  • slide
  • slide


Haystax develops advanced security analytics and out-of-the-box risk management software applications that enable decision-makers, analysts and operational security teams to quickly understand and act on virtually any type of threat in real-time. Our ultimate goal has been to improve the safety and security of all enterprises, regardless of the threat, by prioritizing the world’s risks.

Some of the most high-profile institutions in the world rely on our security analytics platform to mitigate their highest-priority threats. Every day, some 50 million people and more than 100,000 national critical infrastructure assets are protected by organizations using our platform and security applications. They range from top federal government agencies and large commercial enterprises to local and state agencies and major metropolitan areas. We’ve even helped secure the last seven Super Bowls.


  • Haystax for Insider Threat

    Haystax for Insider Threat is a sophisticated end to end Insider Risk Security Operations Center (SOC) platform for risk and security professionals looking to enable their existing program with speed, confidence and compliance. Haystax provides the SOC with the ability to foresee potential risk, speed existing workflow processes and confidently apply controls, all from one centralized and shared platform.

  • Haystax for Continuous Evaluation (CE)

    Haystax for Continuous Evaluation is an analytically defensible personnel security investigation platform for agencies tasked with improving the timeliness between periodic investigation cycles. Haystax for CE cost-effectively measures the clearance-worthiness of entire populations by applying Model-first User Behavior Analytics (Model-first UBA) with other Artificial Intelligence (AI) Techniques to process big data to identify individuals with risky behaviors that warrant further investigation prior to updating their clearance.

  • Haystax for Account Compromise

    Haystax for Account Compromise is a Security Operations Center platform for organizations looking to upgrade the SOC’s ability to quickly surface compromised accounts. Haystax advances the SOC by eliminating the burden of alert fatigue with patented Model-first User Behavior Analytics and a blend of proven artificial intelligence techniques that together automate and substitute account compromise detection subject matter expertise. The platform also spares analysts from time-consuming facets of investigations by systematizing complex workflows via user-friendly customizable Apps that enhance collaboration and speed across the SOC.

  • Haystax for Safety & Security

    Haystax for Safety & Security is an Incident management platform for agencies looking to respond with confidence to all threats. The platform provides security operation centers with full domain awareness and complete control of the chain of command in real-time. With Haystax, threat mitigation is supported with an expansive intelligence approach achieved by correlating suspicious activity and field interview reports, threatening social media feeds, sensor data, scheduled events, crime stats, traffic and weather data and much more on your own custom map or timeline feed, filtered so that you see all the key signals – with none of the noise. Security operations centers monitor, report, alert and respond to incidents from a single unified environment in the command center or from a mobile device.



GSA Schedule 70

Dec 20, 2011- Dec 19, 2021


May 01, 2015- Apr 30, 2025


Mar 03, 2015- Aug 10, 2020
*Additional Option Years Available

State and Local


Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

May 01, 2009- Dec 19, 2021

Fairfax County IT Hardware, Software, & Services

Oct 04, 2015- Dec 04, 2021
*Additional Option Years Available

Orange County National IPA Co-Op

Jun 01, 2015- May 31, 2021

State of Indiana Contract

Aug 01, 2017- Jul 31, 2021

State of New Mexico Contract

Aug 01, 2017- Aug 01, 2021

Texas DIR-TSO-4288

Feb 22, 2019- Feb 21, 2021
*Additional Option Years Available


Massachusetts Higher Education Consortium (MHEC)

Aug 10, 2019- Jun 30, 2022


May 02, 2014- Dec 19, 2021

Law Enforcement

Law Enforcement Fact Sheet

Police chiefs, commanders and officers rely on Haystax applications every day for an array of tasks from routine intelligence and operations to major incident responses.

Mobile Field Interview

Based on Haystax Analytics Platform, our Mobile Field Interview application is designed to digitize and streamline the field interview (FI) process from end to end, eliminating the need for cumbersome hand-written FI notecards. FI data can be rapidly accessed to identify emerging threats, patterns and trends, boosting analytical capabilities while saving thousands of labor hours.

Additional Resources

User Behavior Analytics

  • User Behavior Analytics, Redefined
  • Security Analytics Approaches that Don’t Work

  • Artificial Intelligence

  • Forrester: AI for Security
  • Data Science Packet

  • Insider Threats

  • Haystax Insights: To Catch an IP Thief
  • Top 5 Insider Threat Predictions
  • Insider Attacks Trends & Predictions 2018
  • SANS Institute: Defending Against the Wrong Enemy
  • Insider Attacks Insider Threat Study
  • 6 Steps to Reducing Risks from Malicious Insiders

  • Product Fact Sheets

  • Haystax for Insider Threats
  • Haystax for Account Compromise
  • Haystax for Continuous Evaluation
  • Haystax for Safety & Security_LE
  • Mobile Field Interview

  • Video: Insider Threat SOC Automation

    Haystax for Insider Threat is a sophisticated end-to-end Insider Threat Security Operations Center (InTh SOC) platform. Haystax's model-first User Behavior Analytics (UBA) continuously measures the trustworthiness of personnel in an organization, pinpointing early indications of the most serious risk from IP theft, sabotage, fraud, policy violations and other damaging behaviors. Starting with an expert model of insider risk behaviors, the platform integrates a wide array of network and non-network data that’s analyzed using a patented technology, and prioritized against the model. The system then displays the results within a sophisticated interface that interlaces multiple applications that automate or replace the SOC’s investigative workflow. With Haystax, risk and security professionals enable their existing program with speed, confidence and compliance.

