COMPANY PROPRIETARY INFORMATION
Next-Generation Cyber and
Enterprise Threat Intelligence
Solutions
Introduction to Haystax Technology
COMPANY PROPRIETARY INFORMATION 1
We offer mission critical cybersecurity and
enterprise threat management solutions
that provide real-time actionable intelligence
for complex, high consequence decisions
Our mission
COMPANY PROPRIETARY INFORMATION 2
Our Leadership Team
CREATED in 2012 on a 20 year
legacy (Digital Sandbox, FlexPoint, NetCentrics)
CUSTOMERS: Defense, Federal
Civilian, State & Local, Intelligence
Community, Commercial
EMPLOYEES: 350, 90% Secret
clearance, 60% Top Secret
COMPETENCIES: Cybersecurity,
Information Assurance, Network
Management, Advanced Threat
Analytics, Innovation Management
CERTIFICATIONS: ISO 9001, ISO
20000, CMMI Services Level 3,
Microsoft & AWS Gold Partner
BILL VAN VLEET
Chief Executive Officer
BOB DOUGHERTY
President, NetCentrics
MARIANNE MEINS
SVP. Strategic
Initiatives
JIM DOYLE
Chief Financial Officer
TOM SAFIR
VP, Corporate
Development
BRYAN WARE
President, Analytics
DEAN HERRING
Chief Innovation
Officer
JAFFREY ALI
VP, Product Strategy &
Marketing
About us
COMPANY PROPRIETARY INFORMATION 3
Protecting critical infrastructure & key resources
Protecting computer networks
Protecting against loss from fraud
Risk planning & allocation of resources
Managing responses during crisis situations
Actionable intelligence solutions include…
Protecting people from natural hazards & human
threats (external and insiders)
COMPANY PROPRIETARY INFORMATION 4
We are the de-facto standard for risk
management for major national events
requiring multi-agency collaboration
We developed the protective intelligence
methodology used by the Bill & Melinda Gates
Foundation
Used by 15 of the 20 largest urban
areas to keep their citizens & assets
safe
Architected, manage & protect some of
the most mission critical networks in
the US
We manage the largest enterprise-wide
architecture & worldwide deployments of
SCCM & SCOM
We deployed the first private cloud with AWS
for US Intelligence Community
Trusted by customers nationwide
COMPANY PROPRIETARY INFORMATION 5
Network Management
Network Engineering
Data Center Operations
Enterprise Architecture
Service Desk & VIP Support
Washington Headquarters Services
(The Pentagon):
Manage & secure data center
comprised of over 2000 Servers with
over 18,000 users accessing highly
classified information.
Brought the Pentagon back online post
September 11 attack in less than 24
hours
Secure Enterprise Networks
ENGINEERING AND END-TO-END SUPPORT OF MISSION CRITICAL SYSTEMS
COMPANY PROPRIETARY INFORMATION 6
Information
assurance
Certification &
accreditation
Computer
network defense
Vulnerability management
& scanning
Risk analysis &
mitigation
Intrusion detection
US Coast Guard: Manage certification &
accreditation of networked devices for
44K+ members.
US Army (Information Technology
Agency): Manage, monitor &
defend networks for personnel
worldwide
Cybersecurity
INTEGRATED COMPLIANCE AND RISK BASED CYBER THREAT MANAGEMENT
COMPANY PROPRIETARY INFORMATION 7
Broader visibility | Reduced Response times| Prioritized resource allocation
Profile overall
enterprise threat and
risk
Monitor continuously
and broadly against
that profile
Implement collaborative,
dynamic situational
awareness
Prioritize and route
critical information for
action
Public Safety & Enterprise Threat Management
ENABLING RISK INFORMED DECISION MAKING
COMPANY PROPRIETARY INFORMATION 8
Contextual situational
awareness anywhere
Swivel-chair situational
awareness does not scale
…and one app
Into one screen
Haystax analytics &
visualization puts all the
information that goes here
Informed Decision Making Needs Context
CONTEXT ENABLES DECISION MAKER TO UNDERSTAND ALL THE DATA
COMPANY PROPRIETARY INFORMATION 9
Suspicious Activity
Reports
Physical
Assets/CIKR
HR Data
Calls for
Service
Network Alerts
Enterprise
Communications
Enterprise Data
News & Social
Feeds
Ingest
Natural
Language
Processing
Geo
Location
StoreREST API
Alerts
Web Apps
Mobile
Bayesian Threat Model
Objectivity
Credibility
