SlideShare a Scribd company logo
COMPANY PROPRIETARY INFORMATION
Next-Generation Cyber and
Enterprise Threat Intelligence
Solutions
Introduction to Haystax Technology
COMPANY PROPRIETARY INFORMATION 1
We offer mission critical cybersecurity and
enterprise threat management solutions
that provide real-time actionable intelligence
for complex, high consequence decisions
Our mission
COMPANY PROPRIETARY INFORMATION 2
Our Leadership Team
CREATED in 2012 on a 20 year
legacy (Digital Sandbox, FlexPoint, NetCentrics)
CUSTOMERS: Defense, Federal
Civilian, State & Local, Intelligence
Community, Commercial
EMPLOYEES: 350, 90% Secret
clearance, 60% Top Secret
COMPETENCIES: Cybersecurity,
Information Assurance, Network
Management, Advanced Threat
Analytics, Innovation Management
CERTIFICATIONS: ISO 9001, ISO
20000, CMMI Services Level 3,
Microsoft & AWS Gold Partner
BILL VAN VLEET
Chief Executive Officer
BOB DOUGHERTY
President, NetCentrics
MARIANNE MEINS
SVP. Strategic
Initiatives
JIM DOYLE
Chief Financial Officer
TOM SAFIR
VP, Corporate
Development
BRYAN WARE
President, Analytics
DEAN HERRING
Chief Innovation
Officer
JAFFREY ALI
VP, Product Strategy &
Marketing
About us
COMPANY PROPRIETARY INFORMATION 3
Protecting critical infrastructure & key resources
Protecting computer networks
Protecting against loss from fraud
Risk planning & allocation of resources
Managing responses during crisis situations
Actionable intelligence solutions include…
Protecting people from natural hazards & human
threats (external and insiders)
COMPANY PROPRIETARY INFORMATION 4
We are the de-facto standard for risk
management for major national events
requiring multi-agency collaboration
We developed the protective intelligence
methodology used by the Bill & Melinda Gates
Foundation
Used by 15 of the 20 largest urban
areas to keep their citizens & assets
safe
Architected, manage & protect some of
the most mission critical networks in
the US
We manage the largest enterprise-wide
architecture & worldwide deployments of
SCCM & SCOM
We deployed the first private cloud with AWS
for US Intelligence Community
Trusted by customers nationwide
COMPANY PROPRIETARY INFORMATION 5
Network Management
Network Engineering
Data Center Operations
Enterprise Architecture
Service Desk & VIP Support
Washington Headquarters Services
(The Pentagon):
Manage & secure data center
comprised of over 2000 Servers with
over 18,000 users accessing highly
classified information.
Brought the Pentagon back online post
September 11 attack in less than 24
hours
Secure Enterprise Networks
ENGINEERING AND END-TO-END SUPPORT OF MISSION CRITICAL SYSTEMS
COMPANY PROPRIETARY INFORMATION 6
Information
assurance
Certification &
accreditation
Computer
network defense
Vulnerability management
& scanning
Risk analysis &
mitigation
Intrusion detection
US Coast Guard: Manage certification &
accreditation of networked devices for
44K+ members.
US Army (Information Technology
Agency): Manage, monitor &
defend networks for personnel
worldwide
Cybersecurity
INTEGRATED COMPLIANCE AND RISK BASED CYBER THREAT MANAGEMENT
COMPANY PROPRIETARY INFORMATION 7
Broader visibility | Reduced Response times| Prioritized resource allocation
Profile overall
enterprise threat and
risk
Monitor continuously
and broadly against
that profile
Implement collaborative,
dynamic situational
awareness
Prioritize and route
critical information for
action
Public Safety & Enterprise Threat Management
ENABLING RISK INFORMED DECISION MAKING
COMPANY PROPRIETARY INFORMATION 8
Contextual situational
awareness anywhere
Swivel-chair situational
awareness does not scale
…and one app
Into one screen
Haystax analytics &
visualization puts all the
information that goes here
Informed Decision Making Needs Context
CONTEXT ENABLES DECISION MAKER TO UNDERSTAND ALL THE DATA
COMPANY PROPRIETARY INFORMATION 9
Suspicious Activity
Reports
Physical
Assets/CIKR
HR Data
Calls for
Service
Network Alerts
Enterprise
Communications
Enterprise Data
News & Social
Feeds
Ingest
Natural
Language
Processing
Geo
Location
StoreREST API
Alerts
Web Apps
Mobile
Bayesian Threat Model
Objectivity
Credibility
Impersonal
Specificity
Threat Score
Prioritization
Algorithm
Data
Visualizations drive
understanding
Actionable Information is
pushed to the edge
Massive scaling in Real Time
Algorithms
contextualize and
Prioritize
Contextual Analytic Framework for Understanding
OPTIMIZES MACHINE AND HUMAN PROCESSING OF DATA
COMPANY PROPRIETARY INFORMATION 10
Powerful native apps with easy self
configuration and usability
Reporting, Assessments & Monitoring
seamlessly integrated
Secure online/offline data access from
anywhere
Decision Makers are Increasingly Mobile
REQUIRING ACTIONABLE INTELLIGENCE BEYOND OFFICE WALLS
COMPANY PROPRIETARY INFORMATION 11
Monitor categorized & prioritized data
feeds from multiple sources
Make predictions based on trends and
intensity of data
Use dynamically generated profiles of to
discover links & associations
Actionable Intelligence for Analysts
MAKING IT EASY TO INTERACT WITH REAL-TIME DATA IN REAL-TIME
