For decades, the intelligence community has been collecting and analyzing information to produce timely and actionable insights for intelligence consumers. But as the amount of information collected increases, analysts are facing new challenges in terms of data processing and analysis. In this article, we explore the possibilities that graph technology is offering for intelligence analysis.
Ecommerce fraud is growing quickly, creating new challenges in terms of prevention and detection. As merchants gather more and more information about customers and their behaviors, the key element in the fight against fraud is now to draw on the connections within the data collected to uncover fraudulent behaviors. In this post, we explain why […]
Part of this article was initially published on Neo4j’s blog. Today, Enterprise architects are required to deliver insights quickly and make sense of large amounts of enterprise data (business knowledge, application information, technology assets, etc).
Fighting financial crimes is a daily battle worldwide. Organizations have to deploy intelligent systems to prevent and detect wrongdoings, such as anti-money laundering (AML) control frameworks. We’ll see in this blog post how graph technologies can reinforce those systems. Using graph technologies to fight financial crimes In today’s complex economy, law enforcement and financial organizations fight against […]
The identification and monitoring of terrorist or criminal networks are imperatives to detect threats and defeat attacks. Let’s see how Linkurious and graph visualizations can help identify and track potential dangerous individuals and networks. Challenges for intelligence analysis Criminal or terrorist activities are rarely the acts of isolated individuals. Behind these activities we find more or less […]
In this blog post, we will offer an overview on how to deal with Security information and event management/log management (SIEM/LM) data overflow. Let’s see how Linkurious’ advanced graph visualisation solution helps easily identify and investigate cyber-security threats. Switching to a data lake architecture is often a required first step for analysts who wish to use graph […]