SlideShare a Scribd company logo
1 of 20
Enterprise Threat Management 
Haystax Technology | Washington DC
1 
Topics 
INTRODUCTION 
HAYSTAX ENTERPRISE THREAT 
MANAGEMENT 
CUSTOMERS 
DEMO 
WRAP-UP
2 
Company Facts 
CYBERSECURITY AND ENTERPRISE THREAT MANAGEMENT SOLUTIONS 
FORMED in 2012 on a 20 year legacy 
(Digital Sandbox, FlexPoint, NetCentrics) 
EMPLOYEES: 350, 90% Cleared 
COMPETENCIES: Cybersecurity, 
Information Assurance, Network 
Management, Advanced Threat 
Analytics, Innovation Management
3 
Solutions that Enable Decision Makers 
TO MAKE HIGH CONSEQUENCE DECISIONS WITH CONFIDENCE 
Protect computer networks 
Protect critical infrastructure & key resources 
Protect against loss from fraud 
Protect people from natural hazards & human 
threats 
Protect an enterprises ability to compete 
effectively 
Manage responses to threats
4 
Haystax Enterprise Threat Management 
ENABLING RISK INFORMED DECISION MAKING 
Profile overall 
enterprise threat and 
risk 
Monitor continuously 
and broadly against 
that profile 
Prioritize and route 
critical information for 
Implement collaborative, 
dynamic situational 
awareness 
action
5 
The Constellation Analytics PlatformTM 
OPTIMIZES MACHINE AND HUMAN PROCESSING OF DATA 
Physical 
Enterprise 
Calls for HR Data 
Service 
News & Social Communications Enterprise Data 
Assets/CIKR 
Archive DB Web 
Low Priority Channels 
Domain Ontology 
NLP 
Entity Resolution 
Geo Reasoning 
Association 
Analysis 
Scoring 
Data Collection 
& Pre-Processing 
Analytic 
Processing 
Mobile 
3rd Party 
Triage Timeline Map 
Alerts Visual Interaction Canvases Reports 
Feeds 
Network Alerts 
Know & Act 
Patent # 8874071
6 
Decision Makers are Increasingly Mobile 
ACTIONABLE INTELLIGENCE BEYOND OFFICE WALLS 
Powerful native apps with easy self 
configuration and usability 
Reporting, Assessments & Monitoring 
seamlessly integrated 
Secure online/offline data access from 
anywhere
7 
Informed Decision Making Needs Context 
CONTEXT ENABLES DECISION MAKER TO UNDERSTAND ALL THE DATA 
Into one screen 
Swivel-chair situational awareness 
Contextual situational 
does not scale awareness anywhere 
…and one app 
Haystax Analytics & 
visualization can put all the 
information that goes here
8 
Context Helps First Responders 
BY SEAMLESSLY TYING INFORMATION TO THEIR OPERATIONAL PROCESS 
Unified system of records that can be 
accessed from anywhere, anytime 
Fuse data streams from existing 
systems into “channels” of prioritized 
operational information 
Secure cross organization information 
sharing & collaboration
9 
Context Helps Mission Commanders 
BY PROVIDING CONTEXTUAL SITUATIONAL AWARENESS WHEREVER THEY ARE 
User interface designed to focus user 
to hot spots and key alerts 
Holistic presentation framework that 
optimizes based on device, role, 
location, time, context 
Information is prioritized based on 
relevance to the user
10 
Context Helps Intelligence Analysts 
BY MAKING IT EASY TO INTERACT WITH REAL TIME DATA IN REAL TIME 
Monitor categorized & prioritized data 
feeds from multiple sources 
Make predictions based on trends and 
intensity of data 
Use dynamically generated profiles of to 
discover links & associations
11 
Trusted by a Wide Range of Organizations 
TO PROVIDE INNOVATIVE THREAT MANAGEMENT SOLUTIONS 
Deployed Nationwide for Threat & 
Risk Management 
Trusted by Top Defense, Intel 
& Federal Civilian Agencies 
We are used by 15 of the 20 largest urban areas to keep 
their citizens & assets safe 
We are the de-facto standard for risk management for 
major national events requiring multi-agency 
collaboration 
We developed the protective intelligence methodology 
used by the Bill & Melinda Gates Foundation
12 
Haystax Enterprise Threat Management in Action 
>25 mile 
radius monitored 
312 events 
monitored 
LAST FIVE SUPER BOWLS 
50+ agencies 
collaborated 
600 real-time 
data feeds 
238 assets 
protected 
345 incidents 
managed 
In the command center Forward deployed Mobile Apps
13 
Haystax Enterprise Threat Management in Action 
California Emergency Operations Center 
Haystax provides the analytic back-bone 
for total situational awareness 
100% cloud based 
Integrates hundreds of real time 
information sources across the state 
Information is prioritized and routed 
automatically to personnel on the 
ground as needed 
CalCOP connects ALL front-line public 
safety functions though one unified system
14 
Haystax Enterprise Threat Management in Action 
Houston Fire 
Critical information is available in under a 
minute v. over an hour 
Uses Haystax as the platform for managing risk 
based data on physical structures and 
improving first responder actions 
100% cloud based 
Mobile apps for data collection and field 
reporting 
Leverages Haystax’s ability to secure critical 
private sector data and secure sharing of 
information between private and public sectors
15 
Haystax Enterprise Threat Management in Action 
Indianapolis Public Safety 
Comprehensive approach risk domain 
awareness and tactical situational 
awareness 
Uses Haystax as the platform to gain real time 
situational awareness for school safety, major 
events and to co-ordinate incident responses 
Mobile apps for data collection and field 
reporting among tactical EOD and SWAT teams 
Manages all special events and major crises 
using situational awareness displays in 
command centers and on iPads
Haystax Enterprise Threat Management in Action 
Bill & Melinda Gates Foundation 
Uses Haystax as the platform for gaining better threat 
awareness and control over their overall security 
domain. 
Provided a smarter way for identifying and prioritizing 
threats to principals 
16 
Unified database for tracking people and groups of 
interest. 
Haystax analytics seamlessly integrates with 
existing systems while being non-intrusive 
and frictionless 
Platform services multiple functionally connected 
security applications
17 
Haystax Enterprise Threat Management in Action 
Incident Reporting & 
Event Tracking 
Contextual Monitoring of 
Threats & Risks 
School Safety 
School Safety Master 
Data Management 
.
18 
DEMO
19 
Thank You 
Haystax Technology 
8251 Greensboro Drive 
Suite 1111 
McLean, VA 22102 
(202) 492-5457 
info@haystax.com 
www.haystax.com