COMPANY PROPRIETARY INFORMATION 12
Holistic presentation framework that
optimizes based on device, role,
location, time, context
Information is prioritized based on
relevance to the user
User interface designed to focus user
to hot spots and key alerts
Actionable Intelligence for Commanders
BY PROVIDING CONTEXTUAL SITUATIONAL AWARENESS WHEREVER THEY ARE
COMPANY PROPRIETARY INFORMATION 13
Application performance optimized for
mission critical deployments
Secure cross organization information
sharing & collaboration
Unified system of records that can be
accessed from anywhere, anytime
Actionable Intelligence For First Responders
BY SEAMLESSLY TYING INFORMATION TO THEIR OPERATIONAL PROCESS
COMPANY PROPRIETARY INFORMATION 14
In the command center Forward deployed Mobile Apps
>25 mile
radius monitored
312 events
monitored
737 total
users
600 real-time
data feeds
238 assets
protected
345 incidents
managed
RESULTS FROM SUPER BOWL XLVIII
Contextual Situational Awareness in Action
INTEGRATING OVER 40 AGENCIES AT THE LAST FIVE SUPER BOWLS
COMPANY PROPRIETARY INFORMATION 15
8 regions analyzing and
monitoring with shared best
practices
20122010
Analysis of risk to a single
jurisdiction by a single
agency
California uses the Haystax Public Safety Cloud to connect its
8 MAJOR URBAN AREAS
into a collaborative information sharing network
2011
Regional analysis and
monitoring of threats
across agencies in a
jurisdiction
2014
Statewide collaborative analysis
and situational awareness
COMPANY PROPRIETARY INFORMATION 16
Contextual Situational Awareness in Action
CALIFORNIA EMERGENCY OPERATIONS CENTER
Haystax provides the analytic
back-bone for total situational
awareness
100% cloud based
Integrates hundreds of real time
information sources across the
state
Information is prioritized and
routed automatically to
personnel on the ground as
needed
Contextual situational awareness on one screen
COMPANY PROPRIETARY INFORMATION 17
School Safety Master
Data Management
.
Incident Reporting &
Event Tracking
Contextual Monitoring of
Threats & Risks
Launching a Nationwide School Safety Cloud
POWERED BY THE SAME ANALYTIC PLATFORM
COMPANY PROPRIETARY INFORMATION 18
Bayesian model designed to solve high
noise-to-signal data problems
Automatically aligns alert quality to
available investigation resources
Eliminates scaling problems of
traditional rules based systems
Insider Threat Analytics for Enterprise Security
BRUTE FORCE SOLUTIONS WILL NOT WORK – NEEDS A COMPREHENSIVE SYSTEM MODEL
COMPANY PROPRIETARY INFORMATION 19
Counterintelligence
Medical
Criminal Investigators
HUMINT
Family
Peers
Psych
Subject
Command
ITSecurity
Backgroun
d Check
Peers &
Family
$
Financial
Records Public
Records
HR
Record
Web and Social
Media
+ =
Experts Data
Continuously
prioritized risk based
ranking
CARBONTM
Automated Threat Awareness
MATHEMATICAL MODELING OF EXPERTS + RISK RANKING + CONTINOUS EVALUATION
COMPANY PROPRIETARY INFORMATION 20
Automated continuous evaluation
and re-prioritization enables
sustained success
Can be deployed on top of 3rd
party alerting products
CARBONTM
Threat Optimization Solution
IT DOES NOT REMOVE ALERTS, JUST TELLS YOU WHICH ARE IMPORTANT AND WHY
COMPANY PROPRIETARY INFORMATION 21
Compare subject to
peer groups and
historic changes in
risk profile
Up to 10x improvements in
investigation productivity
Separates the critical from the
mass and lets the analyst know
Full traceability from results to the
source data
The CARBONTM
Value Proposition
STOP LOOKING AT ALERTS, START ACTING ON THEM BY KNOWING YOUR RISK
COMPANY PROPRIETARY INFORMATION 22
Why Haystax Analytics Matter
BRUTE FORCE SECURING AND ALERTING WON’T WORK
No industry is immune, no level of
technical sophistication is sufficient
Real-time visibility & control over the
entire at risk environment is critical
for CSO’s and CIO’s today
All security breaches involve people
and people are smarter than rules
COMPANY PROPRIETARY INFORMATION 23
Cloud enable Microsoft to any
cloud
90 days, fixed cost none-to-done
guarantee
Microsoft Gold Certified Partner
Selected by Microsoft to build their
reference Azure package for the
US Intel Community
Enabling Enterprise Clouds Without the Drama
HAYSTAX CANOPY CLOUD ACCELERATORS ARE THE FASTEST WAY TO A SECURE
CLOUD
COMPANY PROPRIETARY INFORMATION 24
Proven “Innovate on Purpose”
methodology
Innovation change management
consulting
Rapid disruptive innovation workshops
OVO Innovation
EXPERT INNOVATION CONSULTING SERVICES TO GOVERNMENT AND INDUSTRY
COMPANY PROPRIETARY INFORMATION 25
Haystax Technology Accelerator
DRIVEN TO INNOVATE AND BRING DISTRUPTIVE PRODUCTS TO MARKET
Developing advanced concepts and next
generation solutions to initial pilot
Incubating emerging technologies and
entrepreneurial third-party partnerships
Advancing the state-of-the-art through
agile, out-of-the-box thinking
COMPANY PROPRIETARY INFORMATION 26
COMPANY PROPRIETARY INFORMATION
Thank You
COMPANY PROPRIETARY INFORMATION
info@haystax.com
www.haystax.com
For Additional
Information Contact:
@HaystaxTech
(571) 297-3800

