SlideShare une entreprise Scribd logo
1  sur  18
CENTRIFUGE SYSTEMS
OVERVIEW
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 1
See Clearly Now
A Powerful, Flexible Lens for Data Discovery
Centrifuge Corporate Overview
 Visual data analysis pioneer since 2007
 Genesis in US National Intelligence Sector
 Funded by Novak Biddle Venture Partners
 Used by thousands of analysts in both public
sector and commercial organizations
 Headquartered in McLean, VA
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 2
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 3
 Social Network Analysis (SNA)
 Sentiment Analysis
 Claims Fraud
 Telephony / Text Messaging
 Gang Activity
 Evidence Discovery Analysis
 Financial Money Laundering
 Serial Crimes
 Cyber & Computer Network Analysis
Analyzing large volumes of diverse data
Targets trying to avoid detection
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved.
Commercial Examples
Problem: Criminal networks arrange procurement of medication through
low-cost government contracts, then sell on open market for high profit.
Problem: Sophisticated fraud rings of patients, providers and pharmacies
conspire to circumvent law . Difficult to detect with via traditional analytics.
Drug Profiteering
Prescription Fraud
4
BIG “Pharma”
Healthcare
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved.
Third Party Recognition
5
Honored as a 2012 FinTech Innovation Lab participant
for Wall Street-focused startup companies
Recently chosen by Gartner as a 2013
“Cool Vendor” for Security Intelligence
Centrifuge Systems
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 6
 Data Remains at the Source
• No need for redundant storage silos or client-side resources
 Client Access via Lightweight Browser
• Browser-based clients promotes both collaboration and security
 Easy and Secure Collaboration
• Collaboration performed at server
• Data does not transfer ownership during analysis
 Modern Server-based Java Architecture
• No feature lock-in, Interact with other best-in-class applications
• Highly scalable with no client-side resource requirements
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 7
No Data Preprocessing or Redundant Data Storage
• Avoid the time & cost of preprocessing / prepositioning target data sets and
the resulting storage management overhead (hardware, security, backup, etc.)
• Data remains on its original server and native format allowing quick access
to newly discovered or updated data;
• Templates can created and saved for ease of future analysis.
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 8
 Client Access through Lightweight Browser
• Browser-based clients can connect from anywhere, promote
ad hoc collaboration
• Client issues eliminated, extreme server scalability
• (RAM, storage, conflicts, etc.)
• No data touches the client, greatly reducing privacy concerns
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 9
 Collaboration constraints removed
• Collaboration occurs on a secure server, NO data touches a client
• Data is not in jeopardy if client is “compromised”
• Collaborators can share data without transfer of ownership, greatly reducing
security and privacy concerns
• Two ways to share
• Static PDF image
• Fully functional Centrifuge Dataview, each collaborator can contribute
Static, or Live
and Interactive
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 10
 Leverage other best-in-class capabilities via standards-based
Java/JavaScript and REST APIs, plus the included Solution Factory
• Early adopter of Ozone Widget Framework (OWF)
• Our focus is visual data analytics, not user lock-in
• We readily interface with best-in-class partners as determined by your needs
Unstructured data
Entity extraction
Fuzzy matching
Web harvesting
Geo-tagging
Statistical Algorithms
NLP
Embedded
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved.
VISUAL DATA ANALYTICS
See Clearly Now May 6, 2013
11
A Powerful Lens for Data Discovery
Noise
Signal
Separate the Signal from the Noise
Copyright 2012 Centrifuge Systems Inc 13
Scenario: Health care insurance provider looking for prescription fraud
Dataset: Claims data relating drug, pharmacy, prescribing doctor and consumer
Initial Graph Using Opacity
Using Size
Applying iterative
filtering
Copyright 2012 Centrifuge Systems Inc
Highlight Paths and Degrees of Separation
14
Scenario: Cyber Security – investigating network traffic and identifying potential threats
Dataset: NetFlow data with originating and destination IP addresses and users/orgs
1. Identify all paths
Visually highlight all paths that connect subjects of interest
2. Identify & isolate path of
interest
3. Iteratively explore suspicious elements
1. Start with suspects 2. Reveal nodes associated
with suspect organizations
3. Reveal where traffic is
being directed
4. Reveal users associated
with suspect traffic (targets)
Copyright 2012 Centrifuge Systems Inc
Choose Link Layouts & Placement
15
Force-Directed
Radial
Circular
Algorithmic layouts allow placement of nodes to be based on different criteria allowing
natural patterns to emerge
Hierarchical
Graphically Select or Filter
Select and filter from one visual to another
Narrow results, highlight subsets
Query Build Out
As “link-ups” are run, the new “associates” are brought into the picture – building out
our relationship graph based on added connections. “Link ups” can be added for as
many associates as desired.
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 18
Contact us for more information
Russ Holmes
Centrifuge Systems, Inc.
7926 Jones Branch Dr., Suite 210
McLean, VA 22102
(571) 830-1300
www.centrifugesystems.com