    Federal SME Panel Webcast “Insider Attacks Survey”

    Our panel of subject matter experts as they discuss the latest findings from the “Insider Attacks” survey. Panelists will analyze results, share use cases and exchange lessons learned with the audience that will dynamically participate in the discussion during this live Webcast. Participants will leave with a strong sense of what the industry is experiencing and what peers are doing to tackle this growing threat.

    • The “Insider Attacks” study of more than 600 risk & InfoSec professionals found that privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations.
    • 56% percent of respondents reported that insider threats have become more frequent in the last 12 months.
    • 74 percent of organizations feel vulnerable to malicious insiders — a dramatic seven percentage point increase over last year’s survey.
    • Over 75 percent of companies estimating that insider breach remediation costs could reach $500,000.

    This webcast will provide attendees with:

    • The latest findings from Crowdsource Partners on the breath of the Insider Threat problem today.
    • Discussions on varying insider threat problems and use cases – Federal, Commercial & Public-Sector lessons learned.
    • Best practices to combat this growing challenge, to make sure you are taking efficient steps to reduce the risk.

    SANS Institute 2017 Insider Threat Survey Results: Defending Against the Wrong Enemy:

    Information security pros consistently rate insider threats as one of their top concerns, but often don't do much about it. According to the results of the 2015 SANS insider threat survey, 74% list insiders as among their top concerns, with 34% admitting to having been a victim of a successful insider breach that is estimated to cost their organization more than $1 million. Breaches caused by the misuse of insider credentials are so difficult to spot that 70% aren't noticed for months, according to the 2016 Verizon Data Breach Investigations Report. Sixty-three percent of breaches involving privileged access involved weak or stolen passwords, which is why the rapid growth of phishing and other credential-stealing tactics are growing so quickly. When it comes to preventing insider attacks, "prevention is more a state of mind than reality," according to SANS expert Eric Cole, Ph.D., author of the 2015 report Insider Threats and the Need for Fast and Directed Response. "Many organizations are still not creating and implementing insider threat programs and need to aggressively increase their focus to better protect the organization," Dr. Cole wrote in 2015. "They need to take aggressive steps to implement administrative and technical solutions for controlling the damage an insider can cause."

    This webcast will explore the survey results with emphasis on:

    • Top concerns related to internal threats.
    • What insider threat programs entail.
    • Maturity of such programs.
    • Tools used to detect and deter insider threats.
    • Whether organizations have improved their abilities to stop.malicious insiders without interfering with those doing their jobs.

    Research and Webinar lead by: Eric Cole, PhD Eric Cole, PhD, is a SANS faculty fellow, course author and instructor who has served as CTO of McAfee and chief scientist at Lockheed Martin. He is credited on more than 20 patents, sits on several executive advisory boards and is a member of the Center for Strategic and International Studies' Commission on Cybersecurity for the 44th Presidency. Eric's books include Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible and Insider Threat. As founder of Secure Anchor Consulting, Eric puts his 20-plus years of hands-on security experience to work helping customers build dynamic defenses against advanced threats.


    Archived Events


    Latest News

    Haystax Technology has been designated as one of only a handful of public safety industry innovators by MarketsandMarkets, a B2B research and competitive intelligence firm that counts 80% of global ...
    DCA Live has named Haystax Technology as one of its 2018 Red Hot Cyber Companies.
    Haystax Technology today released a first-of-its-kind report, Insider Threats In 2018: Predictions On What To Look For To Minimize Your Risk, based on interviews with nearly 1,500 cybersecurity ...
    Haystax Technology has been named the top company in its category in the 2018 Cybersecurity Excellence Awards.
    One World Identity (OWI) has named Haystax Technology as a key player in its 2018 Identity Landscape.



    Visualize and keep up with emerging threat activity in and around schools using news, public safety, social media and other digital feeds.

    Police chiefs, commanders and officers rely on Haystax applications every day for an array of tasks from routine intelligence and operations to major incident responses.


    Our threat intelligence solutions enable organizations to rapidly understand threats and to optimize investigation and response processes. We developed patented analytics that continuously monitor threats and incidents by integrating organizational data, plus open-source, commercial and publicly a...

    By integrating a comprehensive critical asset database with assessment forms; threat, vulnerability, and consequence data; and its patented risk analytics,our applications provide a total solution for managing an enterprise's risks to its critical assets. 

    A risk-based approach is in our DNA. Our analytic foundation is based on multiple patents we earned in our quest to design predictive and prescriptive systems to understand and manage complex threats from known and unknown adversaries. We have successfully developed and deployed advanced threat inte...

    Haystax pioneered the use of commercial off-the-shelf mobile devices for major public safety operations. Haystax Mobile Applications provide a wide range of capabilities from field reporting, real time interactive monitoring to detailed ground assessments that can fully deployed in minutes and hours...

    Our fire safety solutions go beyond just digitizing paper based plans to ensure that fire fighters have access to critical information such floor plans and building details before they arrive on the scene. The system also proactively identifies data quality issues to ensure that the available inform...

    The people of Indianapolis are no strangers to large sporting events. Indiana'slargest city,which is also the statecapital,has run itsannual Indy500auto race since 1911and has served as the v...

    Protecting your organization from abuse, loss and misuse of proprietary information requires not only knowingwhat data people can access and how it moves across the network, but more importantly that you can trust thepeople with access to it.

    Haystax provides threat analysts with powerful tools for gathering relevant, timely threat information, analyzing itfrom local to global perspectives, and visualizing it within appropriate contexts. Our innovative platform filters and prioritizes an extensive range of threat-related data feeds, extr...