More Related Content

What's hot

2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
Scalar Decisions
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
Hewlett Packard Enterprise Business Value Exchange
 
Get Prepared
Get PreparedGet Prepared
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
EMC
 
Avoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of ITAvoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of IT
Envision Technology Advisors
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
Phil Agcaoili
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Microsoft
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
Ulf Mattsson
 
Whole Person Risk Modeling
Whole Person Risk ModelingWhole Person Risk Modeling
Whole Person Risk Modeling
Haystax Technology
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
Scalar Decisions
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
Tracey Ong
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
William McBorrough
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
PECB
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
Haystax Technology
 
Alert logic cloud security report
Alert logic cloud security reportAlert logic cloud security report
Alert logic cloud security report
Gabe Akisanmi
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
Christopher Bennett
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
Scalar Decisions
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
FireEye, Inc.
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
Simon Clements FIRP DipRP
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
Accenture Insurance
 

What's hot (20)

2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
 
Avoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of ITAvoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of IT
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
Cyber Security Conference - A deeper look at Microsoft Security Strategy, Tec...
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Whole Person Risk Modeling
Whole Person Risk ModelingWhole Person Risk Modeling
Whole Person Risk Modeling
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 
Alert logic cloud security report
Alert logic cloud security reportAlert logic cloud security report
Alert logic cloud security report
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 

Viewers also liked

facebook m
facebook mfacebook m
facebook m
Moya01
 
Comparatives and Superlatives
Comparatives and SuperlativesComparatives and Superlatives
Comparatives and Superlatives
Universidad Virtual Liverpool
 
Frac Tech Services interview questions and answers
Frac Tech Services interview questions and answersFrac Tech Services interview questions and answers
Frac Tech Services interview questions and answers
taylorlorr
 
Results presentation q2 2015
Results presentation q2 2015Results presentation q2 2015
Results presentation q2 2015
SpondaPlc
 
Haystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat Management
Haystax Technology
 
Modelo ecologico y_modelo_integral_de_intervencion
Modelo ecologico y_modelo_integral_de_intervencionModelo ecologico y_modelo_integral_de_intervencion
Modelo ecologico y_modelo_integral_de_intervencion
Juan Contreras
 
Major events
Major eventsMajor events
Major events
Haystax Technology
 
Question 4
Question 4Question 4
Question 4
killer987
 
Haystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology Machine learning white paper
Haystax Technology Machine learning white paper
Haystax Technology
 
презентація опера
презентація операпрезентація опера
презентація операnikysja888
 
Importance pdhpe
Importance pdhpeImportance pdhpe
Importance pdhpe
lolfeg
 
Guía de aprendizaje de inglés 3periodo
Guía de aprendizaje de inglés 3periodoGuía de aprendizaje de inglés 3periodo
Guía de aprendizaje de inglés 3periodo
Zuleyner Moreno Córdoba
 
Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...
Haystax Technology
 
Haystax bayesian networks
Haystax bayesian networksHaystax bayesian networks
Haystax bayesian networks
Haystax Technology
 
American mfg
American mfgAmerican mfg
American mfg
francisco_cervantes
 
Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515
SpondaPlc
 
FINAL PR Portfolio Slides
FINAL PR Portfolio Slides FINAL PR Portfolio Slides
FINAL PR Portfolio Slides
Jaclyn Freedman
 
Drupal commerce
Drupal commerceDrupal commerce
Drupal commerce
Vasil Boychev
 
BIM Show Live 2015: 110 Queen Street – A BIM exemplar
BIM Show Live 2015: 110 Queen Street – A BIM exemplarBIM Show Live 2015: 110 Queen Street – A BIM exemplar
BIM Show Live 2015: 110 Queen Street – A BIM exemplar
BuiltEnvironmentUBM
 

Viewers also liked (19)

facebook m
facebook mfacebook m
facebook m
 
Comparatives and Superlatives
Comparatives and SuperlativesComparatives and Superlatives
Comparatives and Superlatives
 
Frac Tech Services interview questions and answers
Frac Tech Services interview questions and answersFrac Tech Services interview questions and answers
Frac Tech Services interview questions and answers
 
Results presentation q2 2015
Results presentation q2 2015Results presentation q2 2015
Results presentation q2 2015
 
Haystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat Management
 
Modelo ecologico y_modelo_integral_de_intervencion
Modelo ecologico y_modelo_integral_de_intervencionModelo ecologico y_modelo_integral_de_intervencion
Modelo ecologico y_modelo_integral_de_intervencion
 
Major events
Major eventsMajor events
Major events
 
Question 4
Question 4Question 4
Question 4
 
Haystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology Machine learning white paper
Haystax Technology Machine learning white paper
 
презентація опера
презентація операпрезентація опера
презентація опера
 
Importance pdhpe
Importance pdhpeImportance pdhpe
Importance pdhpe
 
Guía de aprendizaje de inglés 3periodo
Guía de aprendizaje de inglés 3periodoGuía de aprendizaje de inglés 3periodo
Guía de aprendizaje de inglés 3periodo
 
Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...
 
Haystax bayesian networks
Haystax bayesian networksHaystax bayesian networks
Haystax bayesian networks
 
American mfg
American mfgAmerican mfg
American mfg
 
Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515
 
FINAL PR Portfolio Slides
FINAL PR Portfolio Slides FINAL PR Portfolio Slides
FINAL PR Portfolio Slides
 
Drupal commerce
Drupal commerceDrupal commerce
Drupal commerce
 
BIM Show Live 2015: 110 Queen Street – A BIM exemplar
BIM Show Live 2015: 110 Queen Street – A BIM exemplarBIM Show Live 2015: 110 Queen Street – A BIM exemplar
BIM Show Live 2015: 110 Queen Street – A BIM exemplar
 

Similar to Overview of Haystax Technology

Haystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium PresentationHaystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium Presentation
Jaffrey Ali
 
Enterprise Threat Management
Enterprise Threat ManagementEnterprise Threat Management
Enterprise Threat Management
Haystax Technology
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
Harman DTS
 
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
SteveAtHPE
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
MapR Technologies
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
Sirius
 