Impersonal
Specificity
Threat Score
Prioritization
Algorithm
Data
Visualizations drive
understanding
Actionable Information is
pushed to the edge
Massive scaling in Real Time
Algorithms
contextualize and
Prioritize
Contextual Analytic Framework for Understanding
OPTIMIZES MACHINE AND HUMAN PROCESSING OF DATA
COMPANY PROPRIETARY INFORMATION 10
Powerful native apps with easy self
configuration and usability
Reporting, Assessments & Monitoring
seamlessly integrated
Secure online/offline data access from
anywhere
Decision Makers are Increasingly Mobile
REQUIRING ACTIONABLE INTELLIGENCE BEYOND OFFICE WALLS
COMPANY PROPRIETARY INFORMATION 11
Monitor categorized & prioritized data
feeds from multiple sources
Make predictions based on trends and
intensity of data
Use dynamically generated profiles of to
discover links & associations
Actionable Intelligence for Analysts
MAKING IT EASY TO INTERACT WITH REAL-TIME DATA IN REAL-TIME
COMPANY PROPRIETARY INFORMATION 12
Holistic presentation framework that
optimizes based on device, role,
location, time, context
Information is prioritized based on
relevance to the user
User interface designed to focus user
to hot spots and key alerts
Actionable Intelligence for Commanders
BY PROVIDING CONTEXTUAL SITUATIONAL AWARENESS WHEREVER THEY ARE
COMPANY PROPRIETARY INFORMATION 13
Application performance optimized for
mission critical deployments
Secure cross organization information
sharing & collaboration
Unified system of records that can be
accessed from anywhere, anytime
Actionable Intelligence For First Responders
BY SEAMLESSLY TYING INFORMATION TO THEIR OPERATIONAL PROCESS
COMPANY PROPRIETARY INFORMATION 14
In the command center Forward deployed Mobile Apps
>25 mile
radius monitored
312 events
monitored
737 total
users
600 real-time
data feeds
238 assets
protected
345 incidents
managed
RESULTS FROM SUPER BOWL XLVIII
Contextual Situational Awareness in Action
INTEGRATING OVER 40 AGENCIES AT THE LAST FIVE SUPER BOWLS
COMPANY PROPRIETARY INFORMATION 15
8 regions analyzing and
monitoring with shared best
practices
20122010
Analysis of risk to a single
jurisdiction by a single
agency
California uses the Haystax Public Safety Cloud to connect its
8 MAJOR URBAN AREAS
into a collaborative information sharing network
2011
Regional analysis and
monitoring of threats
across agencies in a
jurisdiction
2014
Statewide collaborative analysis
and situational awareness
COMPANY PROPRIETARY INFORMATION 16
Contextual Situational Awareness in Action
CALIFORNIA EMERGENCY OPERATIONS CENTER
Haystax provides the analytic
back-bone for total situational
awareness
100% cloud based
Integrates hundreds of real time
information sources across the
state
Information is prioritized and
routed automatically to
personnel on the ground as
needed
Contextual situational awareness on one screen
COMPANY PROPRIETARY INFORMATION 17
School Safety Master
Data Management
.
Incident Reporting &
Event Tracking
Contextual Monitoring of
Threats & Risks
Launching a Nationwide School Safety Cloud
POWERED BY THE SAME ANALYTIC PLATFORM
COMPANY PROPRIETARY INFORMATION 18
Bayesian model designed to solve high
noise-to-signal data problems
Automatically aligns alert quality to
available investigation resources
Eliminates scaling problems of
traditional rules based systems
Insider Threat Analytics for Enterprise Security
BRUTE FORCE SOLUTIONS WILL NOT WORK – NEEDS A COMPREHENSIVE SYSTEM MODEL
COMPANY PROPRIETARY INFORMATION 19
Counterintelligence
Medical
Criminal Investigators
HUMINT
Family
Peers
Psych
Subject
Command
ITSecurity
Backgroun
d Check
Peers &
Family
$
Financial
Records Public
Records
HR
Record
Web and Social
Media
+ =
Experts Data
Continuously
prioritized risk based
ranking
CARBONTM
Automated Threat Awareness
MATHEMATICAL MODELING OF EXPERTS + RISK RANKING + CONTINOUS EVALUATION
COMPANY PROPRIETARY INFORMATION 20
Automated continuous evaluation
and re-prioritization enables
sustained success
Can be deployed on top of 3rd
party alerting products
CARBONTM
Threat Optimization Solution
IT DOES NOT REMOVE ALERTS, JUST TELLS YOU WHICH ARE IMPORTANT AND WHY
