SlideShare ist ein Scribd-Unternehmen logo
1 von 17
1
UNITED KINGDOM UNITED STATES CANADA DUBAI AUSTRALIA NEW ZEALAND
An overview of Wynyard’s software, platforms and data models
Published by Wynyard NZ
Technology
2
ABOUT WYNYARD
Wynyard Group is a market leader in risk management
and crime-fighting software used in investigations
and intelligence operations by government agencies and
financial organisations.
Wynyard solutions help solve and prevent crime,
defend against advanced persistent cyber-threats and
counter terrorism. Wynyard’s powerful software platform
combines big data, advanced crime analytics and
tradecraft to identify persons of interest, stop offenders
and protect victims.
Wynyard has more than 120,000 users and offices in
the United States, United Kingdom, Canada, United Arab
Emirates, Australia and New Zealand. For more
information, visit wynyardgroup.com
3
4
CRIME SCIENCE RESEARCH INSTITUTE
Wynyard is single-minded about
building powerful tools so clients know
the threats, connect the dots and
uncover the truth.
Our Crime Science Research Institute
brings together the world’s leading:
• Data scientists
• Software engineers
• Industry experts
The focus is on the application of
advanced analytics, data integration
and context-aware visualisation.
We create powerful software tools,
platforms and data models.
5
TASKING
Wynyard’s software has comprehensive tasking and
scheduling capabilities to support business processes.
• Configure specific template-based tasks
• Notifications are automatically generated
• Notifications/alerts sent as email messages
• Link tasks to other entities
• Users absent for a time can redirect tasks
• Task recipients can forward or reject the task
• Task results can incorporate link associations to
other entities
6
SEARCH & QUERY
The Wynyard platform contains a high-performance, full-featured text search engine which supports phrase, wildcard, fuzzy,
proximity and range queries.
ACA responds to queries with a listing of the best matches according to its criteria.
Path Finder queries allow the user to quickly see paths of links between selected entities – helping find common entities.
Paths can be found across all link types to a specified number of degrees of separation.
The Path Explorer tool can be used to explore the possible relationships between entities and define a query for specific link
and entity types.
7
VISUALISATION
Context-aware visualisation displays entities in the
most intuitive way.
Visualisation of entities can be customised and is
colour coded.
Solid or dashed lines indicate known or inferred
relationships.
Entities can be confirmed or reclassified.
Users can reduce the clutter by filtering to examine
the strength of the relationships or by opening up
multiple graphs.
8
TEXT MINING
Text mining obtains valuable insights from large amounts
of unstructured text.
Wynyard’s platform automatically discovers and visualises
information about entities and their relationships.
Several different entity extraction engines, trained on
multiple data sets, produce effective entity extraction
and recognition.
Combined with structured data, this provides a
comprehensive and coherent view of all data.
9
ANOMALY DETECTION
Anomaly detection is the search for entities or events that do not conform to an expected pattern.
Wynyard’s anomaly detection model for dynamic networks quickly highlights entities, relationships and time periods
inconsistent with their usual behaviour.
Visual analysis and investigation allows users to navigate through graphical data representations of anomalous instances
to focus on nodes and edges with higher anomalous scores.
10
RULES ENGINE
Wynyard’s rules and scoring engine allows data to be
monitored in near real time.
The easy-to-use rules engine allows customers to build
their own rules without specialised IT skills.
Users can action or modify the rule templates, combine
rules and set rule parameters and thresholds, with a full
audit trail.
11
PREDICTION
Wynyard’s predictive analytics combines data from a variety
of sources to generate a model of future events.
Variables for the model can be derived from historical data
and will be weighted for testing and machine learning.
Criteria for detecting changes in data can be encoded using
the rules engine.
The model should be able to predict and uncover activity
that is insignificant in isolation but, if undetected,
potentially catastrophic.
Refine and modify the model over time.
New data sources can be incorporated.
12
OPEN SOURCE INTELLIGENCE
Open source intelligence (OSINT) can be used throughout Wynyard’s solutions as a data source for intelligence gathering.
Social media, including news aggregation, have proven to be a useful tool for network analysis and intelligence gathering.
13
XEREM™ DATA MODEL
XEREM™ is a data model that enables specific entities, relationships and events to be defined to meet the requirements of a
particular customer or solution.
Entities represent
real world objects
or concepts
Relationships
represent the
connections or
links between
entities
Events represent
something that
happens at a point in
time and may include
a duration
14
DATA LOAD AND INGESTION
Data from any source that can be provided in text, CSV,
XML or JSON formats can be loaded into ACA.
Data sources can be structured, semi-structured or
unstructured.
Common data types are:
• SMS messages and phone call records
• Financial transaction records
• Geographic location data sets
• Social media
• Documents
• Address records
• Web page content
• Witness reports
• Emails
15
SECURITY
There are three fundamental principles of data management and security:
• Data integrity
• Data availability
• Data confidentiality
The Wynyard platform security model ensures that data is only accessed and manipulated by authorised personnel.
This is achieved by:
• Compartmentalising information behind security layers
• Restricting access to data
• Limiting functionality
• Audit logging
16
RELATED LINKS
https://www.wynyardgroup.com/en/news-events-blog/big-data-analytics/
https://www.wynyardgroup.com/en/news-events-blog/new-zealand-police-join-wynyard%E2%80%99s-crime-science-
research-institute/
https://www.wynyardgroup.com/en/news-events-blog/using-wynyard-advanced-crime-analytics-on-open-source-data/
https://www.wynyardgroup.com/en/news-events-blog/wynyards-aca-software-helps-analysts-to-uncover-hidden-connections/
https://www.wynyardgroup.com/en/news-events-blog/introducing-wynyard-risk-management-9/
CLICK HERE TO RECEIVE MORE INFORMATION ON WYNYARD'S TECHNOLOGY
17

