SlideShare uma empresa Scribd logo
1 de 39
1 
Company Facts 
CYBERSECURITY AND ENTERPRISE THREAT MANAGEMENT SOLUTIONS 
FORMED in 2012 on a 20 year legacy 
(Digital Sandbox, FlexPoint, NetCentrics) 
EMPLOYEES: 350, 90% Cleared 
COMPETENCIES: Cybersecurity, 
Information Assurance, Network 
Management, Advanced Threat 
Analytics, Innovation Management
2 
Our Core Values 
Values-Driven Engineering 
“We apply creative thinking, imaginative engineering, innovative 
technology, and thoughtful leadership to improve the quality of 
life”
3 
Our mission 
To help defend our customers from known 
and unknown threats to their mission
4 
We Provide Actionable Intelligence For 
DECISION MAKERS WHO 
Protect computer networks 
Protect critical infrastructure & key resources 
Protect against loss from fraud 
Protect people from natural hazards & human 
threats 
Protect an enterprises ability to compete 
effectively 
Manage responses to threats
5 
We Bring New Thinking to our Solutions 
BUILT ON INDUSTRY THOUGHT LEADERSHIP 
Multiple patents for analyzing risks that are difficult 
to quantify 
Pioneered secure multi-agency collaboration in the 
cloud 
Pioneered risk based analytics and mobile apps to 
deliver insights directly to decision makers 
Innovate on purposeTM consulting service enables 
organizations to innovate faster 
Unique contextual real time streaming analytics 
platform in the cloud to enable situational awareness
6 
Trusted by a Wide Range of Organizations 
TO PROVIDE INNOVATIVE THREAT MANAGEMENT SOLUTIONS 
Deployed Nationwide for Threat & 
Risk Management 
We developed the protective 
intelligence methodology used by the 
Bill & Melinda Gates Foundation 
We are the de-facto standard for risk 
management for major national events 
requiring multi-agency collaboration 
We are used by 15 of the 20 largest 
urban areas to keep their citizens & 
assets safe 
Trusted by Top Defense, Intel 
& Federal Civilian Agencies 
We architected, manage & defend some 
of the most mission critical networks in 
the US 
We manage the largest enterprise-wide 
architecture & worldwide deployments of 
SCCM & SCOM 
We deployed the CIA’s first private cloud 
with AWS
Network Management & Cyber 
7 
Threat Intelligence
8 
Status Quo: Perimeter Defense Isn’t Sufficient 
RISK TO DATA AND MISSION CAPABILITIES 
No industry is immune, no level of 
technical sophistication is sufficient 
Real-time visibility & control over the 
entire at risk environment is critical 
for CSO’s and CIO’s 
All security breaches involve people 
and people are smarter than rules
9 
The Problem: The Signal has become the noise! 
WHY BRUTE FORCE ANALYTICS DOESN’T WORK 
Target’s cyber intrusion 
and subsequent data theft 
is well known… 
Target’s cyber detection systems 
caught the malware (FireEye) 
Why? 
40 million – The number of credit and debit 
cards thieves stole from Target between Nov. 
27 and Dec. 15, 2013 
“They are bombarded with alerts” 
- Source Bloomberg 
“The alert from FireEye labeled the threat 
with the generic name – malware.binary” 
Source Bloomberg 
Systems that generate too many 
false positives are a nuisance 
Information needs to be 
prioritized and understood to 
be ACTIONABLE 
“Target says it declined to act on early 
alert of cyber breach” 
- Source Bloomberg
10 
What is needed: Dynamic risk-based approach 
Predict Risk 
Catalog Assets Detect Threats Mitigate Vulnerabilities 
Prioritized Incidents/Threats 
Operating 
Systems 
Network, Asset & Identity Context 
Normalization & Categorization 
Event Logs, Correlation & Flow Data 
Web 
Servers 
Switches Routers IDS/IPS Firewall Applications 
Real-Time 
Collection, Normalization & 
Analysis 
Unified IT Security & Risk 
Posture 
Actionable Insight 
Reduced Operational Effort 
For Any Size Organization
11 
Our risk-based approach: Unified Threat Management 