COMPANY PROPRIETARY INFORMATION 21
Compare subject to
peer groups and
historic changes in
risk profile
Up to 10x improvements in
investigation productivity
Separates the critical from the
mass and lets the analyst know
Full traceability from results to the
source data
The CARBONTM
Value Proposition
STOP LOOKING AT ALERTS, START ACTING ON THEM BY KNOWING YOUR RISK
COMPANY PROPRIETARY INFORMATION 22
Why Haystax Analytics Matter
BRUTE FORCE SECURING AND ALERTING WON’T WORK
No industry is immune, no level of
technical sophistication is sufficient
Real-time visibility & control over the
entire at risk environment is critical
for CSO’s and CIO’s today
All security breaches involve people
and people are smarter than rules
COMPANY PROPRIETARY INFORMATION 23
Cloud enable Microsoft to any
cloud
90 days, fixed cost none-to-done
guarantee
Microsoft Gold Certified Partner
Selected by Microsoft to build their
reference Azure package for the
US Intel Community
Enabling Enterprise Clouds Without the Drama
HAYSTAX CANOPY CLOUD ACCELERATORS ARE THE FASTEST WAY TO A SECURE
CLOUD
COMPANY PROPRIETARY INFORMATION 24
Proven “Innovate on Purpose”
methodology
Innovation change management
consulting
Rapid disruptive innovation workshops
OVO Innovation
EXPERT INNOVATION CONSULTING SERVICES TO GOVERNMENT AND INDUSTRY
COMPANY PROPRIETARY INFORMATION 25
Haystax Technology Accelerator
DRIVEN TO INNOVATE AND BRING DISTRUPTIVE PRODUCTS TO MARKET
Developing advanced concepts and next
generation solutions to initial pilot
Incubating emerging technologies and
entrepreneurial third-party partnerships
Advancing the state-of-the-art through
agile, out-of-the-box thinking
COMPANY PROPRIETARY INFORMATION 26
COMPANY PROPRIETARY INFORMATION
Thank You
COMPANY PROPRIETARY INFORMATION
info@haystax.com
www.haystax.com
For Additional
Information Contact:
@HaystaxTech
(571) 297-3800

Overview of Haystax Technology

  • 1.
    COMPANY PROPRIETARY INFORMATION Next-GenerationCyber and Enterprise Threat Intelligence Solutions Introduction to Haystax Technology
  • 2.
    COMPANY PROPRIETARY INFORMATION1 We offer mission critical cybersecurity and enterprise threat management solutions that provide real-time actionable intelligence for complex, high consequence decisions Our mission
  • 3.
    COMPANY PROPRIETARY INFORMATION2 Our Leadership Team CREATED in 2012 on a 20 year legacy (Digital Sandbox, FlexPoint, NetCentrics) CUSTOMERS: Defense, Federal Civilian, State & Local, Intelligence Community, Commercial EMPLOYEES: 350, 90% Secret clearance, 60% Top Secret COMPETENCIES: Cybersecurity, Information Assurance, Network Management, Advanced Threat Analytics, Innovation Management CERTIFICATIONS: ISO 9001, ISO 20000, CMMI Services Level 3, Microsoft & AWS Gold Partner BILL VAN VLEET Chief Executive Officer BOB DOUGHERTY President, NetCentrics MARIANNE MEINS SVP. Strategic Initiatives JIM DOYLE Chief Financial Officer TOM SAFIR VP, Corporate Development BRYAN WARE President, Analytics DEAN HERRING Chief Innovation Officer JAFFREY ALI VP, Product Strategy & Marketing About us
  • 4.
    COMPANY PROPRIETARY INFORMATION3 Protecting critical infrastructure & key resources Protecting computer networks Protecting against loss from fraud Risk planning & allocation of resources Managing responses during crisis situations Actionable intelligence solutions include… Protecting people from natural hazards & human threats (external and insiders)
  • 5.
    COMPANY PROPRIETARY INFORMATION4 We are the de-facto standard for risk management for major national events requiring multi-agency collaboration We developed the protective intelligence methodology used by the Bill & Melinda Gates Foundation Used by 15 of the 20 largest urban areas to keep their citizens & assets safe Architected, manage & protect some of the most mission critical networks in the US We manage the largest enterprise-wide architecture & worldwide deployments of SCCM & SCOM We deployed the first private cloud with AWS for US Intelligence Community Trusted by customers nationwide
  • 6.
