SlideShare a Scribd company logo
1 of 17
COMPANY PROPRIETARY INFORMATION
Actionable Intelligence for
Decision Makers – Anywhere,
Anytime
Reston, VA | August 2014
COMPANY PROPRIETARY INFORMATION 1
COMPANY PROPRIETARY INFORMATION 2
HAYSTAX TECHNOLOGY OFFERS
Advanced cloud based analytic solutions
that provide real time actionable intelligence
for complex, high consequence decisions
COMPANY PROPRIETARY INFORMATION 3
Our heritage informs our
TECHNOLOGY INVESTMENTS
We hold multiple patents for analyzing risks that
are difficult to quantify.
We developed the protective intelligence
methodology used by the Bill & Melinda Gates
Foundation
DHS used our algorithms for over $18B in risk
based grant allocations to state and local
agencies
Our threat and incident management systems
have become the de-facto standard for major
national events in the US
COMPANY PROPRIETARY INFORMATION 4
Broader visibility | Reduced response times|
Prioritized resource allocation
Profile threat and risk to their enterprise
Monitor continuously and broadly against
that profile
Implement collaborative, dynamic
situational awareness
Prioritize and route critical information for
action
Our customers use our applications to
MANAGE THREAT AND RISKS TO THEIR ENVIRONMENTS
COMPANY PROPRIETARY INFORMATION 5
Our analytic applications enable
CONTEXTUALIZED SITUATON AWARENESS
Contextual situational
awareness anywhere
Swivel-chair situational
awareness does not scale
…and one app
Into one screen
Haystax Analytics &
visualization can put all the
information that goes here
COMPANY PROPRIETARY INFORMATION 6
At the core of our real-time analytics is our powerful and user
centric CONSTELLATION ANALYTICS PLATFORM
Analytic Tools
Data Collection
& Pre-Processing
Analytic
Processing
Low Priority Channels
Archive DB
Alerts
Analysis
& Reports
Calls for
Service
News Feeds SARS
Critical
Infrastructure
Web Browsers
Mobile Devices
External Systems
MapTriage Timeline
Direct
Observations
Social
Networks
Domain Ontology
Natural Language
Association
Analysis
Scoring
Entity Resolution
Geo Reasoning
Information pushed to
the edge
Visualizations that drive actionable intelligence
Massive scaling in Real Time
Analytics to contextualize and Prioritize
COMPANY PROPRIETARY INFORMATION 7
Monitor categorized & prioritized data
feeds from multiple sources
Make predictions based on trends and
intensity of data
Use dynamically generated profiles of
people, places & things to discover link
Actionable intelligence is presenting data
in context and focusing the user on what is
most important.
Enabling analysts to visualize patterns
AND CONNECT THE DOTS MORE EASILY
COMPANY PROPRIETARY INFORMATION 8
User interface designed to focus user
to hot spots and key alerts
Holistic presentation framework that
optimizes based on device, role,
location, time, context
Information is prioritized based on
relevance to the user
Actionable
intelligence is taking
information to the
user, wherever they
may be.
Enabling commanders to understand a situation from
ANYWHERE QUICKLY AND SECURELY
COMPANY PROPRIETARY INFORMATION 9
Enabling first responders to be
MORE EFFECTIVE
Unified system of records that can
be accessed from anywhere,
anytime
Application performance optimized
for mission critical deployments
In-built secure cross organization
information sharing & collaboration
Actionable intelligence is seamlessly tying
information to operational processes.
COMPANY PROPRIETARY INFORMATION 10
Our customers represent a wide range of organizations
in terms of size, complexity, resources & technical ability
COMMERCIAL
Microsoft
Bill & Melinda Gates Foundation
National Football League
DEPARTMENT OF DEFENSE
Department of the Army
United States Special Operations
Command
THE INTELLIGENCE COMMUNITY
National Intelligence Agencies
STATE AND MAJOR URBAN AREAS
FUSION CENTERS
Northern California Regional Intelligence
Center
Boston Regional Intelligence Center
(Boston, MA)
Joint Regional Intelligence Center (Los
Angeles,)
Dallas Fusion Center (Dallas, TX
MAJOR URBAN AREAS RISK
MANAGEMENT
15 of the top 20
Used Nationwide
COMPANY PROPRIETARY INFORMATION 11
8 regions analyzing and
monitoring with shared best
practices
20122010
Analysis of risk to a single
jurisdiction by a single
agency
California uses the Haystax Public Safety Cloud to connect its
8 MAJOR URBAN AREAS
into a collaborative information sharing network (CalCOP)
2011
Regional analysis and
monitoring of threats
across agencies in a
jurisdiction
2014
Statewide collaborative analysis
and situational awareness
COMPANY PROPRIETARY INFORMATION 12
Haystax Watchboard in California State Operations Center (May
2014)
Haystax provides the analytic
back-bone for total situational
awareness
100% cloud based
Integrates hundreds of real
time information sources
across the state
Information is prioritized and
routed automatically to
personnel on the ground as
needed
Contextual situational awareness from one
screen
COMPANY PROPRIETARY INFORMATION 13
Haystax has powered total situational awareness for
LAST FIVE SUPER BOWLS
In the command center Forward deployed Mobile Apps
>25 mile
radius monitored
312 events
monitored
737 total
users
600 real-time
data feeds
238 assets
protected
345 incidents
managed
RESULTS FROM SUPER BOWL XLVIII
COMPANY PROPRIETARY INFORMATION 14
Effective situational awareness is consumed directly by
the decision maker
More layers is not better
Not all information is of the same urgency or importance
Required manipulation by specialized analysts renders a
system useless in a real situation
Moving beyond “Swivel chair” situational awareness
(stovepipes) is what most leaders are truly looking for
Building map displays (GIS) is now purely commodity –
deciding the philosophy of the display is the hard, but
valuable part
We use a hazard and risk orientation to drive prioritization
Just because a feed or system or dataset CAN be
integrated, doesn’t mean it SHOULD be
Mobility is a game changer
Mobility empowers field reporting, which drives ground
truth
What we have learned
COMPANY PROPRIETARY INFORMATION 15
COMPANY PROPRIETARY INFORMATION
Thank You
Contact us: info@haystax.com
Visit us: www.haystax.com
8251 Greensboro Drive, Suite 1111
McLean, VA 22012