Weitere ähnliche Inhalte

Was ist angesagt?

Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
Introduction to Threat Sharing
Introduction to Threat SharingIntroduction to Threat Sharing
Introduction to Threat SharingDavid Sweigert
 
UserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanUserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanAaron Friedman
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax Technology
 
Intelligence-Driven Security Strategy
Intelligence-Driven Security StrategyIntelligence-Driven Security Strategy
Intelligence-Driven Security StrategyEMC
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax Technology
 
Companies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsCompanies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsJohn Davis
 
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...Black Duck by Synopsys
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, securityRoman Chanclor
 
NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức
NETWORK SECURITY  MONITORING WITH BIG  DATA ANALYTICS - Nguyễn Minh ĐứcNETWORK SECURITY  MONITORING WITH BIG  DATA ANALYTICS - Nguyễn Minh Đức
NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh ĐứcSecurity Bootcamp
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionMohit Pandey
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Stefaan Van daele
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Knowjxyz
 
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Ulf Mattsson
 
UBA 5.0 Data Sheet (September 2016)
UBA 5.0 Data Sheet (September 2016)UBA 5.0 Data Sheet (September 2016)
UBA 5.0 Data Sheet (September 2016)Samantha Pierre
 
Novetta Entity Analytics
Novetta Entity AnalyticsNovetta Entity Analytics
Novetta Entity AnalyticsNovetta
 
Still thinking your Ex(cel)? Here are some TIPs - SANS CTI Summit 2021
Still thinking your Ex(cel)? Here are some TIPs - SANS CTI Summit 2021Still thinking your Ex(cel)? Here are some TIPs - SANS CTI Summit 2021
Still thinking your Ex(cel)? Here are some TIPs - SANS CTI Summit 2021Andreas Sfakianakis
 

Was ist angesagt? (20)

Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Introduction to Threat Sharing
Introduction to Threat SharingIntroduction to Threat Sharing
Introduction to Threat Sharing
 
UserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanUserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedman
 
Your organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and securityYour organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and security
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network Services
 
Intelligence-Driven Security Strategy
Intelligence-Driven Security StrategyIntelligence-Driven Security Strategy
Intelligence-Driven Security Strategy
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence Platform
 
Companies warned over new nsa malware allegations
Companies warned over new nsa malware allegationsCompanies warned over new nsa malware allegations
Companies warned over new nsa malware allegations
 
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
 
Haystax Technology - About Us
Haystax Technology - About UsHaystax Technology - About Us
Haystax Technology - About Us
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, security
 
NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức
NETWORK SECURITY  MONITORING WITH BIG  DATA ANALYTICS - Nguyễn Minh ĐứcNETWORK SECURITY  MONITORING WITH BIG  DATA ANALYTICS - Nguyễn Minh Đức
NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
 
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
 
UBA 5.0 Data Sheet (September 2016)
UBA 5.0 Data Sheet (September 2016)UBA 5.0 Data Sheet (September 2016)
UBA 5.0 Data Sheet (September 2016)
 
Novetta Entity Analytics
Novetta Entity AnalyticsNovetta Entity Analytics
Novetta Entity Analytics
 
Still thinking your Ex(cel)? Here are some TIPs - SANS CTI Summit 2021
Still thinking your Ex(cel)? Here are some TIPs - SANS CTI Summit 2021Still thinking your Ex(cel)? Here are some TIPs - SANS CTI Summit 2021
Still thinking your Ex(cel)? Here are some TIPs - SANS CTI Summit 2021
 

