With the aim to monitor, prevent, and predict cyber attacks on various systems and infrastructures, the cyber defence company needed a solution to ingest and connect all available data and discover threat patterns.
Graphs can be truly transformational for law enforcement agencies. Learn how a cutting-edge graph solution removes obstacles from the criminal intelligence process and increases its efficiency.
Dive deeper into Hume Orchestra, our data-driven orchestration tool, with our CTO, Christophe Willemsen.
Graphs are commonplace in investigative, intelligence, and law enforcement work. One of the primary advantages of a graph is to connect data from various data sources, digital and human, and maximize insights across deep and complex networks of connections, bringing them together in fusion centers for a centralized view of suspicious activities. For analysts, data quality and trust is key. The reliability, validity, and general consistency of data sources that contribute to forming real world fused entities is a factor that influences the analysts’ interpretation of events. This session talks about the challenges related to surfacing these aspects of data provenance and various approaches that can be employed to address them using Neo4j. We will touch on graph modeling, implications for data security, and how sources and information ratings can be effectively shared with analysts who need access to them.
Learn how graphs and Hume can help you tackle logistics challenges.
Learn how Hume, graph analytics and machine learning can be powerful tools to help you detect, investigate and prevent money laundering activities.
Fraud is becoming more and more complex. Learn how graphs and Hume can help you fight and detect fraud.
An introduction to Graph-Powered Machine Learning written by our very own Dr. Alessandro Negro. This book is an extraction of 60 combined years of experience in graphs, and explains how graphs and graph databases can serve machine learning projects.
GraphAware and Neo4j experts demonstrate how you can leverage knowledge graphs to help with compliance challenges.
Dr. Miro Marchi and Michal Trnka explore 10 of the most useful graph entity states using Cypher to enrich entities with contextual information enabling powerful interactions.
Christophe Willemsen describes Role Based Access Control (RBAC), intra-cluster encryption and logging in Neo4j.