THE FOUNDATION FOR OUR CYBER THREAT INTELLIGENCE SOLUTIONS 
System Hardening/App Protection/Secure Coding 
Encryption, PKI 
Enterprise Services (DNS, DHCP, etc) 
Secure Systems Development 
Lifecycle 
External 
Mandates 
Vulnerability 
Management 
Universal Log 
Management 
Sensors & 
Response 
Universal Log 
Management 
Software 
Configuration 
Management 
Risk Management 
Platform 
Correlation & 
Analysis 
Asset & Network 
Management 
Network Access 
Control 
Network & Access 
Management 
Database of Asset 
Inventories
12 
Benefits 
End-to-End Cyber Intelligence Platform for Situational Awareness & Analysis 
Complete understanding of the overall at-risk 
environment to protect 
Contextually integrate internal and external 
data sources 
Early detection of threats & ability to correlate 
to the at-risk environment 
Dynamic risk-based prioritization of 
information identifies what is most important 
Specialized cyber analyst-centric tools to 
support collaboration and digital cataloging of 
analysis workflows 
CSO, CISO Analyst 
Infrastructure & Assets End Users
13 
Brought the Pentagon back online post 
September 11 attack in less than 24 
hours 
Haystax NetCentrics 
MISSION CRITICAL NETWORK PROTECTION SERVICES
14 
Public Safety & Enterprise 
Threat Management
15 
Public Safety & Enterprise Threat Management 
ENABLING RISK INFORMED DECISION MAKING 
Broader visibility | Reduced Response times| Prioritized resource allocation 
Profile overall 
enterprise threat and 
risk 
Monitor continuously 
and broadly against 
that profile 
Prioritize and route 
critical information for 
Implement collaborative, 
dynamic situational 
awareness 
action
16 
Informed Decision Making Needs Context 
CONTEXT ENABLES DECISION MAKER TO UNDERSTAND ALL THE DATA 
Into one screen 
Swivel-chair situational awareness 
Contextual situational 
does not scale awareness anywhere 
…and one app 
Haystax Analytics & 
visualization can put all the 
information that goes here
17 
The Constellation Analytics PlatformTM 
OPTIMIZES MACHINE AND HUMAN PROCESSING OF DATA 
Physical 
Enterprise 
Calls for HR Data 
Service 
News & Social Communications Enterprise Data 
Assets/CIKR 
Archive DB Web 
Low Priority Channels 
Domain Ontology 
NLP 
Entity Resolution 
Geo Reasoning 
Association 
Analysis 
Scoring 
Data Collection 
& Pre-Processing 
Analytic 
Processing 
Mobile 
3rd Party 
Triage Timeline Map 
Alerts Visual Interaction Canvases Reports 
Feeds 
Network Alerts 
Know & Act 
Patent # 8874071
18 
Decision Makers are Increasingly Mobile 
ACTIONABLE INTELLIGENCE BEYOND OFFICE WALLS 
Powerful native apps with easy self 
configuration and usability 
Reporting, Assessments & Monitoring 
seamlessly integrated 
Secure online/offline data access from 
anywhere
19 
Haystax Analytics Helps First Responders 
BY SEAMLESSLY TYING INFORMATION TO THEIR OPERATIONAL PROCESS 
Unified system of records that can be 
accessed from anywhere, anytime 
Fuse data streams from existing 
systems into “channels” of prioritized 
operational information 
Secure cross organization information 
sharing & collaboration
20 
Haystax Analytics Helps Commanders 
BY PROVIDING CONTEXTUAL SITUATIONAL AWARENESS WHEREVER THEY ARE 
User interface designed to focus user 
to hot spots and key alerts 
Holistic presentation framework that 
optimizes based on device, role, 
location, time, context 
Information is prioritized based on 
relevance to the user
21 
Haystax Analytics Helps Analysts 
BY MAKING IT EASY TO INTERACT WITH REAL TIME DATA IN REAL TIME 
Monitor categorized & prioritized data 
feeds from multiple sources 
Make predictions based on trends and 
intensity of data 
Use dynamically generated profiles of to 
discover links & associations
22 
>25 mile 
radius monitored 
Haystax Analytics in Action 
LAST FIVE SUPER BOWLS 
RESULTS FROM SUPER BOWL XLVIII 
312 events 
monitored 