Contenu connexe

Tendances

HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHxRefactored
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness TestDruva
 
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...Shahid Shah
 
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems DeticaBig data and social media, BAE Systems Detica
Big data and social media, BAE Systems DeticaInternet World
 
Patientory Blockchain Privacy, How is it Achieved?
Patientory Blockchain Privacy, How is it Achieved?Patientory Blockchain Privacy, How is it Achieved?
Patientory Blockchain Privacy, How is it Achieved?Patientory
 
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device PlatformsHow to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device PlatformsShahid Shah
 
The Digital Innovation Award - Healthy Health
The Digital Innovation Award - Healthy HealthThe Digital Innovation Award - Healthy Health
The Digital Innovation Award - Healthy HealthThe Digital Insurer
 
Tear Down Data Silos - CROWN 2019 conference
Tear Down Data Silos - CROWN 2019 conferenceTear Down Data Silos - CROWN 2019 conference
Tear Down Data Silos - CROWN 2019 conferenceSaama
 
Blockchain Applications in Healthcare
Blockchain Applications in HealthcareBlockchain Applications in Healthcare
Blockchain Applications in HealthcareCitiusTech
 
Connected medical devices
Connected medical devicesConnected medical devices
Connected medical devicesShahid Shah
 
SOA enabled next generatione EMR/EHR
SOA enabled next generatione EMR/EHRSOA enabled next generatione EMR/EHR
SOA enabled next generatione EMR/EHRVictor Chai
 
Building a Next Generation Clinical and Scientific Data Management Solution
Building a Next Generation Clinical and Scientific Data Management SolutionBuilding a Next Generation Clinical and Scientific Data Management Solution
Building a Next Generation Clinical and Scientific Data Management SolutionSaama
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalJohn Weiler
 
CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...
CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...
CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...Saama
 
Artificial Intelligence in Life Sciences: Friend or Foe? by Luke Stewart
Artificial Intelligence in Life Sciences: Friend or Foe? by Luke StewartArtificial Intelligence in Life Sciences: Friend or Foe? by Luke Stewart
Artificial Intelligence in Life Sciences: Friend or Foe? by Luke StewartSaama
 
Proper Data Integration can change Medical Science
Proper Data Integration can change Medical ScienceProper Data Integration can change Medical Science
Proper Data Integration can change Medical ScienceShahid Shah
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 

Tendances (20)

HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
 
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems DeticaBig data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
 
Patientory Blockchain Privacy, How is it Achieved?
Patientory Blockchain Privacy, How is it Achieved?Patientory Blockchain Privacy, How is it Achieved?
Patientory Blockchain Privacy, How is it Achieved?
 
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device PlatformsHow to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
 
The Digital Innovation Award - Healthy Health
The Digital Innovation Award - Healthy HealthThe Digital Innovation Award - Healthy Health
The Digital Innovation Award - Healthy Health
 
Pro Emtech - Promed
Pro Emtech - PromedPro Emtech - Promed
Pro Emtech - Promed
 
Tear Down Data Silos - CROWN 2019 conference
Tear Down Data Silos - CROWN 2019 conferenceTear Down Data Silos - CROWN 2019 conference
Tear Down Data Silos - CROWN 2019 conference
 
Blockchain Applications in Healthcare
Blockchain Applications in HealthcareBlockchain Applications in Healthcare
Blockchain Applications in Healthcare
 
Connected medical devices
Connected medical devicesConnected medical devices
Connected medical devices
 
SOA enabled next generatione EMR/EHR
SOA enabled next generatione EMR/EHRSOA enabled next generatione EMR/EHR
SOA enabled next generatione EMR/EHR
 
Building a Next Generation Clinical and Scientific Data Management Solution
Building a Next Generation Clinical and Scientific Data Management SolutionBuilding a Next Generation Clinical and Scientific Data Management Solution
Building a Next Generation Clinical and Scientific Data Management Solution
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_final
 
CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...
CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...
CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...
 