Ähnlich wie Wynyard Group -Technology modules

Sqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl
 
Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios ijcsa
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementLinkurious
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureYehuda Korotkin
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wpCMR WORLD TECH
 
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)Gianluca Tarasconi
 
7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure SentinelMighty Guides, Inc.
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center- Mark - Fullbright
 
User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 
Device discovery for vulnerability assessment: Automating the Handoff
Device discovery for vulnerability assessment: Automating the HandoffDevice discovery for vulnerability assessment: Automating the Handoff
Device discovery for vulnerability assessment: Automating the Handoffnathan-axonius
 
WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)rich_webshield
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessmentijtsrd
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...ijtsrd
 

Ähnlich wie Wynyard Group -Technology modules (20)

Sqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, Analyze
 
Sqrrl
SqrrlSqrrl
Sqrrl
 
Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle Management
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-Brochure
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Lookingglass whitepaper
Lookingglass whitepaperLookingglass whitepaper
Lookingglass whitepaper
 
Matrix Mapper
Matrix MapperMatrix Mapper
Matrix Mapper
 
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)
Of Unicorns, Yetis, and Error-Free Datasets (or what is data quality?)
 
7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center
 
User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network Security
 
Device discovery for vulnerability assessment: Automating the Handoff
Device discovery for vulnerability assessment: Automating the HandoffDevice discovery for vulnerability assessment: Automating the Handoff
Device discovery for vulnerability assessment: Automating the Handoff
 
WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)
 
C3602021025
C3602021025C3602021025
C3602021025
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
 
17
1717
17
 
Big Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictionsBig Data: 8 facts and 8 fictions
Big Data: 8 facts and 8 fictions
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
 

Mehr von Wynyard Group

Wynyard 2014-results-presentationpptx
Wynyard 2014-results-presentationpptxWynyard 2014-results-presentationpptx
Wynyard 2014-results-presentationpptxWynyard Group
 
Slideshare Wynyard story in icons
Slideshare Wynyard story in iconsSlideshare Wynyard story in icons
Slideshare Wynyard story in iconsWynyard Group
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsWynyard Group
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015Wynyard Group
 
Wynyard Group Annual General Meeting 2014
Wynyard Group Annual General Meeting 2014Wynyard Group Annual General Meeting 2014
Wynyard Group Annual General Meeting 2014Wynyard Group
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudWynyard Group
 
Felony Lane Gang Problem
Felony Lane Gang ProblemFelony Lane Gang Problem
Felony Lane Gang ProblemWynyard Group
 

Mehr von Wynyard Group (7)

Wynyard 2014-results-presentationpptx
Wynyard 2014-results-presentationpptxWynyard 2014-results-presentationpptx
Wynyard 2014-results-presentationpptx
 
Slideshare Wynyard story in icons
Slideshare Wynyard story in iconsSlideshare Wynyard story in icons
Slideshare Wynyard story in icons
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015
 
Wynyard Group Annual General Meeting 2014
Wynyard Group Annual General Meeting 2014Wynyard Group Annual General Meeting 2014
Wynyard Group Annual General Meeting 2014
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
 
Felony Lane Gang Problem
Felony Lane Gang ProblemFelony Lane Gang Problem
Felony Lane Gang Problem
 

Kürzlich hochgeladen

modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxaleedritatuxx
 
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelDecoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelBoston Institute of Analytics
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxSimranPal17
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataTecnoIncentive
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Cathrine Wilhelmsen
 
Rithik Kumar Singh codealpha pythohn.pdf
Rithik Kumar Singh codealpha pythohn.pdfRithik Kumar Singh codealpha pythohn.pdf
Rithik Kumar Singh codealpha pythohn.pdfrahulyadav957181
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxTasha Penwell
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfblazblazml
 
Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data VisualizationKianJazayeri1
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024Susanna-Assunta Sansone
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxMike Bennett
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaManalVerma4
 

Kürzlich hochgeladen (20)

modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
 
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelDecoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptx
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)
 
Rithik Kumar Singh codealpha pythohn.pdf
Rithik Kumar Singh codealpha pythohn.pdfRithik Kumar Singh codealpha pythohn.pdf
Rithik Kumar Singh codealpha pythohn.pdf
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
 
Principles and Practices of Data Visualization
Principles and Practices of Data VisualizationPrinciples and Practices of Data Visualization
Principles and Practices of Data Visualization
 
Insurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis ProjectInsurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis Project
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptx
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in India
 