50+ agencies 
collaborated 
600 real-time 
data feeds 
238 assets 
protected 
345 incidents 
managed 
In the command center Forward deployed Mobile Apps
23 
Haystax Analytics in Action 
California Emergency Operations Center 
Haystax provides the analytic back-bone 
for total situational awareness 
100% cloud based 
Integrates hundreds of real time 
information sources across the state 
Information is prioritized and routed 
automatically to personnel on the 
State-wide situational awareness from one ground as needed 
screen
24 
Haystax Analytics in Action 
Houston 
Critical information is available in under a 
minute v. over an hour 
Uses Haystax as the platform for managing risk 
based data on physical structures and 
improving first responder actions 
100% cloud based 
Mobile apps for data collection and field 
reporting 
Leverages Haystax’s ability to secure critical 
private sector data and secure sharing of 
information between private and public sectors
25 
Incident Reporting & 
Event Tracking 
Contextual Monitoring of 
Threats & Risks 
Nationwide School Safety 
POWERED BY OUR ANALYTIC PLATFORM 
School Safety Master 
Data Management 
.
26 
Innovation
27
28 
We are advancing the status quo in threat analytics with 
innovative techniques & technologies 
Designing elegant 
solutions for complex 
analytic challenges 
Our patented prioritization 
algorithms excel where the noise to 
signal ratio is high 
Our ‘whole person’ Bayesian model 
specializes in behavioral threat 
detection 
Our visualizations enable informed 
decision making
29 
Our Response to Traditional Brute Force Enterprise Threat Analytics 
CARBON 
Bayesian model designed to solve high 
noise-to-signal data problems 
Automatically aligns alert quality to 
available investigation resources 
Eliminates scaling problems of 
traditional rules based systems
30 
How Carbon Works 
MATHEMATICAL MODELING OF EXPERTS + RISK RANKING + CONTINOUS EVALUATION = 
AUTOMATED THREAT AWARENESS 
Experts Data 
HUMINT 
Counterintelligence 
Medical 
Criminal Investigators 
Command 
Peers 
Family 
Psych 
Subject 
IT Security 
Backgroun 
d Check 
Peers & 
Family 
+ $ 
= 
Financial 
Records Public 
Records 
HR 
Record 
Web and Social 
Media 
Continuously 
prioritized risk based 
ranking
31 
Carbon is a Threat Optimization Solution 
IT DOES NOT REMOVE ALERTS, JUST TELLS YOU WHICH ARE IMPORTANT AND WHY 
Automated continuous evaluation 
and re-prioritization enables 
sustained success 
Can be deployed on top of 3rd 
party alerting products
32 
Carbon Value Proposition 
STOP LOOKING AT ALERTS, START ACTING ON THEM BY KNOWING YOUR RISK 
Compare subject to peer 
groups and historic changes 
Up to 10x improvements in 
investigation productivity 
in risk profile 
Separates the critical from the 
mass and lets the analyst know 
Full traceability from results to the 
source data
33 
EXPERTISE: Enabling Enterprise Clouds Without the Drama 
HAYSTAX CANOPY CLOUD ACCELERATORS ARE THE FASTEST WAY TO A SECURE CLOUD 
Cloud enable Microsoft to any cloud 
90 days, fixed cost none to done 
guarantee 
Microsoft Gold Certified Partner 
Selected by Microsoft to build their 
reference Azure package for the US 
Intel Community
34 
INNOVATE ON PURPOSETM: OVO 
EXPERTS WORKING TO REINVIGORATE INNOVATION SKILLS, INSIGHTS AND 
COMPETENCIES IN ANY ORGANIZATION 
Proven “Innovate on Purpose” 
methodology 
Innovation change management 
consulting 
Rapid disruptive innovation workshops
35 
R&D: Haystax Technology Accelerator 
DRIVEN TO INNOVATE AND BRING TO MARKET DISTRUPTIVE PRODUCTS 
Develop advanced concepts 
Focus on solving the “really hard” problems 
Advance the state of the art through agile, out-of- 
the-box thinking
36 
Haystax in the News
37
38 
Thank You 
Haystax Technology 
8251 Greensboro Drive 
Suite 1111 
McLean, VA 22102 
(202) 492-5457 
@haystaxtech 
www.haystax.com