Operational Security
Operational SecurityOperational Security
Operational Security
Splunk
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
Bob Maley
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
Rajendra Menon
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
InvestorSymantec
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
Santiago Cavanna
 
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
EC-Council
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Bill Burns
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concerns
John Napier
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
Enterprise Management Associates
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
Rahul Neel Mani
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a Product
VMware Tanzu
 

Similar to Overview of Haystax Technology (20)

Haystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium PresentationHaystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium Presentation
 
Enterprise Threat Management
Enterprise Threat ManagementEnterprise Threat Management
Enterprise Threat Management
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
Operational Security
Operational SecurityOperational Security
Operational Security
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
Collaborating to Solve the Nation’s Intractable Cybersecurity Challenges - Br...
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concerns
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a Product
 

More from Haystax Technology

Processing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentProcessing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk Assessment
Haystax Technology
 
The constellation analytics platform
The constellation analytics platformThe constellation analytics platform
The constellation analytics platform
Haystax Technology
 
School Safety Center
School Safety CenterSchool Safety Center
School Safety Center
Haystax Technology
 
Public safety cloud overview
Public safety cloud overviewPublic safety cloud overview
Public safety cloud overview
Haystax Technology
 
Pre incident fire
Pre incident firePre incident fire
Pre incident fire
Haystax Technology
 
Critical assets protection
Critical assets protectionCritical assets protection
Critical assets protection
Haystax Technology
 
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax Technology
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network Services
Haystax Technology
 

More from Haystax Technology (8)

Processing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentProcessing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk Assessment
 
The constellation analytics platform
The constellation analytics platformThe constellation analytics platform
The constellation analytics platform
 
School Safety Center
School Safety CenterSchool Safety Center
School Safety Center
 
Public safety cloud overview
Public safety cloud overviewPublic safety cloud overview
Public safety cloud overview
 
Pre incident fire
Pre incident firePre incident fire
Pre incident fire
 
Critical assets protection
Critical assets protectionCritical assets protection
Critical assets protection
 
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous Evaluation
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network Services
 

Recently uploaded

Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 

Recently uploaded (20)

Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 

Overview of Haystax Technology

  • 1. COMPANY PROPRIETARY INFORMATION Next-Generation Cyber and Enterprise Threat Intelligence Solutions Introduction to Haystax Technology
  • 2. COMPANY PROPRIETARY INFORMATION 1 We offer mission critical cybersecurity and enterprise threat management solutions that provide real-time actionable intelligence for complex, high consequence decisions Our mission
  • 3. COMPANY PROPRIETARY INFORMATION 2 Our Leadership Team CREATED in 2012 on a 20 year legacy (Digital Sandbox, FlexPoint, NetCentrics) CUSTOMERS: Defense, Federal Civilian, State & Local, Intelligence Community, Commercial EMPLOYEES: 350, 90% Secret clearance, 60% Top Secret COMPETENCIES: Cybersecurity, Information Assurance, Network Management, Advanced Threat Analytics, Innovation Management CERTIFICATIONS: ISO 9001, ISO 20000, CMMI Services Level 3, Microsoft & AWS Gold Partner BILL VAN VLEET Chief Executive Officer BOB DOUGHERTY President, NetCentrics MARIANNE MEINS SVP. Strategic Initiatives JIM DOYLE Chief Financial Officer TOM SAFIR VP, Corporate Development BRYAN WARE President, Analytics DEAN HERRING Chief Innovation Officer JAFFREY ALI VP, Product Strategy & Marketing About us
  • 4. COMPANY PROPRIETARY INFORMATION 3 Protecting critical infrastructure & key resources Protecting computer networks Protecting against loss from fraud Risk planning & allocation of resources Managing responses during crisis situations Actionable intelligence solutions include… Protecting people from natural hazards & human threats (external and insiders)
  • 5. COMPANY PROPRIETARY INFORMATION 4 We are the de-facto standard for risk management for major national events requiring multi-agency collaboration We developed the protective intelligence methodology used by the Bill & Melinda Gates Foundation Used by 15 of the 20 largest urban areas to keep their citizens & assets safe Architected, manage & protect some of the most mission critical networks in the US We manage the largest enterprise-wide architecture & worldwide deployments of SCCM & SCOM We deployed the first private cloud with AWS for US Intelligence Community Trusted by customers nationwide
  • 6. COMPANY PROPRIETARY INFORMATION 5 Network Management Network Engineering Data Center Operations Enterprise Architecture Service Desk & VIP Support Washington Headquarters Services (The Pentagon): Manage & secure data center comprised of over 2000 Servers with over 18,000 users accessing highly classified information. Brought the Pentagon back online post September 11 attack in less than 24 hours Secure Enterprise Networks ENGINEERING AND END-TO-END SUPPORT OF MISSION CRITICAL SYSTEMS
  • 7. COMPANY PROPRIETARY INFORMATION 6 Information assurance Certification & accreditation Computer network defense Vulnerability management & scanning Risk analysis & mitigation Intrusion detection US Coast Guard: Manage certification & accreditation of networked devices for 44K+ members. US Army (Information Technology Agency): Manage, monitor & defend networks for personnel worldwide Cybersecurity INTEGRATED COMPLIANCE AND RISK BASED CYBER THREAT MANAGEMENT
  • 8. COMPANY PROPRIETARY INFORMATION 7 Broader visibility | Reduced Response times| Prioritized resource allocation Profile overall enterprise threat and risk Monitor continuously and broadly against that profile Implement collaborative, dynamic situational awareness Prioritize and route critical information for action Public Safety & Enterprise Threat Management ENABLING RISK INFORMED DECISION MAKING
  • 9. COMPANY PROPRIETARY INFORMATION 8 Contextual situational awareness anywhere Swivel-chair situational awareness does not scale …and one app Into one screen Haystax analytics & visualization puts all the information that goes here Informed Decision Making Needs Context CONTEXT ENABLES DECISION MAKER TO UNDERSTAND ALL THE DATA
  • 10. COMPANY PROPRIETARY INFORMATION 9 Suspicious Activity Reports Physical Assets/CIKR HR Data Calls for Service Network Alerts Enterprise Communications Enterprise Data News & Social Feeds Ingest Natural Language Processing Geo Location StoreREST API Alerts Web Apps Mobile Bayesian Threat Model Objectivity Credibility Impersonal Specificity Threat Score Prioritization Algorithm Data Visualizations drive understanding Actionable Information is pushed to the edge Massive scaling in Real Time Algorithms contextualize and Prioritize Contextual Analytic Framework for Understanding OPTIMIZES MACHINE AND HUMAN PROCESSING OF DATA
  • 11. COMPANY PROPRIETARY INFORMATION 10 Powerful native apps with easy self configuration and usability Reporting, Assessments & Monitoring seamlessly integrated Secure online/offline data access from anywhere Decision Makers are Increasingly Mobile REQUIRING ACTIONABLE INTELLIGENCE BEYOND OFFICE WALLS
  • 12. COMPANY PROPRIETARY INFORMATION 11 Monitor categorized & prioritized data feeds from multiple sources Make predictions based on trends and intensity of data Use dynamically generated profiles of to discover links & associations Actionable Intelligence for Analysts MAKING IT EASY TO INTERACT WITH REAL-TIME DATA IN REAL-TIME
  • 13. COMPANY PROPRIETARY INFORMATION 12 Holistic presentation framework that optimizes based on device, role, location, time, context Information is prioritized based on relevance to the user User interface designed to focus user to hot spots and key alerts Actionable Intelligence for Commanders BY PROVIDING CONTEXTUAL SITUATIONAL AWARENESS WHEREVER THEY ARE