More Related Content

What's hot

Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Fujitsu Middle East
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityEMC
 
MT29 Panel: Becoming a data-driven enterprise
MT29 Panel: Becoming a data-driven enterpriseMT29 Panel: Becoming a data-driven enterprise
MT29 Panel: Becoming a data-driven enterpriseDell EMC World
 
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax Technology
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...Scalar Decisions
 
011918 incident analytics_service_fact_sheet_rs
011918 incident analytics_service_fact_sheet_rs011918 incident analytics_service_fact_sheet_rs
011918 incident analytics_service_fact_sheet_rsRichard Smiraldi
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsInterset
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Tracey Ong
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionCylance
 
EXIGIS RiskWorksPS Solution Overview
EXIGIS RiskWorksPS Solution OverviewEXIGIS RiskWorksPS Solution Overview
EXIGIS RiskWorksPS Solution OverviewExigis
 
Security Metrics Resources File
Security Metrics Resources FileSecurity Metrics Resources File
Security Metrics Resources Fileguest0947de
 
AvailabilityGuard-Enterprise-2016
AvailabilityGuard-Enterprise-2016AvailabilityGuard-Enterprise-2016
AvailabilityGuard-Enterprise-2016Mark Stensen
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 

What's hot (20)

Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
 
MT29 Panel: Becoming a data-driven enterprise
MT29 Panel: Becoming a data-driven enterpriseMT29 Panel: Becoming a data-driven enterprise
MT29 Panel: Becoming a data-driven enterprise
 
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous Evaluation
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
 
Cylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment DatasheetCylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment Datasheet
 
Data Breach Risk Intelligence for Higher Education
Data Breach Risk Intelligence for Higher EducationData Breach Risk Intelligence for Higher Education
Data Breach Risk Intelligence for Higher Education
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
011918 incident analytics_service_fact_sheet_rs
011918 incident analytics_service_fact_sheet_rs011918 incident analytics_service_fact_sheet_rs
011918 incident analytics_service_fact_sheet_rs
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
 
08 july 2016
08 july 201608 july 2016
08 july 2016
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
 
Threat Life Cycle Management
Threat Life Cycle ManagementThreat Life Cycle Management
Threat Life Cycle Management
 
EXIGIS RiskWorksPS Solution Overview
EXIGIS RiskWorksPS Solution OverviewEXIGIS RiskWorksPS Solution Overview
EXIGIS RiskWorksPS Solution Overview
 
Security Metrics Resources File
Security Metrics Resources FileSecurity Metrics Resources File
Security Metrics Resources File
 