Mais conteúdo relacionado

Mais procurados

Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax TechnologyHaystax Technology
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDPriyanka Aash
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 DefenderMighty Guides, Inc.
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive SecurityComputerworld Philippines
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016FitCEO, Inc. (FCI)
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIsSteven Aiello
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Coastal Pet Products, Inc.
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Puneet Kukreja
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligencethinkASG
 
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...Mighty Guides, Inc.
 
Industry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven SecurityIndustry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven SecurityEMC
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for EndpointMighty Guides, Inc.
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Stefaan Van daele
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationNexon Asia Pacific
 

Mais procurados (20)

Enterprise Threat Management
Enterprise Threat ManagementEnterprise Threat Management
Enterprise Threat Management
 
Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax Technology
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Avoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of ITAvoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of IT
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security Intelligence
 
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
 
Industry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven SecurityIndustry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 

Destaque

Haystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology
 
BIM Show Live 2015: 110 Queen Street – A BIM exemplar
BIM Show Live 2015: 110 Queen Street – A BIM exemplarBIM Show Live 2015: 110 Queen Street – A BIM exemplar
BIM Show Live 2015: 110 Queen Street – A BIM exemplarBuiltEnvironmentUBM
 
презентація опера
презентація операпрезентація опера
презентація операnikysja888
 
Діагностування електродвигунів
Діагностування електродвигунівДіагностування електродвигунів
Діагностування електродвигунівSvetlana Savostina
 
facebook m
facebook mfacebook m
facebook mMoya01
 
Results presentation q3 2016
Results presentation q3 2016Results presentation q3 2016
Results presentation q3 2016SpondaPlc
 
First class presentation GE14 G01 Jan 6th - Feb 26th
First class presentation GE14 G01 Jan 6th - Feb 26thFirst class presentation GE14 G01 Jan 6th - Feb 26th
First class presentation GE14 G01 Jan 6th - Feb 26thUniversidad Virtual Liverpool
 
Processing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentProcessing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentHaystax Technology
 
Sponda yleisesitys 31032014
Sponda yleisesitys 31032014Sponda yleisesitys 31032014
Sponda yleisesitys 31032014SpondaPlc
 
Sponda Results presentation Q1 2016
Sponda Results presentation Q1 2016Sponda Results presentation Q1 2016
Sponda Results presentation Q1 2016SpondaPlc
 
Importance of pdhpe
Importance of pdhpeImportance of pdhpe
Importance of pdhpelolfeg
 
Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515SpondaPlc
 
Historia 10 suurinta jackpottia
Historia 10 suurinta jackpottiaHistoria 10 suurinta jackpottia
Historia 10 suurinta jackpottiaCasinoLehti
 
Freedom Metals interview questions and answers
Freedom Metals interview questions and answersFreedom Metals interview questions and answers
Freedom Metals interview questions and answerstaylorlorr
 

Destaque (20)

Haystax Technology Machine learning white paper
Haystax Technology Machine learning white paperHaystax Technology Machine learning white paper
Haystax Technology Machine learning white paper
 
BIM Show Live 2015: 110 Queen Street – A BIM exemplar
BIM Show Live 2015: 110 Queen Street – A BIM exemplarBIM Show Live 2015: 110 Queen Street – A BIM exemplar
BIM Show Live 2015: 110 Queen Street – A BIM exemplar
 
презентація опера
презентація операпрезентація опера
презентація опера
 
Діагностування електродвигунів
Діагностування електродвигунівДіагностування електродвигунів
Діагностування електродвигунів
 
facebook m
facebook mfacebook m
facebook m
 
Results presentation q3 2016
Results presentation q3 2016Results presentation q3 2016
Results presentation q3 2016
 
First class presentation GE14 G01 Jan 6th - Feb 26th
First class presentation GE14 G01 Jan 6th - Feb 26thFirst class presentation GE14 G01 Jan 6th - Feb 26th
First class presentation GE14 G01 Jan 6th - Feb 26th
 
Processing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk AssessmentProcessing Events in Probabilistic Risk Assessment
Processing Events in Probabilistic Risk Assessment
 
Sponda yleisesitys 31032014
Sponda yleisesitys 31032014Sponda yleisesitys 31032014
Sponda yleisesitys 31032014
 
Sponda Results presentation Q1 2016
Sponda Results presentation Q1 2016Sponda Results presentation Q1 2016
Sponda Results presentation Q1 2016
 
Major events
Major eventsMajor events
Major events
 
Haystax bayesian networks
Haystax bayesian networksHaystax bayesian networks
Haystax bayesian networks
 
Importance of pdhpe
Importance of pdhpeImportance of pdhpe
Importance of pdhpe
 
Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515Sponda Financial Results Q1 2015 presentation 050515
Sponda Financial Results Q1 2015 presentation 050515
 
Historia 10 suurinta jackpottia
Historia 10 suurinta jackpottiaHistoria 10 suurinta jackpottia
Historia 10 suurinta jackpottia
 
