Part of this article was initially published on Neo4j’s blog. Today, Enterprise architects are required to deliver insights quickly and make sense of large amounts of enterprise data (business knowledge, application information, technology assets, etc).
Fighting financial crimes is a daily battle worldwide. Organizations have to deploy intelligent systems to prevent and detect wrongdoings, such as anti-money laundering (AML) control frameworks. We’ll see in this blog post how graph technologies can reinforce those systems. Using graph technologies to fight financial crimes In today’s complex economy, law enforcement and financial organizations fight against […]
The identification and monitoring of terrorist or criminal networks are imperatives to detect threats and defeat attacks. Let’s see how Linkurious and graph visualizations can help identify and track potential dangerous individuals and networks. Challenges for intelligence analysis Criminal or terrorist activities are rarely the acts of isolated individuals. Behind these activities we find more or less […]
In this blog post, we will offer an overview on how to deal with Security information and event management/log management (SIEM/LM) data overflow. Let’s see how Linkurious’ advanced graph visualisation solution helps easily identify and investigate cyber-security threats. Switching to a data lake architecture is often a required first step for analysts who wish to use graph […]
In fraud and white collar crimes, forensic investigators often have to go through massive amounts of complex connected data to gather proofs and evidence for their cases. In the recent years, the development of graph databases and data visualization tools have made it much easier to quickly find information that would have taken days to […]
In the US alone, insurance fraud cost companies around 80 billion dollars each year. Being able to detect fraud schemes before the fraudsters have been able to access the funds they’re trying to steal is a major advantage for insurance companies and their customers. Nevertheless, the detection and investigation processes remain difficult for these institutions. […]