AvailabilityGuard-Enterprise-2016
AvailabilityGuard-Enterprise-2016AvailabilityGuard-Enterprise-2016
AvailabilityGuard-Enterprise-2016
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 

Viewers also liked

Діагностування електродвигунів
Діагностування електродвигунівДіагностування електродвигунів
Діагностування електродвигунівSvetlana Savostina
 
Sponda Results presentation Q4 2015
Sponda Results presentation Q4 2015Sponda Results presentation Q4 2015
Sponda Results presentation Q4 2015SpondaPlc
 
Sponda yleisesitys 31032014
Sponda yleisesitys 31032014Sponda yleisesitys 31032014
Sponda yleisesitys 31032014SpondaPlc
 
Mega Holdings prasentation
Mega Holdings prasentationMega Holdings prasentation
Mega Holdings prasentationenverayyildiz
 
Importance of pdhpe
Importance of pdhpeImportance of pdhpe
Importance of pdhpelolfeg
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax Technology
 
Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Haystax Technology
 
Results presentation q3 2016
Results presentation q3 2016Results presentation q3 2016
Results presentation q3 2016SpondaPlc
 
Haystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology
 
BIM Show Live 2015: 110 Queen Street – A BIM exemplar
BIM Show Live 2015: 110 Queen Street – A BIM exemplarBIM Show Live 2015: 110 Queen Street – A BIM exemplar
BIM Show Live 2015: 110 Queen Street – A BIM exemplarBuiltEnvironmentUBM
 
Importance pdhpe
Importance pdhpeImportance pdhpe
Importance pdhpelolfeg
 
Results presentation q2 2015
Results presentation q2 2015Results presentation q2 2015
Results presentation q2 2015SpondaPlc
 
Freedom Metals interview questions and answers
Freedom Metals interview questions and answersFreedom Metals interview questions and answers
Freedom Metals interview questions and answerstaylorlorr
 
Horror make up
Horror make upHorror make up
Horror make upkiller987
 
Processing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentProcessing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentHaystax Technology
 

Viewers also liked (20)

Діагностування електродвигунів
Діагностування електродвигунівДіагностування електродвигунів
Діагностування електродвигунів
 
Sponda Results presentation Q4 2015
Sponda Results presentation Q4 2015Sponda Results presentation Q4 2015
Sponda Results presentation Q4 2015
 
Sponda yleisesitys 31032014
Sponda yleisesitys 31032014Sponda yleisesitys 31032014
Sponda yleisesitys 31032014
 
Evolución de la web mapa
Evolución de la web mapaEvolución de la web mapa
Evolución de la web mapa
 
Mega Holdings prasentation
Mega Holdings prasentationMega Holdings prasentation
Mega Holdings prasentation
 
Question 4
Question 4Question 4
Question 4
 
Importance of pdhpe
Importance of pdhpeImportance of pdhpe
Importance of pdhpe
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network Services
 
Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...
 
Major events
Major eventsMajor events
Major events
 
Results presentation q3 2016
Results presentation q3 2016Results presentation q3 2016
Results presentation q3 2016
 
Haystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology Machine learning white paper
Haystax Technology Machine learning white paper
 
BIM Show Live 2015: 110 Queen Street – A BIM exemplar
BIM Show Live 2015: 110 Queen Street – A BIM exemplarBIM Show Live 2015: 110 Queen Street – A BIM exemplar
BIM Show Live 2015: 110 Queen Street – A BIM exemplar
 
Importance pdhpe
Importance pdhpeImportance pdhpe
Importance pdhpe
 
Results presentation q2 2015
Results presentation q2 2015Results presentation q2 2015
Results presentation q2 2015
 
Freedom Metals interview questions and answers
Freedom Metals interview questions and answersFreedom Metals interview questions and answers
Freedom Metals interview questions and answers
 
Shooting
Shooting Shooting
Shooting
 
Horror make up
Horror make upHorror make up
Horror make up
 
Processing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentProcessing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk Assessment
 
Comparatives and Superlatives
Comparatives and SuperlativesComparatives and Superlatives
Comparatives and Superlatives
 

Similar to Enterprise Threat Management

Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax TechnologyHaystax Technology
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentVidSys, Inc.
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewStephen Bates
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys, Inc.
 
Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidSys, Inc.
 
