Overview of Haystax Technology
-
Upload
haystax-technology -
Category
Software
-
view
459 -
download
7
description
Transcript of Overview of Haystax Technology
COMPANY PROPRIETARY INFORMATION
Next-Generation Cyber and Enterprise Threat Intelligence Solutions
Introduction to Haystax Technology
COMPANY PROPRIETARY INFORMATION 2
We offer mission critical cybersecurity and enterprise threat management
solutions that provide real-time actionable intelligence
for complex, high consequence decisions
Our mission
COMPANY PROPRIETARY INFORMATION 3
Our Leadership Team
CREATED in 2012 on a 20 year legacy (Digital Sandbox, FlexPoint, NetCentrics)
CUSTOMERS: Defense, Federal Civilian, State & Local, Intelligence Community, Commercial
EMPLOYEES: 350, 90% Secret clearance, 60% Top Secret
COMPETENCIES: Cybersecurity, Information Assurance, Network Management, Advanced Threat Analytics, Innovation Management
CERTIFICATIONS: ISO 9001, ISO 20000, CMMI Services Level 3, Microsoft & AWS Gold Partner
BILL VAN VLEETChief Executive
Officer
BOB DOUGHERTYPresident,
NetCentrics
MARIANNE MEINSSVP. Strategic
Initiatives
JIM DOYLEChief Financial
Officer
TOM SAFIRVP, Corporate Development
BRYAN WAREPresident, Analytics
DEAN HERRINGChief Innovation
Officer
JAFFREY ALIVP, Product Strategy & Marketing
About us
COMPANY PROPRIETARY INFORMATION 4
Protecting critical infrastructure & key resources
Protecting computer networks
Protecting against loss from fraud
Risk planning & allocation of resources
Managing responses during crisis situations
Actionable intelligence solutions include…
Protecting people from natural hazards & human threats (external and insiders)
COMPANY PROPRIETARY INFORMATION 5
We are the de-facto standard for risk management for major national events requiring multi-agency collaboration
We developed the protective intelligence methodology used by the Bill & Melinda Gates Foundation
Used by 15 of the 20 largest urban areas to keep their
citizens & assets safe
Architected, manage & protect some of the most mission critical
networks in the US
We manage the largest enterprise-wide architecture & worldwide deployments of SCCM & SCOM
We deployed the first private cloud with AWS for US Intelligence Community
Trusted by customers nationwide
COMPANY PROPRIETARY INFORMATION 6
Network Management
Network Engineering
Data Center Operations
Enterprise Architecture
Service Desk & VIP Support
Washington Headquarters Services (The Pentagon): Manage & secure data center comprised of over 2000 Servers with over 18,000 users accessing highly classified information.
Brought the Pentagon back online post September 11 attack in less than 24 hours
Secure Enterprise NetworksENGINEERING AND END-TO-END SUPPORT OF MISSION CRITICAL SYSTEMS
COMPANY PROPRIETARY INFORMATION 7
Information assurance
Certification & accreditation
Computer network defense
Vulnerability management &
scanning
Risk analysis & mitigation
Intrusion detection
US Coast Guard: Manage certification & accreditation of networked devices for 44K+ members.
US Army (Information Technology Agency): Manage, monitor & defend networks for personnel worldwide
CybersecurityINTEGRATED COMPLIANCE AND RISK BASED CYBER THREAT MANAGEMENT
COMPANY PROPRIETARY INFORMATION 8
Broader visibility | Reduced Response times| Prioritized resource allocation
Profile overall enterprise threat
and risk
Monitor continuously and broadly against
that profile
Implement collaborative, dynamic situational awareness
Prioritize and route critical
information for action
Public Safety & Enterprise Threat ManagementENABLING RISK INFORMED DECISION MAKING
COMPANY PROPRIETARY INFORMATION 9
Contextual situational awareness anywhere
Swivel-chair situational awareness does not scale
…and one app
Into one screen
Haystax analytics & visualization puts all the information that goes here
Informed Decision Making Needs ContextCONTEXT ENABLES DECISION MAKER TO UNDERSTAND ALL THE DATA
COMPANY PROPRIETARY INFORMATION 10
Suspicious Activity Reports
Physical Assets/CIKR
HR Data
Calls for Service
Network Alerts
Enterprise Communications
Enterprise Data
News & Social Feeds
IngestNatural
Language Processin
g
Geo Location
StoreREST API
Alerts
Web Apps
Mobile
Bayesian Threat Model
Objectivity
Credibility
Impersonal
Specificity
Threat Score
Prioritization Algorithm
Data
Visualizations drive
understanding
Actionable Information is pushed to the edge
Massive scaling in Real Time
Algorithms contextualize and
Prioritize
Contextual Analytic Framework for UnderstandingOPTIMIZES MACHINE AND HUMAN PROCESSING OF DATA
COMPANY PROPRIETARY INFORMATION 11
Powerful native apps with easy self configuration and usability
Reporting, Assessments & Monitoring seamlessly integrated
Secure online/offline data access from anywhere
Decision Makers are Increasingly MobileREQUIRING ACTIONABLE INTELLIGENCE BEYOND OFFICE WALLS
COMPANY PROPRIETARY INFORMATION 12
Monitor categorized & prioritized data feeds from multiple sources
Make predictions based on trends and intensity of data