  • 14. COMPANY PROPRIETARY INFORMATION 13 Application performance optimized for mission critical deployments Secure cross organization information sharing & collaboration Unified system of records that can be accessed from anywhere, anytime Actionable Intelligence For First Responders BY SEAMLESSLY TYING INFORMATION TO THEIR OPERATIONAL PROCESS
  • 15. COMPANY PROPRIETARY INFORMATION 14 In the command center Forward deployed Mobile Apps >25 mile radius monitored 312 events monitored 737 total users 600 real-time data feeds 238 assets protected 345 incidents managed RESULTS FROM SUPER BOWL XLVIII Contextual Situational Awareness in Action INTEGRATING OVER 40 AGENCIES AT THE LAST FIVE SUPER BOWLS
  • 16. COMPANY PROPRIETARY INFORMATION 15 8 regions analyzing and monitoring with shared best practices 20122010 Analysis of risk to a single jurisdiction by a single agency California uses the Haystax Public Safety Cloud to connect its 8 MAJOR URBAN AREAS into a collaborative information sharing network 2011 Regional analysis and monitoring of threats across agencies in a jurisdiction 2014 Statewide collaborative analysis and situational awareness
  • 17. COMPANY PROPRIETARY INFORMATION 16 Contextual Situational Awareness in Action CALIFORNIA EMERGENCY OPERATIONS CENTER Haystax provides the analytic back-bone for total situational awareness 100% cloud based Integrates hundreds of real time information sources across the state Information is prioritized and routed automatically to personnel on the ground as needed Contextual situational awareness on one screen
  • 18. COMPANY PROPRIETARY INFORMATION 17 School Safety Master Data Management . Incident Reporting & Event Tracking Contextual Monitoring of Threats & Risks Launching a Nationwide School Safety Cloud POWERED BY THE SAME ANALYTIC PLATFORM
  • 19. COMPANY PROPRIETARY INFORMATION 18 Bayesian model designed to solve high noise-to-signal data problems Automatically aligns alert quality to available investigation resources Eliminates scaling problems of traditional rules based systems Insider Threat Analytics for Enterprise Security BRUTE FORCE SOLUTIONS WILL NOT WORK – NEEDS A COMPREHENSIVE SYSTEM MODEL
  • 20. COMPANY PROPRIETARY INFORMATION 19 Counterintelligence Medical Criminal Investigators HUMINT Family Peers Psych Subject Command ITSecurity Backgroun d Check Peers & Family $ Financial Records Public Records HR Record Web and Social Media + = Experts Data Continuously prioritized risk based ranking CARBONTM Automated Threat Awareness MATHEMATICAL MODELING OF EXPERTS + RISK RANKING + CONTINOUS EVALUATION
  • 21. COMPANY PROPRIETARY INFORMATION 20 Automated continuous evaluation and re-prioritization enables sustained success Can be deployed on top of 3rd party alerting products CARBONTM Threat Optimization Solution IT DOES NOT REMOVE ALERTS, JUST TELLS YOU WHICH ARE IMPORTANT AND WHY
  • 22. COMPANY PROPRIETARY INFORMATION 21 Compare subject to peer groups and historic changes in risk profile Up to 10x improvements in investigation productivity Separates the critical from the mass and lets the analyst know Full traceability from results to the source data The CARBONTM Value Proposition STOP LOOKING AT ALERTS, START ACTING ON THEM BY KNOWING YOUR RISK
  • 23. COMPANY PROPRIETARY INFORMATION 22 Why Haystax Analytics Matter BRUTE FORCE SECURING AND ALERTING WON’T WORK No industry is immune, no level of technical sophistication is sufficient Real-time visibility & control over the entire at risk environment is critical for CSO’s and CIO’s today All security breaches involve people and people are smarter than rules
  • 24. COMPANY PROPRIETARY INFORMATION 23 Cloud enable Microsoft to any cloud 90 days, fixed cost none-to-done guarantee Microsoft Gold Certified Partner Selected by Microsoft to build their reference Azure package for the US Intel Community Enabling Enterprise Clouds Without the Drama HAYSTAX CANOPY CLOUD ACCELERATORS ARE THE FASTEST WAY TO A SECURE CLOUD
  • 25. COMPANY PROPRIETARY INFORMATION 24 Proven “Innovate on Purpose” methodology Innovation change management consulting Rapid disruptive innovation workshops OVO Innovation EXPERT INNOVATION CONSULTING SERVICES TO GOVERNMENT AND INDUSTRY
  • 26. COMPANY PROPRIETARY INFORMATION 25 Haystax Technology Accelerator DRIVEN TO INNOVATE AND BRING DISTRUPTIVE PRODUCTS TO MARKET Developing advanced concepts and next generation solutions to initial pilot Incubating emerging technologies and entrepreneurial third-party partnerships Advancing the state-of-the-art through agile, out-of-the-box thinking
  • 29. COMPANY PROPRIETARY INFORMATION info@haystax.com www.haystax.com For Additional Information Contact: @HaystaxTech (571) 297-3800

Editor's Notes

  1. Profile threat and risk - Use data and analytics to quantify risks and measure gaps in capabilities Monitor broadly against your risk profile – monitor sensors, online data, social media, and field reporting for indicators & warnings (I&W) of threats Provide dynamic data visualization – Use geospatial, temporal, and triage views to inform stakeholders Prioritize and route critical information - Use real-time analytics to identify priority information and direct it to those who need to see it wherever they are
  2. Bill 4