Drupal commerce
Drupal commerceDrupal commerce
Drupal commerce
 
Freedom Metals interview questions and answers
Freedom Metals interview questions and answersFreedom Metals interview questions and answers
Freedom Metals interview questions and answers
 
Literacy powerpointc
Literacy powerpointcLiteracy powerpointc
Literacy powerpointc
 
Question 4
Question 4Question 4
Question 4
 
Shooting
Shooting Shooting
Shooting
 

Semelhante a Haystax: Actionable Intelligence Platform

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Haystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium PresentationHaystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium PresentationJaffrey Ali
 
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline SecurityInfosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline SecuritySkybox Security
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityNetworkCollaborators
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptxSeceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptxCompanySeceon
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewPriyanka Aash
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityTim Bass
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
Виталий Трахтенберг (Израиль), MER Group. Кейс по кибер-расследованию для одн...
Виталий Трахтенберг (Израиль), MER Group. Кейс по кибер-расследованию для одн...Виталий Трахтенберг (Израиль), MER Group. Кейс по кибер-расследованию для одн...
Виталий Трахтенберг (Израиль), MER Group. Кейс по кибер-расследованию для одн...KazHackStan
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutionsharman041
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS Cristian Garcia G.
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big UnknownAdrian Dumitrescu
 

Semelhante a Haystax: Actionable Intelligence Platform (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Haystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium PresentationHaystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium Presentation
 
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline SecurityInfosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptxSeceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise Security
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Виталий Трахтенберг (Израиль), MER Group. Кейс по кибер-расследованию для одн...
Виталий Трахтенберг (Израиль), MER Group. Кейс по кибер-расследованию для одн...Виталий Трахтенберг (Израиль), MER Group. Кейс по кибер-расследованию для одн...
Виталий Трахтенберг (Израиль), MER Group. Кейс по кибер-расследованию для одн...
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
 

Mais de Haystax Technology

The constellation analytics platform
The constellation analytics platformThe constellation analytics platform
The constellation analytics platformHaystax Technology
 
Haystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Technology
 
Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Haystax Technology
 

Mais de Haystax Technology (7)

The constellation analytics platform
The constellation analytics platformThe constellation analytics platform
The constellation analytics platform
 
Haystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat ManagementHaystax Carbon for Insider Threat Management
Haystax Carbon for Insider Threat Management
 
School Safety Center
School Safety CenterSchool Safety Center
School Safety Center
 
Public safety cloud overview
Public safety cloud overviewPublic safety cloud overview
Public safety cloud overview
 
Pre incident fire
Pre incident firePre incident fire
Pre incident fire
 
Critical assets protection
Critical assets protectionCritical assets protection
Critical assets protection
 
Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...Exploiting inference to improve temporal RDF annotations and queries for mach...
Exploiting inference to improve temporal RDF annotations and queries for mach...
 

Último

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Haystax: Actionable Intelligence Platform

