SlideShare a Scribd company logo
1 of 17
COMPANY PROPRIETARY INFORMATION
Actionable Intelligence for
Decision Makers – Anywhere,
Anytime
Reston, VA | August 2014
COMPANY PROPRIETARY INFORMATION 1
COMPANY PROPRIETARY INFORMATION 2
HAYSTAX TECHNOLOGY OFFERS
Advanced cloud based analytic solutions
that provide real time actionable intelligence
for complex, high consequence decisions
COMPANY PROPRIETARY INFORMATION 3
Our heritage informs our
TECHNOLOGY INVESTMENTS
We hold multiple patents for analyzing risks that
are difficult to quantify.
We developed the protective intelligence
methodology used by the Bill & Melinda Gates
Foundation
DHS used our algorithms for over $18B in risk
based grant allocations to state and local
agencies
Our threat and incident management systems
have become the de-facto standard for major
national events in the US
COMPANY PROPRIETARY INFORMATION 4
Broader visibility | Reduced response times|
Prioritized resource allocation
Profile threat and risk to their enterprise
Monitor continuously and broadly against
that profile
Implement collaborative, dynamic
situational awareness
Prioritize and route critical information for
action
Our customers use our applications to
MANAGE THREAT AND RISKS TO THEIR ENVIRONMENTS
COMPANY PROPRIETARY INFORMATION 5
Our analytic applications enable
CONTEXTUALIZED SITUATON AWARENESS
Contextual situational
awareness anywhere
Swivel-chair situational
awareness does not scale
…and one app
Into one screen
Haystax Analytics &
visualization can put all the
information that goes here
COMPANY PROPRIETARY INFORMATION 6
At the core of our real-time analytics is our powerful and user
centric CONSTELLATION ANALYTICS PLATFORM
Analytic Tools
Data Collection
& Pre-Processing
Analytic
Processing
Low Priority Channels
Archive DB
Alerts
Analysis
& Reports
Calls for
Service
News Feeds SARS
Critical
Infrastructure
Web Browsers
Mobile Devices
External Systems
MapTriage Timeline
Direct
Observations
Social
Networks
Domain Ontology
Natural Language
Association
Analysis
Scoring
Entity Resolution
Geo Reasoning
Information pushed to
the edge
Visualizations that drive actionable intelligence
Massive scaling in Real Time
Analytics to contextualize and Prioritize
COMPANY PROPRIETARY INFORMATION 7
Monitor categorized & prioritized data
feeds from multiple sources
Make predictions based on trends and
intensity of data
Use dynamically generated profiles of
people, places & things to discover link
Actionable intelligence is presenting data
in context and focusing the user on what is
most important.
Enabling analysts to visualize patterns
AND CONNECT THE DOTS MORE EASILY
COMPANY PROPRIETARY INFORMATION 8
User interface designed to focus user
to hot spots and key alerts
Holistic presentation framework that
optimizes based on device, role,
location, time, context
Information is prioritized based on
relevance to the user
Actionable
intelligence is taking
information to the
user, wherever they
may be.
Enabling commanders to understand a situation from
ANYWHERE QUICKLY AND SECURELY
COMPANY PROPRIETARY INFORMATION 9
Enabling first responders to be
MORE EFFECTIVE
Unified system of records that can
be accessed from anywhere,
anytime
Application performance optimized
for mission critical deployments
In-built secure cross organization
information sharing & collaboration
Actionable intelligence is seamlessly tying
information to operational processes.
COMPANY PROPRIETARY INFORMATION 10
Our customers represent a wide range of organizations
in terms of size, complexity, resources & technical ability
COMMERCIAL
Microsoft
Bill & Melinda Gates Foundation
National Football League
DEPARTMENT OF DEFENSE
Department of the Army
United States Special Operations
Command
THE INTELLIGENCE COMMUNITY
National Intelligence Agencies
STATE AND MAJOR URBAN AREAS
FUSION CENTERS
Northern California Regional Intelligence
Center
Boston Regional Intelligence Center
(Boston, MA)
Joint Regional Intelligence Center (Los
Angeles,)
Dallas Fusion Center (Dallas, TX
MAJOR URBAN AREAS RISK
MANAGEMENT
15 of the top 20
Used Nationwide
COMPANY PROPRIETARY INFORMATION 11
8 regions analyzing and
monitoring with shared best
practices
20122010
Analysis of risk to a single
jurisdiction by a single
agency
California uses the Haystax Public Safety Cloud to connect its
8 MAJOR URBAN AREAS
into a collaborative information sharing network (CalCOP)
2011
Regional analysis and
monitoring of threats
across agencies in a
jurisdiction
2014
Statewide collaborative analysis
and situational awareness
COMPANY PROPRIETARY INFORMATION 12
Haystax Watchboard in California State Operations Center (May
2014)
Haystax provides the analytic
back-bone for total situational
awareness
100% cloud based
Integrates hundreds of real
time information sources
across the state
Information is prioritized and
routed automatically to
personnel on the ground as
needed
Contextual situational awareness from one
screen
COMPANY PROPRIETARY INFORMATION 13
Haystax has powered total situational awareness for
LAST FIVE SUPER BOWLS
In the command center Forward deployed Mobile Apps
>25 mile
radius monitored
312 events
monitored
737 total
users
600 real-time
data feeds
238 assets
protected
345 incidents
managed
RESULTS FROM SUPER BOWL XLVIII
COMPANY PROPRIETARY INFORMATION 14
Effective situational awareness is consumed directly by
the decision maker
More layers is not better
Not all information is of the same urgency or importance
Required manipulation by specialized analysts renders a
system useless in a real situation
Moving beyond “Swivel chair” situational awareness
(stovepipes) is what most leaders are truly looking for
Building map displays (GIS) is now purely commodity –
deciding the philosophy of the display is the hard, but
valuable part
We use a hazard and risk orientation to drive prioritization
Just because a feed or system or dataset CAN be
integrated, doesn’t mean it SHOULD be
Mobility is a game changer
Mobility empowers field reporting, which drives ground
truth
What we have learned
COMPANY PROPRIETARY INFORMATION 15
COMPANY PROPRIETARY INFORMATION
Thank You
Contact us: info@haystax.com
Visit us: www.haystax.com
8251 Greensboro Drive, Suite 1111
McLean, VA 22012