More Related Content

What's hot

healthcare-analytics-info-2660933
healthcare-analytics-info-2660933healthcare-analytics-info-2660933
healthcare-analytics-info-2660933
Alin Gheorghe
 
Modern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINALModern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINAL
Jason Bowne
 

What's hot (20)

Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshare
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
 
08 july 2016
08 july 201608 july 2016
08 july 2016
 
healthcare-analytics-info-2660933
healthcare-analytics-info-2660933healthcare-analytics-info-2660933
healthcare-analytics-info-2660933
 
Cylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment DatasheetCylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment Datasheet
 
Intelligence and investigation management
 Intelligence and investigation management Intelligence and investigation management
Intelligence and investigation management
 
Protect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other DisastersProtect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other Disasters
 
What We Learned at HIMSS18
What We Learned at HIMSS18What We Learned at HIMSS18
What We Learned at HIMSS18
 
The Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQ
The Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQThe Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQ
The Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQ
 
CXAIR for Healthcare Brochure
CXAIR for Healthcare BrochureCXAIR for Healthcare Brochure
CXAIR for Healthcare Brochure
 
MT29 Panel: Becoming a data-driven enterprise
MT29 Panel: Becoming a data-driven enterpriseMT29 Panel: Becoming a data-driven enterprise
MT29 Panel: Becoming a data-driven enterprise
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
Teams healthcare partner webinar paul partner
Teams healthcare partner webinar   paul  partnerTeams healthcare partner webinar   paul  partner
Teams healthcare partner webinar paul partner
 
eBook | Reimagine the Future of Healthcare
eBook | Reimagine the Future of Healthcare eBook | Reimagine the Future of Healthcare
eBook | Reimagine the Future of Healthcare
 
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and ControlWhose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
 
Insight 2020 Technology Report: IT Trends for Midmarket and Small Business
Insight 2020 Technology Report: IT Trends for Midmarket and Small BusinessInsight 2020 Technology Report: IT Trends for Midmarket and Small Business
Insight 2020 Technology Report: IT Trends for Midmarket and Small Business
 
EXIGIS RiskWorksPS Solution Overview
EXIGIS RiskWorksPS Solution OverviewEXIGIS RiskWorksPS Solution Overview
EXIGIS RiskWorksPS Solution Overview
 
Modern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINALModern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINAL
 