Wynyard Group -Technology modules

  • 1. 1 UNITED KINGDOM UNITED STATES CANADA DUBAI AUSTRALIA NEW ZEALAND An overview of Wynyard’s software, platforms and data models Published by Wynyard NZ Technology
  • 2. 2 ABOUT WYNYARD Wynyard Group is a market leader in risk management and crime-fighting software used in investigations and intelligence operations by government agencies and financial organisations. Wynyard solutions help solve and prevent crime, defend against advanced persistent cyber-threats and counter terrorism. Wynyard’s powerful software platform combines big data, advanced crime analytics and tradecraft to identify persons of interest, stop offenders and protect victims. Wynyard has more than 120,000 users and offices in the United States, United Kingdom, Canada, United Arab Emirates, Australia and New Zealand. For more information, visit wynyardgroup.com
  • 3. 3
  • 4. 4 CRIME SCIENCE RESEARCH INSTITUTE Wynyard is single-minded about building powerful tools so clients know the threats, connect the dots and uncover the truth. Our Crime Science Research Institute brings together the world’s leading: • Data scientists • Software engineers • Industry experts The focus is on the application of advanced analytics, data integration and context-aware visualisation. We create powerful software tools, platforms and data models.
  • 5. 5 TASKING Wynyard’s software has comprehensive tasking and scheduling capabilities to support business processes. • Configure specific template-based tasks • Notifications are automatically generated • Notifications/alerts sent as email messages • Link tasks to other entities • Users absent for a time can redirect tasks • Task recipients can forward or reject the task • Task results can incorporate link associations to other entities
  • 6. 6 SEARCH & QUERY The Wynyard platform contains a high-performance, full-featured text search engine which supports phrase, wildcard, fuzzy, proximity and range queries. ACA responds to queries with a listing of the best matches according to its criteria. Path Finder queries allow the user to quickly see paths of links between selected entities – helping find common entities. Paths can be found across all link types to a specified number of degrees of separation. The Path Explorer tool can be used to explore the possible relationships between entities and define a query for specific link and entity types.
  • 7. 7 VISUALISATION Context-aware visualisation displays entities in the most intuitive way. Visualisation of entities can be customised and is colour coded. Solid or dashed lines indicate known or inferred relationships. Entities can be confirmed or reclassified. Users can reduce the clutter by filtering to examine the strength of the relationships or by opening up multiple graphs.
  • 8. 8 TEXT MINING Text mining obtains valuable insights from large amounts of unstructured text. Wynyard’s platform automatically discovers and visualises information about entities and their relationships. Several different entity extraction engines, trained on multiple data sets, produce effective entity extraction and recognition. Combined with structured data, this provides a comprehensive and coherent view of all data.
  • 9. 9 ANOMALY DETECTION Anomaly detection is the search for entities or events that do not conform to an expected pattern. Wynyard’s anomaly detection model for dynamic networks quickly highlights entities, relationships and time periods inconsistent with their usual behaviour. Visual analysis and investigation allows users to navigate through graphical data representations of anomalous instances to focus on nodes and edges with higher anomalous scores.
  • 10. 10 RULES ENGINE Wynyard’s rules and scoring engine allows data to be monitored in near real time. The easy-to-use rules engine allows customers to build their own rules without specialised IT skills. Users can action or modify the rule templates, combine rules and set rule parameters and thresholds, with a full audit trail.
  • 11. 11 PREDICTION Wynyard’s predictive analytics combines data from a variety of sources to generate a model of future events. Variables for the model can be derived from historical data and will be weighted for testing and machine learning. Criteria for detecting changes in data can be encoded using the rules engine. The model should be able to predict and uncover activity that is insignificant in isolation but, if undetected, potentially catastrophic. Refine and modify the model over time. New data sources can be incorporated.
  • 12. 12 OPEN SOURCE INTELLIGENCE Open source intelligence (OSINT) can be used throughout Wynyard’s solutions as a data source for intelligence gathering. Social media, including news aggregation, have proven to be a useful tool for network analysis and intelligence gathering.
  • 13. 13 XEREM™ DATA MODEL XEREM™ is a data model that enables specific entities, relationships and events to be defined to meet the requirements of a particular customer or solution. Entities represent real world objects or concepts Relationships represent the connections or links between entities Events represent something that happens at a point in time and may include a duration
  • 14. 14 DATA LOAD AND INGESTION Data from any source that can be provided in text, CSV, XML or JSON formats can be loaded into ACA. Data sources can be structured, semi-structured or unstructured. Common data types are: • SMS messages and phone call records • Financial transaction records • Geographic location data sets • Social media • Documents • Address records • Web page content • Witness reports • Emails
  • 15. 15 SECURITY There are three fundamental principles of data management and security: • Data integrity • Data availability • Data confidentiality The Wynyard platform security model ensures that data is only accessed and manipulated by authorised personnel. This is achieved by: • Compartmentalising information behind security layers • Restricting access to data • Limiting functionality • Audit logging
  • 17. 17