More Related Content

What's hot

Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar Decisions
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Fujitsu Middle East
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...Scalar Decisions
 
healthcare-analytics-info-2660933
healthcare-analytics-info-2660933healthcare-analytics-info-2660933
healthcare-analytics-info-2660933Alin Gheorghe
 
Intelligence and investigation management
 Intelligence and investigation management Intelligence and investigation management
Intelligence and investigation managementAdeola Taiwo-Ogunbode
 
Protect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other DisastersProtect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other DisastersBluelock
 
What We Learned at HIMSS18
What We Learned at HIMSS18What We Learned at HIMSS18
What We Learned at HIMSS18Spok
 
The Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQ
The Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQThe Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQ
The Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQElasticsearch
 
CXAIR for Healthcare Brochure
CXAIR for Healthcare BrochureCXAIR for Healthcare Brochure
CXAIR for Healthcare BrochureConnexica
 
MT29 Panel: Becoming a data-driven enterprise
MT29 Panel: Becoming a data-driven enterpriseMT29 Panel: Becoming a data-driven enterprise
MT29 Panel: Becoming a data-driven enterpriseDell EMC World
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 
Teams healthcare partner webinar paul partner
Teams healthcare partner webinar   paul  partnerTeams healthcare partner webinar   paul  partner
Teams healthcare partner webinar paul partnerMicrosoft 365 Developer
 
eBook | Reimagine the Future of Healthcare
eBook | Reimagine the Future of Healthcare eBook | Reimagine the Future of Healthcare
eBook | Reimagine the Future of Healthcare Insight
 
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and ControlWhose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and ControlDavid Etue
 
Insight 2020 Technology Report: IT Trends for Midmarket and Small Business
Insight 2020 Technology Report: IT Trends for Midmarket and Small BusinessInsight 2020 Technology Report: IT Trends for Midmarket and Small Business
Insight 2020 Technology Report: IT Trends for Midmarket and Small BusinessInsight
 