Using a risk based approach to provide cost-effective security
Using a risk based approach to provide cost-effective securityUsing a risk based approach to provide cost-effective security
Using a risk based approach to provide cost-effective security
 

Similar to Haystax Innovative Solutions Consortium Presentation

Veritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-ENVeritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-EN
Richard Williams
 

Similar to Haystax Innovative Solutions Consortium Presentation (20)

Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax Technology
 
The Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data EcosystemThe Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data Ecosystem
 
The constellation analytics platform
The constellation analytics platformThe constellation analytics platform
The constellation analytics platform
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Critical assets protection
Critical assets protectionCritical assets protection
Critical assets protection
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
AWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - SplunkAWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - Splunk
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Rhodium overview op
Rhodium overview opRhodium overview op
Rhodium overview op
 
Veritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-ENVeritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-EN
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
 
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
 
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEn
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEnHP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEn
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEn
 
SAP NS2 Brochure - 2013
SAP NS2 Brochure - 2013SAP NS2 Brochure - 2013
SAP NS2 Brochure - 2013
 
Hitachi Cloud Vision
Hitachi Cloud VisionHitachi Cloud Vision
Hitachi Cloud Vision
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the Government
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Haystax Innovative Solutions Consortium Presentation

  • 1. COMPANY PROPRIETARY INFORMATION Actionable Intelligence for Decision Makers – Anywhere, Anytime Reston, VA | August 2014
  • 3. COMPANY PROPRIETARY INFORMATION 2 HAYSTAX TECHNOLOGY OFFERS Advanced cloud based analytic solutions that provide real time actionable intelligence for complex, high consequence decisions
  • 4. COMPANY PROPRIETARY INFORMATION 3 Our heritage informs our TECHNOLOGY INVESTMENTS We hold multiple patents for analyzing risks that are difficult to quantify. We developed the protective intelligence methodology used by the Bill & Melinda Gates Foundation DHS used our algorithms for over $18B in risk based grant allocations to state and local agencies Our threat and incident management systems have become the de-facto standard for major national events in the US
  • 5. COMPANY PROPRIETARY INFORMATION 4 Broader visibility | Reduced response times| Prioritized resource allocation Profile threat and risk to their enterprise Monitor continuously and broadly against that profile Implement collaborative, dynamic situational awareness Prioritize and route critical information for action Our customers use our applications to MANAGE THREAT AND RISKS TO THEIR ENVIRONMENTS
  • 6. COMPANY PROPRIETARY INFORMATION 5 Our analytic applications enable CONTEXTUALIZED SITUATON AWARENESS Contextual situational awareness anywhere Swivel-chair situational awareness does not scale …and one app Into one screen Haystax Analytics & visualization can put all the information that goes here
  • 7. COMPANY PROPRIETARY INFORMATION 6 At the core of our real-time analytics is our powerful and user centric CONSTELLATION ANALYTICS PLATFORM Analytic Tools Data Collection & Pre-Processing Analytic Processing Low Priority Channels Archive DB Alerts Analysis & Reports Calls for Service News Feeds SARS Critical Infrastructure Web Browsers Mobile Devices External Systems MapTriage Timeline Direct Observations Social Networks Domain Ontology Natural Language Association Analysis Scoring Entity Resolution Geo Reasoning Information pushed to the edge Visualizations that drive actionable intelligence Massive scaling in Real Time Analytics to contextualize and Prioritize
  • 8. COMPANY PROPRIETARY INFORMATION 7 Monitor categorized & prioritized data feeds from multiple sources Make predictions based on trends and intensity of data Use dynamically generated profiles of people, places & things to discover link Actionable intelligence is presenting data in context and focusing the user on what is most important. Enabling analysts to visualize patterns AND CONNECT THE DOTS MORE EASILY
  • 9. COMPANY PROPRIETARY INFORMATION 8 User interface designed to focus user to hot spots and key alerts Holistic presentation framework that optimizes based on device, role, location, time, context Information is prioritized based on relevance to the user Actionable intelligence is taking information to the user, wherever they may be. Enabling commanders to understand a situation from ANYWHERE QUICKLY AND SECURELY
  • 10. COMPANY PROPRIETARY INFORMATION 9 Enabling first responders to be MORE EFFECTIVE Unified system of records that can be accessed from anywhere, anytime Application performance optimized for mission critical deployments In-built secure cross organization information sharing & collaboration Actionable intelligence is seamlessly tying information to operational processes.
  • 11. COMPANY PROPRIETARY INFORMATION 10 Our customers represent a wide range of organizations in terms of size, complexity, resources & technical ability COMMERCIAL Microsoft Bill & Melinda Gates Foundation National Football League DEPARTMENT OF DEFENSE Department of the Army United States Special Operations Command THE INTELLIGENCE COMMUNITY National Intelligence Agencies STATE AND MAJOR URBAN AREAS FUSION CENTERS Northern California Regional Intelligence Center Boston Regional Intelligence Center (Boston, MA) Joint Regional Intelligence Center (Los Angeles,) Dallas Fusion Center (Dallas, TX MAJOR URBAN AREAS RISK MANAGEMENT 15 of the top 20 Used Nationwide
  • 12. COMPANY PROPRIETARY INFORMATION 11 8 regions analyzing and monitoring with shared best practices 20122010 Analysis of risk to a single jurisdiction by a single agency California uses the Haystax Public Safety Cloud to connect its 8 MAJOR URBAN AREAS into a collaborative information sharing network (CalCOP) 2011 Regional analysis and monitoring of threats across agencies in a jurisdiction 2014 Statewide collaborative analysis and situational awareness
  • 13. COMPANY PROPRIETARY INFORMATION 12 Haystax Watchboard in California State Operations Center (May 2014) Haystax provides the analytic back-bone for total situational awareness 100% cloud based Integrates hundreds of real time information sources across the state Information is prioritized and routed automatically to personnel on the ground as needed Contextual situational awareness from one screen
  • 14. COMPANY PROPRIETARY INFORMATION 13 Haystax has powered total situational awareness for LAST FIVE SUPER BOWLS In the command center Forward deployed Mobile Apps >25 mile radius monitored 312 events monitored 737 total users 600 real-time data feeds 238 assets protected 345 incidents managed RESULTS FROM SUPER BOWL XLVIII
  • 15. COMPANY PROPRIETARY INFORMATION 14 Effective situational awareness is consumed directly by the decision maker More layers is not better Not all information is of the same urgency or importance Required manipulation by specialized analysts renders a system useless in a real situation Moving beyond “Swivel chair” situational awareness (stovepipes) is what most leaders are truly looking for Building map displays (GIS) is now purely commodity – deciding the philosophy of the display is the hard, but valuable part We use a hazard and risk orientation to drive prioritization Just because a feed or system or dataset CAN be integrated, doesn’t mean it SHOULD be Mobility is a game changer Mobility empowers field reporting, which drives ground truth What we have learned
  • 17. COMPANY PROPRIETARY INFORMATION Thank You Contact us: info@haystax.com Visit us: www.haystax.com 8251 Greensboro Drive, Suite 1111 McLean, VA 22012