    COMPANY PROPRIETARY INFORMATION5 Network Management Network Engineering Data Center Operations Enterprise Architecture Service Desk & VIP Support Washington Headquarters Services (The Pentagon): Manage & secure data center comprised of over 2000 Servers with over 18,000 users accessing highly classified information. Brought the Pentagon back online post September 11 attack in less than 24 hours Secure Enterprise Networks ENGINEERING AND END-TO-END SUPPORT OF MISSION CRITICAL SYSTEMS
  • 7.
    COMPANY PROPRIETARY INFORMATION6 Information assurance Certification & accreditation Computer network defense Vulnerability management & scanning Risk analysis & mitigation Intrusion detection US Coast Guard: Manage certification & accreditation of networked devices for 44K+ members. US Army (Information Technology Agency): Manage, monitor & defend networks for personnel worldwide Cybersecurity INTEGRATED COMPLIANCE AND RISK BASED CYBER THREAT MANAGEMENT
  • 8.
    COMPANY PROPRIETARY INFORMATION7 Broader visibility | Reduced Response times| Prioritized resource allocation Profile overall enterprise threat and risk Monitor continuously and broadly against that profile Implement collaborative, dynamic situational awareness Prioritize and route critical information for action Public Safety & Enterprise Threat Management ENABLING RISK INFORMED DECISION MAKING
  • 9.
    COMPANY PROPRIETARY INFORMATION8 Contextual situational awareness anywhere Swivel-chair situational awareness does not scale …and one app Into one screen Haystax analytics & visualization puts all the information that goes here Informed Decision Making Needs Context CONTEXT ENABLES DECISION MAKER TO UNDERSTAND ALL THE DATA
  • 10.
    COMPANY PROPRIETARY INFORMATION9 Suspicious Activity Reports Physical Assets/CIKR HR Data Calls for Service Network Alerts Enterprise Communications Enterprise Data News & Social Feeds Ingest Natural Language Processing Geo Location StoreREST API Alerts Web Apps Mobile Bayesian Threat Model Objectivity Credibility Impersonal Specificity Threat Score Prioritization Algorithm Data Visualizations drive understanding Actionable Information is pushed to the edge Massive scaling in Real Time Algorithms contextualize and Prioritize Contextual Analytic Framework for Understanding OPTIMIZES MACHINE AND HUMAN PROCESSING OF DATA
  • 11.
    COMPANY PROPRIETARY INFORMATION10 Powerful native apps with easy self configuration and usability Reporting, Assessments & Monitoring seamlessly integrated Secure online/offline data access from anywhere Decision Makers are Increasingly Mobile REQUIRING ACTIONABLE INTELLIGENCE BEYOND OFFICE WALLS
  • 12.
    COMPANY PROPRIETARY INFORMATION11 Monitor categorized & prioritized data feeds from multiple sources Make predictions based on trends and intensity of data Use dynamically generated profiles of to discover links & associations Actionable Intelligence for Analysts MAKING IT EASY TO INTERACT WITH REAL-TIME DATA IN REAL-TIME
  • 13.
    COMPANY PROPRIETARY INFORMATION12 Holistic presentation framework that optimizes based on device, role, location, time, context Information is prioritized based on relevance to the user User interface designed to focus user to hot spots and key alerts Actionable Intelligence for Commanders BY PROVIDING CONTEXTUAL SITUATIONAL AWARENESS WHEREVER THEY ARE
  • 14.
    COMPANY PROPRIETARY INFORMATION13 Application performance optimized for mission critical deployments Secure cross organization information sharing & collaboration Unified system of records that can be accessed from anywhere, anytime Actionable Intelligence For First Responders BY SEAMLESSLY TYING INFORMATION TO THEIR OPERATIONAL PROCESS
  • 15.
    COMPANY PROPRIETARY INFORMATION14 In the command center Forward deployed Mobile Apps >25 mile radius monitored 312 events monitored 737 total users 600 real-time data feeds 238 assets protected 345 incidents managed RESULTS FROM SUPER BOWL XLVIII Contextual Situational Awareness in Action INTEGRATING OVER 40 AGENCIES AT THE LAST FIVE SUPER BOWLS
  • 16.
    COMPANY PROPRIETARY INFORMATION15 8 regions analyzing and monitoring with shared best practices 20122010 Analysis of risk to a single jurisdiction by a single agency California uses the Haystax Public Safety Cloud to connect its 8 MAJOR URBAN AREAS into a collaborative information sharing network 2011 Regional analysis and monitoring of threats across agencies in a jurisdiction 2014 Statewide collaborative analysis and situational awareness
  • 17.