  • 1.
  • 2. 1 Company Facts CYBERSECURITY AND ENTERPRISE THREAT MANAGEMENT SOLUTIONS FORMED in 2012 on a 20 year legacy (Digital Sandbox, FlexPoint, NetCentrics) EMPLOYEES: 350, 90% Cleared COMPETENCIES: Cybersecurity, Information Assurance, Network Management, Advanced Threat Analytics, Innovation Management
  • 3. 2 Our Core Values Values-Driven Engineering “We apply creative thinking, imaginative engineering, innovative technology, and thoughtful leadership to improve the quality of life”
  • 4. 3 Our mission To help defend our customers from known and unknown threats to their mission
  • 5. 4 We Provide Actionable Intelligence For DECISION MAKERS WHO Protect computer networks Protect critical infrastructure & key resources Protect against loss from fraud Protect people from natural hazards & human threats Protect an enterprises ability to compete effectively Manage responses to threats
  • 6. 5 We Bring New Thinking to our Solutions BUILT ON INDUSTRY THOUGHT LEADERSHIP Multiple patents for analyzing risks that are difficult to quantify Pioneered secure multi-agency collaboration in the cloud Pioneered risk based analytics and mobile apps to deliver insights directly to decision makers Innovate on purposeTM consulting service enables organizations to innovate faster Unique contextual real time streaming analytics platform in the cloud to enable situational awareness
  • 7. 6 Trusted by a Wide Range of Organizations TO PROVIDE INNOVATIVE THREAT MANAGEMENT SOLUTIONS Deployed Nationwide for Threat & Risk Management We developed the protective intelligence methodology used by the Bill & Melinda Gates Foundation We are the de-facto standard for risk management for major national events requiring multi-agency collaboration We are used by 15 of the 20 largest urban areas to keep their citizens & assets safe Trusted by Top Defense, Intel & Federal Civilian Agencies We architected, manage & defend some of the most mission critical networks in the US We manage the largest enterprise-wide architecture & worldwide deployments of SCCM & SCOM We deployed the CIA’s first private cloud with AWS
  • 8. Network Management & Cyber 7 Threat Intelligence
  • 9. 8 Status Quo: Perimeter Defense Isn’t Sufficient RISK TO DATA AND MISSION CAPABILITIES No industry is immune, no level of technical sophistication is sufficient Real-time visibility & control over the entire at risk environment is critical for CSO’s and CIO’s All security breaches involve people and people are smarter than rules
  • 10. 9 The Problem: The Signal has become the noise! WHY BRUTE FORCE ANALYTICS DOESN’T WORK Target’s cyber intrusion and subsequent data theft is well known… Target’s cyber detection systems caught the malware (FireEye) Why? 40 million – The number of credit and debit cards thieves stole from Target between Nov. 27 and Dec. 15, 2013 “They are bombarded with alerts” - Source Bloomberg “The alert from FireEye labeled the threat with the generic name – malware.binary” Source Bloomberg Systems that generate too many false positives are a nuisance Information needs to be prioritized and understood to be ACTIONABLE “Target says it declined to act on early alert of cyber breach” - Source Bloomberg
  • 11. 10 What is needed: Dynamic risk-based approach Predict Risk Catalog Assets Detect Threats Mitigate Vulnerabilities Prioritized Incidents/Threats Operating Systems Network, Asset & Identity Context Normalization & Categorization Event Logs, Correlation & Flow Data Web Servers Switches Routers IDS/IPS Firewall Applications Real-Time Collection, Normalization & Analysis Unified IT Security & Risk Posture Actionable Insight Reduced Operational Effort For Any Size Organization
  • 12. 11 Our risk-based approach: Unified Threat Management THE FOUNDATION FOR OUR CYBER THREAT INTELLIGENCE SOLUTIONS System Hardening/App Protection/Secure Coding Encryption, PKI Enterprise Services (DNS, DHCP, etc) Secure Systems Development Lifecycle External Mandates Vulnerability Management Universal Log Management Sensors & Response Universal Log Management Software Configuration Management Risk Management Platform Correlation & Analysis Asset & Network Management Network Access Control Network & Access Management Database of Asset Inventories
  • 13. 12 Benefits End-to-End Cyber Intelligence Platform for Situational Awareness & Analysis Complete understanding of the overall at-risk environment to protect Contextually integrate internal and external data sources Early detection of threats & ability to correlate to the at-risk environment Dynamic risk-based prioritization of information identifies what is most important Specialized cyber analyst-centric tools to support collaboration and digital cataloging of analysis workflows CSO, CISO Analyst Infrastructure & Assets End Users
  • 14. 13 Brought the Pentagon back online post September 11 attack in less than 24 hours Haystax NetCentrics MISSION CRITICAL NETWORK PROTECTION SERVICES
  • 15. 14 Public Safety & Enterprise Threat Management
  • 16. 15 Public Safety & Enterprise Threat Management ENABLING RISK INFORMED DECISION MAKING Broader visibility | Reduced Response times| Prioritized resource allocation Profile overall enterprise threat and risk Monitor continuously and broadly against that profile Prioritize and route critical information for Implement collaborative, dynamic situational awareness action
  • 17. 16 Informed Decision Making Needs Context CONTEXT ENABLES DECISION MAKER TO UNDERSTAND ALL THE DATA Into one screen Swivel-chair situational awareness Contextual situational does not scale awareness anywhere …and one app Haystax Analytics & visualization can put all the information that goes here