EXIGIS RiskWorksPS Solution Overview
EXIGIS RiskWorksPS Solution OverviewEXIGIS RiskWorksPS Solution Overview
EXIGIS RiskWorksPS Solution OverviewExigis
 
Modern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINALModern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINALJason Bowne
 
Using a risk based approach to provide cost-effective security
Using a risk based approach to provide cost-effective securityUsing a risk based approach to provide cost-effective security
Using a risk based approach to provide cost-effective securityElasticsearch
 

What's hot (20)

Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshare
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
 
08 july 2016
08 july 201608 july 2016
08 july 2016
 
healthcare-analytics-info-2660933
healthcare-analytics-info-2660933healthcare-analytics-info-2660933
healthcare-analytics-info-2660933
 
Cylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment DatasheetCylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment Datasheet
 
Intelligence and investigation management
 Intelligence and investigation management Intelligence and investigation management
Intelligence and investigation management
 
Protect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other DisastersProtect Your Data and Apps from Zombies and Other Disasters
Protect Your Data and Apps from Zombies and Other Disasters
 
What We Learned at HIMSS18
What We Learned at HIMSS18What We Learned at HIMSS18
What We Learned at HIMSS18
 
The Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQ
The Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQThe Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQ
The Engine Behind 'Discovery': Elasticsearch Service @ CreatorIQ
 
CXAIR for Healthcare Brochure
CXAIR for Healthcare BrochureCXAIR for Healthcare Brochure
CXAIR for Healthcare Brochure
 
MT29 Panel: Becoming a data-driven enterprise
MT29 Panel: Becoming a data-driven enterpriseMT29 Panel: Becoming a data-driven enterprise
MT29 Panel: Becoming a data-driven enterprise
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
Teams healthcare partner webinar paul partner
Teams healthcare partner webinar   paul  partnerTeams healthcare partner webinar   paul  partner
Teams healthcare partner webinar paul partner
 
eBook | Reimagine the Future of Healthcare
eBook | Reimagine the Future of Healthcare eBook | Reimagine the Future of Healthcare
eBook | Reimagine the Future of Healthcare
 
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and ControlWhose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
 
Insight 2020 Technology Report: IT Trends for Midmarket and Small Business
Insight 2020 Technology Report: IT Trends for Midmarket and Small BusinessInsight 2020 Technology Report: IT Trends for Midmarket and Small Business
Insight 2020 Technology Report: IT Trends for Midmarket and Small Business
 
EXIGIS RiskWorksPS Solution Overview
EXIGIS RiskWorksPS Solution OverviewEXIGIS RiskWorksPS Solution Overview
EXIGIS RiskWorksPS Solution Overview
 
Modern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINALModern Datacenter_FY14_FINAL
Modern Datacenter_FY14_FINAL
 
Using a risk based approach to provide cost-effective security
Using a risk based approach to provide cost-effective securityUsing a risk based approach to provide cost-effective security
Using a risk based approach to provide cost-effective security
 

Similar to Haystax Innovative Solutions Consortium Presentation

Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax TechnologyHaystax Technology
 
The Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data EcosystemThe Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data EcosystemSafe Software
 
The constellation analytics platform
The constellation analytics platformThe constellation analytics platform
The constellation analytics platformHaystax Technology
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewStephen Bates
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationResolver Inc.
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
AWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - SplunkAWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - SplunkAmazon Web Services
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
Rhodium overview op
Rhodium overview opRhodium overview op
Rhodium overview opTim Jacobs
 
Veritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-ENVeritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-ENRichard Williams
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk
 
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...Samsung Business USA
 
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEn
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEnHP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEn
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEnHP Enterprise Italia
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkAndrew Gerber
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentVidSys, Inc.
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteSplunk
 

Similar to Haystax Innovative Solutions Consortium Presentation (20)

Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax Technology
 
The Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data EcosystemThe Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data Ecosystem
 
The constellation analytics platform
The constellation analytics platformThe constellation analytics platform
The constellation analytics platform
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Critical assets protection
Critical assets protectionCritical assets protection
Critical assets protection
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
AWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - SplunkAWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - Splunk
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Rhodium overview op
Rhodium overview opRhodium overview op
Rhodium overview op
 
Veritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-ENVeritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-EN
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
 
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
6 Ways Mobile is Transforming Critical Incident Response and Consequence Mana...
 