    COMPANY PROPRIETARY INFORMATION16 Contextual Situational Awareness in Action CALIFORNIA EMERGENCY OPERATIONS CENTER Haystax provides the analytic back-bone for total situational awareness 100% cloud based Integrates hundreds of real time information sources across the state Information is prioritized and routed automatically to personnel on the ground as needed Contextual situational awareness on one screen
  • 18.
    COMPANY PROPRIETARY INFORMATION17 School Safety Master Data Management . Incident Reporting & Event Tracking Contextual Monitoring of Threats & Risks Launching a Nationwide School Safety Cloud POWERED BY THE SAME ANALYTIC PLATFORM
  • 19.
    COMPANY PROPRIETARY INFORMATION18 Bayesian model designed to solve high noise-to-signal data problems Automatically aligns alert quality to available investigation resources Eliminates scaling problems of traditional rules based systems Insider Threat Analytics for Enterprise Security BRUTE FORCE SOLUTIONS WILL NOT WORK – NEEDS A COMPREHENSIVE SYSTEM MODEL
  • 20.
    COMPANY PROPRIETARY INFORMATION19 Counterintelligence Medical Criminal Investigators HUMINT Family Peers Psych Subject Command ITSecurity Backgroun d Check Peers & Family $ Financial Records Public Records HR Record Web and Social Media + = Experts Data Continuously prioritized risk based ranking CARBONTM Automated Threat Awareness MATHEMATICAL MODELING OF EXPERTS + RISK RANKING + CONTINOUS EVALUATION
  • 21.
    COMPANY PROPRIETARY INFORMATION20 Automated continuous evaluation and re-prioritization enables sustained success Can be deployed on top of 3rd party alerting products CARBONTM Threat Optimization Solution IT DOES NOT REMOVE ALERTS, JUST TELLS YOU WHICH ARE IMPORTANT AND WHY
  • 22.
    COMPANY PROPRIETARY INFORMATION21 Compare subject to peer groups and historic changes in risk profile Up to 10x improvements in investigation productivity Separates the critical from the mass and lets the analyst know Full traceability from results to the source data The CARBONTM Value Proposition STOP LOOKING AT ALERTS, START ACTING ON THEM BY KNOWING YOUR RISK
  • 23.
    COMPANY PROPRIETARY INFORMATION22 Why Haystax Analytics Matter BRUTE FORCE SECURING AND ALERTING WON’T WORK No industry is immune, no level of technical sophistication is sufficient Real-time visibility & control over the entire at risk environment is critical for CSO’s and CIO’s today All security breaches involve people and people are smarter than rules
  • 24.
    COMPANY PROPRIETARY INFORMATION23 Cloud enable Microsoft to any cloud 90 days, fixed cost none-to-done guarantee Microsoft Gold Certified Partner Selected by Microsoft to build their reference Azure package for the US Intel Community Enabling Enterprise Clouds Without the Drama HAYSTAX CANOPY CLOUD ACCELERATORS ARE THE FASTEST WAY TO A SECURE CLOUD
  • 25.
    COMPANY PROPRIETARY INFORMATION24 Proven “Innovate on Purpose” methodology Innovation change management consulting Rapid disruptive innovation workshops OVO Innovation EXPERT INNOVATION CONSULTING SERVICES TO GOVERNMENT AND INDUSTRY
  • 26.
    COMPANY PROPRIETARY INFORMATION25 Haystax Technology Accelerator DRIVEN TO INNOVATE AND BRING DISTRUPTIVE PRODUCTS TO MARKET Developing advanced concepts and next generation solutions to initial pilot Incubating emerging technologies and entrepreneurial third-party partnerships Advancing the state-of-the-art through agile, out-of-the-box thinking
  • 27.
  • 28.
  • 29.
    COMPANY PROPRIETARY INFORMATION info@haystax.com www.haystax.com ForAdditional Information Contact: @HaystaxTech (571) 297-3800

Editor's Notes

  • #9 Profile threat and risk - Use data and analytics to quantify risks and measure gaps in capabilities Monitor broadly against your risk profile – monitor sensors, online data, social media, and field reporting for indicators & warnings (I&W) of threats Provide dynamic data visualization – Use geospatial, temporal, and triage views to inform stakeholders Prioritize and route critical information - Use real-time analytics to identify priority information and direct it to those who need to see it wherever they are
  • #28 Bill 4