Physical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterprisePhysical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterpriseVidSys, Inc.
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big UnknownAdrian Dumitrescu
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
Thomson Reuters Enterprise Risk Management
Thomson Reuters Enterprise Risk Management Thomson Reuters Enterprise Risk Management
Thomson Reuters Enterprise Risk Management Uwe Berger
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wpCMR WORLD TECH
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive SecurityComputerworld Philippines
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaSyed Peer
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutionsharman041
 
Veritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-ENVeritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-ENRichard Williams
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Ageglobal
 

Similar to Enterprise Threat Management (20)

Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax Technology
 
Critical assets protection
Critical assets protectionCritical assets protection
Critical assets protection
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the Government
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution Sheet
 
Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solution
 
Physical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the EnterprisePhysical Security Information Management Solution for the Enterprise
Physical Security Information Management Solution for the Enterprise
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
Thomson Reuters Enterprise Risk Management
Thomson Reuters Enterprise Risk Management Thomson Reuters Enterprise Risk Management
Thomson Reuters Enterprise Risk Management
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
Veritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-ENVeritas-Information-Governance-Solution-Brochure-EN
Veritas-Information-Governance-Solution-Brochure-EN
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 
AtHocProductBrochure_V2
AtHocProductBrochure_V2AtHocProductBrochure_V2
AtHocProductBrochure_V2
 

More from Haystax Technology

More from Haystax Technology (6)

The constellation analytics platform
The constellation analytics platformThe constellation analytics platform
The constellation analytics platform
 
Haystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat Management
 
School Safety Center
School Safety CenterSchool Safety Center
School Safety Center
 
Public safety cloud overview
Public safety cloud overviewPublic safety cloud overview
Public safety cloud overview
 
Pre incident fire
Pre incident firePre incident fire
Pre incident fire
 
Haystax bayesian networks
Haystax bayesian networksHaystax bayesian networks
Haystax bayesian networks
 

Recently uploaded

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 

Recently uploaded (20)

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 

Enterprise Threat Management

  • 1. Enterprise Threat Management Haystax Technology | Washington DC
  • 2. 1 Topics INTRODUCTION HAYSTAX ENTERPRISE THREAT MANAGEMENT CUSTOMERS DEMO WRAP-UP
  • 3. 2 Company Facts CYBERSECURITY AND ENTERPRISE THREAT MANAGEMENT SOLUTIONS FORMED in 2012 on a 20 year legacy (Digital Sandbox, FlexPoint, NetCentrics) EMPLOYEES: 350, 90% Cleared COMPETENCIES: Cybersecurity, Information Assurance, Network Management, Advanced Threat Analytics, Innovation Management
  • 4. 3 Solutions that Enable Decision Makers TO MAKE HIGH CONSEQUENCE DECISIONS WITH CONFIDENCE Protect computer networks Protect critical infrastructure & key resources Protect against loss from fraud Protect people from natural hazards & human threats Protect an enterprises ability to compete effectively Manage responses to threats
  • 5. 4 Haystax Enterprise Threat Management ENABLING RISK INFORMED DECISION MAKING Profile overall enterprise threat and risk Monitor continuously and broadly against that profile Prioritize and route critical information for Implement collaborative, dynamic situational awareness action
  • 6. 5 The Constellation Analytics PlatformTM OPTIMIZES MACHINE AND HUMAN PROCESSING OF DATA Physical Enterprise Calls for HR Data Service News & Social Communications Enterprise Data Assets/CIKR Archive DB Web Low Priority Channels Domain Ontology NLP Entity Resolution Geo Reasoning Association Analysis Scoring Data Collection & Pre-Processing Analytic Processing Mobile 3rd Party Triage Timeline Map Alerts Visual Interaction Canvases Reports Feeds Network Alerts Know & Act Patent # 8874071
  • 7. 6 Decision Makers are Increasingly Mobile ACTIONABLE INTELLIGENCE BEYOND OFFICE WALLS Powerful native apps with easy self configuration and usability Reporting, Assessments & Monitoring seamlessly integrated Secure online/offline data access from anywhere
  • 8. 7 Informed Decision Making Needs Context CONTEXT ENABLES DECISION MAKER TO UNDERSTAND ALL THE DATA Into one screen Swivel-chair situational awareness Contextual situational does not scale awareness anywhere …and one app Haystax Analytics & visualization can put all the information that goes here
  • 9. 8 Context Helps First Responders BY SEAMLESSLY TYING INFORMATION TO THEIR OPERATIONAL PROCESS Unified system of records that can be accessed from anywhere, anytime Fuse data streams from existing systems into “channels” of prioritized operational information Secure cross organization information sharing & collaboration
  • 10. 9 Context Helps Mission Commanders BY PROVIDING CONTEXTUAL SITUATIONAL AWARENESS WHEREVER THEY ARE User interface designed to focus user to hot spots and key alerts Holistic presentation framework that optimizes based on device, role, location, time, context Information is prioritized based on relevance to the user
  • 11. 10 Context Helps Intelligence Analysts BY MAKING IT EASY TO INTERACT WITH REAL TIME DATA IN REAL TIME Monitor categorized & prioritized data feeds from multiple sources Make predictions based on trends and intensity of data Use dynamically generated profiles of to discover links & associations
  • 12. 11 Trusted by a Wide Range of Organizations TO PROVIDE INNOVATIVE THREAT MANAGEMENT SOLUTIONS Deployed Nationwide for Threat & Risk Management Trusted by Top Defense, Intel & Federal Civilian Agencies We are used by 15 of the 20 largest urban areas to keep their citizens & assets safe We are the de-facto standard for risk management for major national events requiring multi-agency collaboration We developed the protective intelligence methodology used by the Bill & Melinda Gates Foundation
  • 13. 12 Haystax Enterprise Threat Management in Action >25 mile radius monitored 312 events monitored LAST FIVE SUPER BOWLS 50+ agencies collaborated 600 real-time data feeds 238 assets protected 345 incidents managed In the command center Forward deployed Mobile Apps
  • 14. 13 Haystax Enterprise Threat Management in Action California Emergency Operations Center Haystax provides the analytic back-bone for total situational awareness 100% cloud based Integrates hundreds of real time information sources across the state Information is prioritized and routed automatically to personnel on the ground as needed CalCOP connects ALL front-line public safety functions though one unified system
  • 15. 14 Haystax Enterprise Threat Management in Action Houston Fire Critical information is available in under a minute v. over an hour Uses Haystax as the platform for managing risk based data on physical structures and improving first responder actions 100% cloud based Mobile apps for data collection and field reporting Leverages Haystax’s ability to secure critical private sector data and secure sharing of information between private and public sectors
  • 16. 15 Haystax Enterprise Threat Management in Action Indianapolis Public Safety Comprehensive approach risk domain awareness and tactical situational awareness Uses Haystax as the platform to gain real time situational awareness for school safety, major events and to co-ordinate incident responses Mobile apps for data collection and field reporting among tactical EOD and SWAT teams Manages all special events and major crises using situational awareness displays in command centers and on iPads
  • 17. Haystax Enterprise Threat Management in Action Bill & Melinda Gates Foundation Uses Haystax as the platform for gaining better threat awareness and control over their overall security domain. Provided a smarter way for identifying and prioritizing threats to principals 16 Unified database for tracking people and groups of interest. Haystax analytics seamlessly integrates with existing systems while being non-intrusive and frictionless Platform services multiple functionally connected security applications
  • 18. 17 Haystax Enterprise Threat Management in Action Incident Reporting & Event Tracking Contextual Monitoring of Threats & Risks School Safety School Safety Master Data Management .
  • 20. 19 Thank You Haystax Technology 8251 Greensboro Drive Suite 1111 McLean, VA 22102 (202) 492-5457 info@haystax.com www.haystax.com