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEn
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEnHP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEn
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEn
 
SAP NS2 Brochure - 2013
SAP NS2 Brochure - 2013SAP NS2 Brochure - 2013
SAP NS2 Brochure - 2013
 
Hitachi Cloud Vision
Hitachi Cloud VisionHitachi Cloud Vision
Hitachi Cloud Vision
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the Government
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Haystax Innovative Solutions Consortium Presentation

  • 1. COMPANY PROPRIETARY INFORMATION Actionable Intelligence for Decision Makers – Anywhere, Anytime Reston, VA | August 2014
  • 3. COMPANY PROPRIETARY INFORMATION 2 HAYSTAX TECHNOLOGY OFFERS Advanced cloud based analytic solutions that provide real time actionable intelligence for complex, high consequence decisions
  • 4. COMPANY PROPRIETARY INFORMATION 3 Our heritage informs our TECHNOLOGY INVESTMENTS We hold multiple patents for analyzing risks that are difficult to quantify. We developed the protective intelligence methodology used by the Bill & Melinda Gates Foundation DHS used our algorithms for over $18B in risk based grant allocations to state and local agencies Our threat and incident management systems have become the de-facto standard for major national events in the US
  • 5. COMPANY PROPRIETARY INFORMATION 4 Broader visibility | Reduced response times| Prioritized resource allocation Profile threat and risk to their enterprise Monitor continuously and broadly against that profile Implement collaborative, dynamic situational awareness Prioritize and route critical information for action Our customers use our applications to MANAGE THREAT AND RISKS TO THEIR ENVIRONMENTS
  • 6. COMPANY PROPRIETARY INFORMATION 5 Our analytic applications enable CONTEXTUALIZED SITUATON AWARENESS Contextual situational awareness anywhere Swivel-chair situational awareness does not scale …and one app Into one screen Haystax Analytics & visualization can put all the information that goes here
  • 7. COMPANY PROPRIETARY INFORMATION 6 At the core of our real-time analytics is our powerful and user centric CONSTELLATION ANALYTICS PLATFORM Analytic Tools Data Collection & Pre-Processing Analytic Processing Low Priority Channels Archive DB Alerts Analysis & Reports Calls for Service News Feeds SARS Critical Infrastructure Web Browsers Mobile Devices External Systems MapTriage Timeline Direct Observations Social Networks Domain Ontology Natural Language Association Analysis Scoring Entity Resolution Geo Reasoning Information pushed to the edge Visualizations that drive actionable intelligence Massive scaling in Real Time Analytics to contextualize and Prioritize
  • 8. COMPANY PROPRIETARY INFORMATION 7 Monitor categorized & prioritized data feeds from multiple sources Make predictions based on trends and intensity of data Use dynamically generated profiles of people, places & things to discover link Actionable intelligence is presenting data in context and focusing the user on what is most important. Enabling analysts to visualize patterns AND CONNECT THE DOTS MORE EASILY
  • 9. COMPANY PROPRIETARY INFORMATION 8 User interface designed to focus user to hot spots and key alerts Holistic presentation framework that optimizes based on device, role, location, time, context Information is prioritized based on relevance to the user Actionable intelligence is taking information to the user, wherever they may be. Enabling commanders to understand a situation from ANYWHERE QUICKLY AND SECURELY
  • 10. COMPANY PROPRIETARY INFORMATION 9 Enabling first responders to be MORE EFFECTIVE Unified system of records that can be accessed from anywhere, anytime Application performance optimized for mission critical deployments In-built secure cross organization information sharing & collaboration Actionable intelligence is seamlessly tying information to operational processes.
  • 11. COMPANY PROPRIETARY INFORMATION 10 Our customers represent a wide range of organizations in terms of size, complexity, resources & technical ability COMMERCIAL Microsoft Bill & Melinda Gates Foundation National Football League DEPARTMENT OF DEFENSE Department of the Army United States Special Operations Command THE INTELLIGENCE COMMUNITY National Intelligence Agencies STATE AND MAJOR URBAN AREAS FUSION CENTERS Northern California Regional Intelligence Center Boston Regional Intelligence Center (Boston, MA) Joint Regional Intelligence Center (Los Angeles,) Dallas Fusion Center (Dallas, TX MAJOR URBAN AREAS RISK MANAGEMENT 15 of the top 20 Used Nationwide
  • 12. COMPANY PROPRIETARY INFORMATION 11 8 regions analyzing and monitoring with shared best practices 20122010 Analysis of risk to a single jurisdiction by a single agency California uses the Haystax Public Safety Cloud to connect its 8 MAJOR URBAN AREAS into a collaborative information sharing network (CalCOP) 2011 Regional analysis and monitoring of threats across agencies in a jurisdiction 2014 Statewide collaborative analysis and situational awareness
  • 13. COMPANY PROPRIETARY INFORMATION 12 Haystax Watchboard in California State Operations Center (May 2014) Haystax provides the analytic back-bone for total situational awareness 100% cloud based Integrates hundreds of real time information sources across the state Information is prioritized and routed automatically to personnel on the ground as needed Contextual situational awareness from one screen
  • 14. COMPANY PROPRIETARY INFORMATION 13 Haystax has powered total situational awareness for LAST FIVE SUPER BOWLS In the command center Forward deployed Mobile Apps >25 mile radius monitored 312 events monitored 737 total users 600 real-time data feeds 238 assets protected 345 incidents managed RESULTS FROM SUPER BOWL XLVIII
  • 15. COMPANY PROPRIETARY INFORMATION 14 Effective situational awareness is consumed directly by the decision maker More layers is not better Not all information is of the same urgency or importance Required manipulation by specialized analysts renders a system useless in a real situation Moving beyond “Swivel chair” situational awareness (stovepipes) is what most leaders are truly looking for Building map displays (GIS) is now purely commodity – deciding the philosophy of the display is the hard, but valuable part We use a hazard and risk orientation to drive prioritization Just because a feed or system or dataset CAN be integrated, doesn’t mean it SHOULD be Mobility is a game changer Mobility empowers field reporting, which drives ground truth What we have learned
  • 17. COMPANY PROPRIETARY INFORMATION Thank You Contact us: info@haystax.com Visit us: www.haystax.com 8251 Greensboro Drive, Suite 1111 McLean, VA 22012