  • 18. 17 The Constellation Analytics PlatformTM OPTIMIZES MACHINE AND HUMAN PROCESSING OF DATA Physical Enterprise Calls for HR Data Service News & Social Communications Enterprise Data Assets/CIKR Archive DB Web Low Priority Channels Domain Ontology NLP Entity Resolution Geo Reasoning Association Analysis Scoring Data Collection & Pre-Processing Analytic Processing Mobile 3rd Party Triage Timeline Map Alerts Visual Interaction Canvases Reports Feeds Network Alerts Know & Act Patent # 8874071
  • 19. 18 Decision Makers are Increasingly Mobile ACTIONABLE INTELLIGENCE BEYOND OFFICE WALLS Powerful native apps with easy self configuration and usability Reporting, Assessments & Monitoring seamlessly integrated Secure online/offline data access from anywhere
  • 20. 19 Haystax Analytics Helps First Responders BY SEAMLESSLY TYING INFORMATION TO THEIR OPERATIONAL PROCESS Unified system of records that can be accessed from anywhere, anytime Fuse data streams from existing systems into “channels” of prioritized operational information Secure cross organization information sharing & collaboration
  • 21. 20 Haystax Analytics Helps Commanders BY PROVIDING CONTEXTUAL SITUATIONAL AWARENESS WHEREVER THEY ARE User interface designed to focus user to hot spots and key alerts Holistic presentation framework that optimizes based on device, role, location, time, context Information is prioritized based on relevance to the user
  • 22. 21 Haystax Analytics Helps Analysts BY MAKING IT EASY TO INTERACT WITH REAL TIME DATA IN REAL TIME Monitor categorized & prioritized data feeds from multiple sources Make predictions based on trends and intensity of data Use dynamically generated profiles of to discover links & associations
  • 23. 22 >25 mile radius monitored Haystax Analytics in Action LAST FIVE SUPER BOWLS RESULTS FROM SUPER BOWL XLVIII 312 events monitored 50+ agencies collaborated 600 real-time data feeds 238 assets protected 345 incidents managed In the command center Forward deployed Mobile Apps
  • 24. 23 Haystax Analytics in Action California Emergency Operations Center Haystax provides the analytic back-bone for total situational awareness 100% cloud based Integrates hundreds of real time information sources across the state Information is prioritized and routed automatically to personnel on the State-wide situational awareness from one ground as needed screen
  • 25. 24 Haystax Analytics in Action Houston Critical information is available in under a minute v. over an hour Uses Haystax as the platform for managing risk based data on physical structures and improving first responder actions 100% cloud based Mobile apps for data collection and field reporting Leverages Haystax’s ability to secure critical private sector data and secure sharing of information between private and public sectors
  • 26. 25 Incident Reporting & Event Tracking Contextual Monitoring of Threats & Risks Nationwide School Safety POWERED BY OUR ANALYTIC PLATFORM School Safety Master Data Management .
  • 28. 27
  • 29. 28 We are advancing the status quo in threat analytics with innovative techniques & technologies Designing elegant solutions for complex analytic challenges Our patented prioritization algorithms excel where the noise to signal ratio is high Our ‘whole person’ Bayesian model specializes in behavioral threat detection Our visualizations enable informed decision making
  • 30. 29 Our Response to Traditional Brute Force Enterprise Threat Analytics CARBON Bayesian model designed to solve high noise-to-signal data problems Automatically aligns alert quality to available investigation resources Eliminates scaling problems of traditional rules based systems
  • 31. 30 How Carbon Works MATHEMATICAL MODELING OF EXPERTS + RISK RANKING + CONTINOUS EVALUATION = AUTOMATED THREAT AWARENESS Experts Data HUMINT Counterintelligence Medical Criminal Investigators Command Peers Family Psych Subject IT Security Backgroun d Check Peers & Family + $ = Financial Records Public Records HR Record Web and Social Media Continuously prioritized risk based ranking
  • 32. 31 Carbon is a Threat Optimization Solution IT DOES NOT REMOVE ALERTS, JUST TELLS YOU WHICH ARE IMPORTANT AND WHY Automated continuous evaluation and re-prioritization enables sustained success Can be deployed on top of 3rd party alerting products
  • 33. 32 Carbon Value Proposition STOP LOOKING AT ALERTS, START ACTING ON THEM BY KNOWING YOUR RISK Compare subject to peer groups and historic changes Up to 10x improvements in investigation productivity in risk profile Separates the critical from the mass and lets the analyst know Full traceability from results to the source data
  • 34. 33 EXPERTISE: Enabling Enterprise Clouds Without the Drama HAYSTAX CANOPY CLOUD ACCELERATORS ARE THE FASTEST WAY TO A SECURE CLOUD Cloud enable Microsoft to any cloud 90 days, fixed cost none to done guarantee Microsoft Gold Certified Partner Selected by Microsoft to build their reference Azure package for the US Intel Community
  • 35. 34 INNOVATE ON PURPOSETM: OVO EXPERTS WORKING TO REINVIGORATE INNOVATION SKILLS, INSIGHTS AND COMPETENCIES IN ANY ORGANIZATION Proven “Innovate on Purpose” methodology Innovation change management consulting Rapid disruptive innovation workshops
  • 36. 35 R&D: Haystax Technology Accelerator DRIVEN TO INNOVATE AND BRING TO MARKET DISTRUPTIVE PRODUCTS Develop advanced concepts Focus on solving the “really hard” problems Advance the state of the art through agile, out-of- the-box thinking
  • 37. 36 Haystax in the News
  • 38. 37
  • 39. 38 Thank You Haystax Technology 8251 Greensboro Drive Suite 1111 McLean, VA 22102 (202) 492-5457 @haystaxtech www.haystax.com