Editor's Notes

  1. Summary…we are going to challenge the status quo….we are in the process of building a strong company and brand.
  2. At Haystax, we have been thinking about this for a long time – in fact before big data was big….in fact, we started when there was no data at all for some of our analytic challenges. When there is no data, basically you’re dealing with ALL data. The ‘true big data problem’! We had to invent a way to deal with data at that scale. That led to our RIN algorithm that now powers our platform. Our unique IP starts from the way we formulate the problem, to how we then go about mapping the data to the problem and all the way to gaining access to the data and doing it in way that is very fast for the customer. An analytic solution is only useful when it can be delivered in a timely manner. So, what is the result of this IP? The Constellation Platform…
  3. Flexpoint is our branded offering for secure cloud collaboration apps. So what is powered by flexpoint today? See the ipad the POTUS is using? It’s a FlexPoint app Microsoft came to us to help them build a reference Azure application for the the IC. It’s called Azure Canopy and we are co-branding it with Microsoft. What else have we done…with AWS we did…. We are now considered an industry reference in the IC.
  4. Cloud improves provisioning of secure apps.
  5. SharePoint, Link…
  6. DTaaS should be about improving the user experience. We have worked with MSFT on creating a reference desktop based on familiar collaboration and productivity tools.
  7. It’s not just about analysts, it also about pushing intelligence out to the field in mission critical situations.
  8. It’s not just about analysts, it also about pushing intelligence out to the field in mission critical situations.
  9. It’s not just about analysts, it also about pushing intelligence out to the field in mission critical situations.
  10. It’s not just about analysts, it also about pushing intelligence out to the field in mission critical situations.
  11. Summary…we are going to challenge the status quo….we are in the process of building a strong company and brand.
  12. Summary…we are going to challenge the status quo….we are in the process of building a strong company and brand.