Artificial Intelligence in Life Sciences: Friend or Foe? by Luke Stewart
Artificial Intelligence in Life Sciences: Friend or Foe? by Luke StewartArtificial Intelligence in Life Sciences: Friend or Foe? by Luke Stewart
Artificial Intelligence in Life Sciences: Friend or Foe? by Luke Stewart
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Proper Data Integration can change Medical Science
Proper Data Integration can change Medical ScienceProper Data Integration can change Medical Science
Proper Data Integration can change Medical Science
 
Case Study
Case StudyCase Study
Case Study
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 

Similaire à Centrifuge Systems Overview

From information to intelligence
From information to intelligence From information to intelligence
From information to intelligence Srini Koushik
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataNeo4j
 
Put Alternative Data to Use in Capital Markets

Put Alternative Data to Use in Capital Markets
Put Alternative Data to Use in Capital Markets

Put Alternative Data to Use in Capital Markets
Cloudera, Inc.
 
Data Privacy in the Work From Home Era
Data Privacy in the Work From Home EraData Privacy in the Work From Home Era
Data Privacy in the Work From Home EraNeo4j
 
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin   simplifying big data delivery to drive new insights finalTdwi austin   simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights finalSal Marcus
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital ageAccenture Technology
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix LLC
 
Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...DataWorks Summit
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
Michael Josephs
Michael JosephsMichael Josephs
Michael JosephsdaveGBE
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 
Webinar: Leveraging big data in life sciences & healthcare
Webinar: Leveraging big data in life sciences & healthcareWebinar: Leveraging big data in life sciences & healthcare
Webinar: Leveraging big data in life sciences & healthcareKnowledgent
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceDATAVERSITY
 
GDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationGDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationDenodo
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
Hadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitHadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitDataWorks Summit
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceCloudera, Inc.
 

Similaire à Centrifuge Systems Overview (20)

From information to intelligence
From information to intelligence From information to intelligence
From information to intelligence
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
Put Alternative Data to Use in Capital Markets

Put Alternative Data to Use in Capital Markets
Put Alternative Data to Use in Capital Markets

Put Alternative Data to Use in Capital Markets

 
Data Privacy in the Work From Home Era
Data Privacy in the Work From Home EraData Privacy in the Work From Home Era
Data Privacy in the Work From Home Era
 
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin   simplifying big data delivery to drive new insights finalTdwi austin   simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights final
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
Webinar: Leveraging big data in life sciences & healthcare
Webinar: Leveraging big data in life sciences & healthcareWebinar: Leveraging big data in life sciences & healthcare
Webinar: Leveraging big data in life sciences & healthcare
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data Governance
 
GDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationGDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data Virtualization
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Hadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitHadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business Unit
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 