Notas do Editor

  1. At Haystax, we have been thinking about this for a long time – in fact before big data was big….in fact, we started when there was no data at all for some of our analytic challenges. When there is no data, basically you’re dealing with ALL data. The ‘true big data problem’! We had to invent a way to deal with data at that scale. That led to our RIN algorithm that now powers our platform. Our unique IP starts from the way we formulate the problem, to how we then go about mapping the data to the problem and all the way to gaining access to the data and doing it in way that is very fast for the customer. An analytic solution is only useful when it can be delivered in a timely manner. So, what is the result of this IP? The Constellation Platform…
  2. The constellation platform is the result of our R&D efforts over the last 10 years! It’s built using the most modern open source analytic technologies – we are using the same frameworks that products like Twitter and facebook use…it’s all proven. In some cases we had to optimize the technologies to make it do what we wanted. The most important thing is that Constellation is ready to use. It isn’t something we build from scratch for our customers. It just works…. How does it work? That’s the section in the middle Finally, we present the information through defined visual canvases. What is important to remember is that the end user does not need to do anything to generate these views. So how is this used?
  3. Let’s look at it from the position of decision makers: Starting with an analyst. We are looking at three screens that show analytic fusion from Constellation… You can explain the text…
  4. It’s about non technical users such as commanders being self sufficient in using analytics to make decisions. We are breaking the typical mold of analytic applications. We are not focusing on eye candy, but on decision centric presentations and interaction models. So, who are our customers?
  5. It’s a combination of customers across the public sector industry… Explain some highlights. So let’s look at what we mean by the Public safety ecosystem…next slide
  6. A whole combination of functions….connecting multiple agencies and stakeholders together. You can explain the various examples of public safety apps described here. Let’s look at some examples of customers…
  7. Cloud enables you to grow faster. You can grow what is working…you can increase stakeholder participation more easily.
  8. Our ability to deploy quickly…. Describe all the places we are used and how we connect everyone together….we are also doing NJ this year. These are some examples of public safety customers.. Let now look at examples of secure collaboration and information sharing examples
  9. Flexpoint is our branded offering for secure cloud collaboration apps. So what is powered by flexpoint today? See the ipad the POTUS is using? It’s a FlexPoint app Microsoft came to us to help them build a reference Azure application for the the IC. It’s called Azure Canopy and we are co-branding it with Microsoft. What else have we done…with AWS we did…. We are now considered an industry reference in the IC.
  10. Cloud improves provisioning of secure apps.
  11. SharePoint, Link…
  12. DTaaS should be about improving the user experience. We have worked with MSFT on creating a reference desktop based on familiar collaboration and productivity tools.
  13. It’s not just about analysts, it also about pushing intelligence out to the field in mission critical situations.
  14. It’s not just about analysts, it also about pushing intelligence out to the field in mission critical situations.
  15. Summary…we are going to challenge the status quo….we are in the process of building a strong company and brand.
  16. Bill 1
  17. We are also at the forefront of next generation analytic challenges… Explain this…
  18. Our delivery approach is an important aspect of who we are a company.
  19. Summary…we are going to challenge the status quo….we are in the process of building a strong company and brand.
  20. Summary…we are going to challenge the status quo….we are in the process of building a strong company and brand.
  21. Summary…we are going to challenge the status quo….we are in the process of building a strong company and brand.
  22. Summary…we are going to challenge the status quo….we are in the process of building a strong company and brand.
  23. Summary…we are going to challenge the status quo….we are in the process of building a strong company and brand.
  24. Summary…we are going to challenge the status quo….we are in the process of building a strong company and brand.
  25. Summary…we are going to challenge the status quo….we are in the process of building a strong company and brand.