Use dynamically generated profiles of to discover links & associations
Actionable Intelligence for Analysts MAKING IT EASY TO INTERACT WITH REAL-TIME DATA IN REAL-TIME
COMPANY PROPRIETARY INFORMATION 13
Holistic presentation framework that optimizes based on device, role, location, time, context
Information is prioritized based on relevance to the user
User interface designed to focus user to hot spots and key alerts
Actionable Intelligence for CommandersBY PROVIDING CONTEXTUAL SITUATIONAL AWARENESS WHEREVER THEY ARE
COMPANY PROPRIETARY INFORMATION 14
Application performance optimized for mission critical deployments
Secure cross organization information sharing & collaboration
Unified system of records that can be accessed from anywhere, anytime
Actionable Intelligence For First RespondersBY SEAMLESSLY TYING INFORMATION TO THEIR OPERATIONAL PROCESS
COMPANY PROPRIETARY INFORMATION 15
In the command center Forward deployed Mobile Apps
>25 mile radius monitored
312 events monitored
737 total users
600 real-time data feeds
238 assets protected
345 incidentsmanaged
RESULTS FROM SUPER BOWL XLVIII
Contextual Situational Awareness in ActionINTEGRATING OVER 40 AGENCIES AT THE LAST FIVE SUPER BOWLS
COMPANY PROPRIETARY INFORMATION 16
8 regions analyzing and monitoring with shared best practices
20122010
Analysis of risk to a single jurisdiction by a single agency
California uses the Haystax Public Safety Cloud to connect its 8 MAJOR URBAN AREAS
into a collaborative information sharing network
2011
Regional analysis and monitoring of threats across agencies in a jurisdiction
2014
Statewide collaborative analysis and situational awareness
COMPANY PROPRIETARY INFORMATION 17
Contextual Situational Awareness in ActionCALIFORNIA EMERGENCY OPERATIONS CENTER
Haystax provides the analytic back-bone for total situational awareness
100% cloud based
Integrates hundreds of real time information sources across the state
Information is prioritized and routed automatically to personnel on the ground as needed
Contextual situational awareness on one screen
COMPANY PROPRIETARY INFORMATION 18
School Safety Master Data Management
.
Incident Reporting & Event Tracking
Contextual Monitoring of Threats
& Risks
Launching a Nationwide School Safety CloudPOWERED BY THE SAME ANALYTIC PLATFORM
COMPANY PROPRIETARY INFORMATION 19
Bayesian model designed to solve high noise-to-signal data problems
Automatically aligns alert quality to available investigation resources
Eliminates scaling problems of traditional rules based systems
Insider Threat Analytics for Enterprise SecurityBRUTE FORCE SOLUTIONS WILL NOT WORK – NEEDS A COMPREHENSIVE SYSTEM MODEL
COMPANY PROPRIETARY INFORMATION 20
Background Check
Peers & Family
$Financial Records Public
Records
HR Recor
d
Web and Social Media
+ =
Experts Data
Continuously prioritized risk based ranking
CARBONTM Automated Threat Awareness MATHEMATICAL MODELING OF EXPERTS + RISK RANKING + CONTINOUS EVALUATION
COMPANY PROPRIETARY INFORMATION 21
Automated continuous evaluation and re-prioritization enables sustained success
Can be deployed on top of 3rd party alerting products
CARBONTM Threat Optimization SolutionIT DOES NOT REMOVE ALERTS, JUST TELLS YOU WHICH ARE IMPORTANT AND WHY
COMPANY PROPRIETARY INFORMATION 22
Compare subject to peer groups
and historic changes in risk
profileUp to 10x improvements in investigation productivity
Separates the critical from the mass and lets the analyst know
Full traceability from results to the source data
The CARBONTM Value PropositionSTOP LOOKING AT ALERTS, START ACTING ON THEM BY KNOWING YOUR RISK
COMPANY PROPRIETARY INFORMATION 23
Why Haystax Analytics MatterBRUTE FORCE SECURING AND ALERTING WON’T WORK
No industry is immune, no level of technical sophistication is sufficient
Real-time visibility & control over the entire at risk environment is critical for CSO’s and CIO’s today
All security breaches involve people and people are smarter than rules
COMPANY PROPRIETARY INFORMATION 24
Cloud enable Microsoft to any cloud
90 days, fixed cost none-to-done guarantee
Microsoft Gold Certified Partner
Selected by Microsoft to build their reference Azure package for the US Intel Community
Enabling Enterprise Clouds Without the DramaHAYSTAX CANOPY CLOUD ACCELERATORS ARE THE FASTEST WAY TO A SECURE CLOUD
COMPANY PROPRIETARY INFORMATION 25
Proven “Innovate on Purpose” methodology
Innovation change management consulting
Rapid disruptive innovation workshops
OVO InnovationEXPERT INNOVATION CONSULTING SERVICES TO GOVERNMENT AND INDUSTRY
COMPANY PROPRIETARY INFORMATION 26
Haystax Technology AcceleratorDRIVEN TO INNOVATE AND BRING DISTRUPTIVE PRODUCTS TO MARKET
Developing advanced concepts and next generation solutions to initial pilot
Incubating emerging technologies and entrepreneurial third-party partnerships
Advancing the state-of-the-art through agile, out-of-the-box thinking
COMPANY PROPRIETARY INFORMATION 27
COMPANY PROPRIETARY INFORMATION
Thank You
COMPANY PROPRIETARY INFORMATION
For Additional Information Contact:
@HaystaxTech
(571) 297-3800