Dernier

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Centrifuge Systems Overview

  • 1. CENTRIFUGE SYSTEMS OVERVIEW Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 1 See Clearly Now A Powerful, Flexible Lens for Data Discovery
  • 2. Centrifuge Corporate Overview  Visual data analysis pioneer since 2007  Genesis in US National Intelligence Sector  Funded by Novak Biddle Venture Partners  Used by thousands of analysts in both public sector and commercial organizations  Headquartered in McLean, VA Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 2
  • 3. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 3  Social Network Analysis (SNA)  Sentiment Analysis  Claims Fraud  Telephony / Text Messaging  Gang Activity  Evidence Discovery Analysis  Financial Money Laundering  Serial Crimes  Cyber & Computer Network Analysis Analyzing large volumes of diverse data Targets trying to avoid detection
  • 4. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. Commercial Examples Problem: Criminal networks arrange procurement of medication through low-cost government contracts, then sell on open market for high profit. Problem: Sophisticated fraud rings of patients, providers and pharmacies conspire to circumvent law . Difficult to detect with via traditional analytics. Drug Profiteering Prescription Fraud 4 BIG “Pharma” Healthcare
  • 5. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. Third Party Recognition 5 Honored as a 2012 FinTech Innovation Lab participant for Wall Street-focused startup companies Recently chosen by Gartner as a 2013 “Cool Vendor” for Security Intelligence
  • 6. Centrifuge Systems Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 6  Data Remains at the Source • No need for redundant storage silos or client-side resources  Client Access via Lightweight Browser • Browser-based clients promotes both collaboration and security  Easy and Secure Collaboration • Collaboration performed at server • Data does not transfer ownership during analysis  Modern Server-based Java Architecture • No feature lock-in, Interact with other best-in-class applications • Highly scalable with no client-side resource requirements
  • 7. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 7 No Data Preprocessing or Redundant Data Storage • Avoid the time & cost of preprocessing / prepositioning target data sets and the resulting storage management overhead (hardware, security, backup, etc.) • Data remains on its original server and native format allowing quick access to newly discovered or updated data; • Templates can created and saved for ease of future analysis.
  • 8. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 8  Client Access through Lightweight Browser • Browser-based clients can connect from anywhere, promote ad hoc collaboration • Client issues eliminated, extreme server scalability • (RAM, storage, conflicts, etc.) • No data touches the client, greatly reducing privacy concerns
  • 9. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 9  Collaboration constraints removed • Collaboration occurs on a secure server, NO data touches a client • Data is not in jeopardy if client is “compromised” • Collaborators can share data without transfer of ownership, greatly reducing security and privacy concerns • Two ways to share • Static PDF image • Fully functional Centrifuge Dataview, each collaborator can contribute Static, or Live and Interactive
  • 10. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 10  Leverage other best-in-class capabilities via standards-based Java/JavaScript and REST APIs, plus the included Solution Factory • Early adopter of Ozone Widget Framework (OWF) • Our focus is visual data analytics, not user lock-in • We readily interface with best-in-class partners as determined by your needs Unstructured data Entity extraction Fuzzy matching Web harvesting Geo-tagging Statistical Algorithms NLP Embedded
  • 11. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. VISUAL DATA ANALYTICS See Clearly Now May 6, 2013 11 A Powerful Lens for Data Discovery
  • 13. Copyright 2012 Centrifuge Systems Inc 13 Scenario: Health care insurance provider looking for prescription fraud Dataset: Claims data relating drug, pharmacy, prescribing doctor and consumer Initial Graph Using Opacity Using Size Applying iterative filtering
  • 14. Copyright 2012 Centrifuge Systems Inc Highlight Paths and Degrees of Separation 14 Scenario: Cyber Security – investigating network traffic and identifying potential threats Dataset: NetFlow data with originating and destination IP addresses and users/orgs 1. Identify all paths Visually highlight all paths that connect subjects of interest 2. Identify & isolate path of interest 3. Iteratively explore suspicious elements 1. Start with suspects 2. Reveal nodes associated with suspect organizations 3. Reveal where traffic is being directed 4. Reveal users associated with suspect traffic (targets)
  • 15. Copyright 2012 Centrifuge Systems Inc Choose Link Layouts & Placement 15 Force-Directed Radial Circular Algorithmic layouts allow placement of nodes to be based on different criteria allowing natural patterns to emerge Hierarchical
  • 16. Graphically Select or Filter Select and filter from one visual to another Narrow results, highlight subsets
  • 17. Query Build Out As “link-ups” are run, the new “associates” are brought into the picture – building out our relationship graph based on added connections. “Link ups” can be added for as many associates as desired.
  • 18. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 18 Contact us for more information Russ Holmes Centrifuge Systems, Inc. 7926 Jones Branch Dr., Suite 210 McLean, VA 22102 (571) 830-1300 www.centrifugesystems.com

Notes de l'éditeur

  1. Centrifuge beganby addressing the needs of the Intelligence CommunityLarge volumes of seemingly unrelated dataJoin together disparate sources quickly and without regard to the original formatExtreme time sensitivityLooking for activities or relationships that were actively trying to avoid detection
  2. We’ve now been embraced across both national and local governmental organizations, as well as within the commercial sector.
  3. We’ve now been embraced across both national and local governmental organizations, as well as within the commercial sector.
  4. BYOD: Bring Your Own Data
  5. BYOD: Bring Your Own Data
  6. BYOD: Bring Your Own Data
  7. BYOD: Bring Your Own Data
  8. BYOD: Bring Your Own Data
  9. In this simple example of a two-variable relationship graph involving warranty claims data, we display the relationships or connections between customers (green) and warranty claims (blue). As is typically the case, the vast majority of relationships are “normal”, in this case meaning a one-to-one relationship between claims and owners. These types of data connection are often referred to as “noise” in the term “signal to noise ratio”. Most data is pedestrian and useful to an analyst for nothing, other than masking, through layers of “routine activity” noise, those activities that are truly novel.One relationship of interest in this data set is the magnified one in the top left that shows 3 customers, two of which have an unusually large amount of claims associated to them, and who both share a single claim with each other and a third customer. This would certainly warrant closer inspection.
  10. Now we jump to a more complex graph. This is based on a use case for a health insurance company what wanted to analyze the relationship between doctors, pharmacies and consumers to identify anything out of the ordinary – doctor-shopping, excessive prescriptions etc.Size can be used to visually represent the node based on any metric - either native data or derived - Opacity – individual icons for nodes can be brighter or lighter based on any metric – simplest metric to use is the number of neighbors.Also, the entire graph can be adjusted in layers so that either nodes, labels are emphasized.