Editor's Notes

  1. Bill 4
  2. Profile threat and risk - Use data and analytics to quantify risks and measure gaps in capabilities Monitor broadly against your risk profile – monitor sensors, online data, social media, and field reporting for indicators & warnings (I&W) of threats Provide dynamic data visualization – Use geospatial, temporal, and triage views to inform stakeholders Prioritize and route critical information - Use real-time analytics to identify priority information and direct it to those who need to see it wherever they are
  3. The constellation platform is the result of our R&D efforts over the last 10 years! It’s built using the most modern open source analytic technologies – we are using the same frameworks that products like Twitter and facebook use…it’s all proven. In some cases we had to optimize the technologies to make it do what we wanted. The most important thing is that Constellation is ready to use. It isn’t something we build from scratch for our customers. It just works…. How does it work? That’s the section in the middle Finally, we present the information through defined visual canvases. What is important to remember is that the end user does not need to do anything to generate these views. So how is this used?
  4. Let’s look at it from the position of decision makers: Starting with an analyst. We are looking at three screens that show analytic fusion from Constellation… You can explain the text…
  5. It’s about non technical users such as commanders being self sufficient in using analytics to make decisions. We are breaking the typical mold of analytic applications. We are not focusing on eye candy, but on decision centric presentations and interaction models. So, who are our customers?
  6. It’s not just about analysts, it also about pushing intelligence out to the field in mission critical situations.
  7. It’s a combination of customers across the public sector industry… Explain some highlights. So let’s look at what we mean by the Public safety ecosystem…next slide
  8. Cloud enables you to grow faster. You can grow what is working…you can increase stakeholder participation more easily.
  9. Bill 1