Editor's Notes

  1. Bill 4
  2. Profile threat and risk - Use data and analytics to quantify risks and measure gaps in capabilities Monitor broadly against your risk profile – monitor sensors, online data, social media, and field reporting for indicators & warnings (I&W) of threats Provide dynamic data visualization – Use geospatial, temporal, and triage views to inform stakeholders Prioritize and route critical information - Use real-time analytics to identify priority information and direct it to those who need to see it wherever they are
  3. The constellation platform is the result of our R&D efforts over the last 10 years! It’s built using the most modern open source analytic technologies – we are using the same frameworks that products like Twitter and facebook use…it’s all proven. In some cases we had to optimize the technologies to make it do what we wanted. The most important thing is that Constellation is ready to use. It isn’t something we build from scratch for our customers. It just works…. How does it work? That’s the section in the middle Finally, we present the information through defined visual canvases. What is important to remember is that the end user does not need to do anything to generate these views. So how is this used?
  4. Let’s look at it from the position of decision makers: Starting with an analyst. We are looking at three screens that show analytic fusion from Constellation… You can explain the text…
  5. It’s about non technical users such as commanders being self sufficient in using analytics to make decisions. We are breaking the typical mold of analytic applications. We are not focusing on eye candy, but on decision centric presentations and interaction models. So, who are our customers?
  6. It’s not just about analysts, it also about pushing intelligence out to the field in mission critical situations.
  7. It’s a combination of customers across the public sector industry… Explain some highlights. So let’s look at what we mean by the Public safety ecosystem…next slide
  8. Cloud enables you to grow faster. You can grow what is working…you can increase stakeholder participation more easily.
  9. Bill 1