SlideShare uma empresa Scribd logo
1 de 18
CENTRIFUGE SYSTEMS
OVERVIEW
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 1
See Clearly Now
A Powerful, Flexible Lens for Data Discovery
Centrifuge Corporate Overview
 Visual data analysis pioneer since 2007
 Genesis in US National Intelligence Sector
 Funded by Novak Biddle Venture Partners
 Used by thousands of analysts in both public
sector and commercial organizations
 Headquartered in McLean, VA
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 2
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 3
 Social Network Analysis (SNA)
 Sentiment Analysis
 Claims Fraud
 Telephony / Text Messaging
 Gang Activity
 Evidence Discovery Analysis
 Financial Money Laundering
 Serial Crimes
 Cyber & Computer Network Analysis
Analyzing large volumes of diverse data
Targets trying to avoid detection
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved.
Commercial Examples
Problem: Criminal networks arrange procurement of medication through
low-cost government contracts, then sell on open market for high profit.
Problem: Sophisticated fraud rings of patients, providers and pharmacies
conspire to circumvent law . Difficult to detect with via traditional analytics.
Drug Profiteering
Prescription Fraud
4
BIG “Pharma”
Healthcare
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved.
Third Party Recognition
5
Honored as a 2012 FinTech Innovation Lab participant
for Wall Street-focused startup companies
Recently chosen by Gartner as a 2013
“Cool Vendor” for Security Intelligence
Centrifuge Systems
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 6
 Data Remains at the Source
• No need for redundant storage silos or client-side resources
 Client Access via Lightweight Browser
• Browser-based clients promotes both collaboration and security
 Easy and Secure Collaboration
• Collaboration performed at server
• Data does not transfer ownership during analysis
 Modern Server-based Java Architecture
• No feature lock-in, Interact with other best-in-class applications
• Highly scalable with no client-side resource requirements
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 7
No Data Preprocessing or Redundant Data Storage
• Avoid the time & cost of preprocessing / prepositioning target data sets and
the resulting storage management overhead (hardware, security, backup, etc.)
• Data remains on its original server and native format allowing quick access
to newly discovered or updated data;
• Templates can created and saved for ease of future analysis.
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 8
 Client Access through Lightweight Browser
• Browser-based clients can connect from anywhere, promote
ad hoc collaboration
• Client issues eliminated, extreme server scalability
• (RAM, storage, conflicts, etc.)
• No data touches the client, greatly reducing privacy concerns
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 9
 Collaboration constraints removed
• Collaboration occurs on a secure server, NO data touches a client
• Data is not in jeopardy if client is “compromised”
• Collaborators can share data without transfer of ownership, greatly reducing
security and privacy concerns
• Two ways to share
• Static PDF image
• Fully functional Centrifuge Dataview, each collaborator can contribute
Static, or Live
and Interactive
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 10
 Leverage other best-in-class capabilities via standards-based
Java/JavaScript and REST APIs, plus the included Solution Factory
• Early adopter of Ozone Widget Framework (OWF)
• Our focus is visual data analytics, not user lock-in
• We readily interface with best-in-class partners as determined by your needs
Unstructured data
Entity extraction
Fuzzy matching
Web harvesting
Geo-tagging
Statistical Algorithms
NLP
Embedded
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved.
VISUAL DATA ANALYTICS
See Clearly Now May 6, 2013
11
A Powerful Lens for Data Discovery
Noise
Signal
Separate the Signal from the Noise
Copyright 2012 Centrifuge Systems Inc 13
Scenario: Health care insurance provider looking for prescription fraud
Dataset: Claims data relating drug, pharmacy, prescribing doctor and consumer
Initial Graph Using Opacity
Using Size
Applying iterative
filtering
Copyright 2012 Centrifuge Systems Inc
Highlight Paths and Degrees of Separation
14
Scenario: Cyber Security – investigating network traffic and identifying potential threats
Dataset: NetFlow data with originating and destination IP addresses and users/orgs
1. Identify all paths
Visually highlight all paths that connect subjects of interest
2. Identify & isolate path of
interest
3. Iteratively explore suspicious elements
1. Start with suspects 2. Reveal nodes associated
with suspect organizations
3. Reveal where traffic is
being directed
4. Reveal users associated
with suspect traffic (targets)
Copyright 2012 Centrifuge Systems Inc
Choose Link Layouts & Placement
15
Force-Directed
Radial
Circular
Algorithmic layouts allow placement of nodes to be based on different criteria allowing
natural patterns to emerge
Hierarchical
Graphically Select or Filter
Select and filter from one visual to another
Narrow results, highlight subsets
Query Build Out
As “link-ups” are run, the new “associates” are brought into the picture – building out
our relationship graph based on added connections. “Link ups” can be added for as
many associates as desired.
Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 18
Contact us for more information
Russ Holmes
Centrifuge Systems, Inc.
7926 Jones Branch Dr., Suite 210
McLean, VA 22102
(571) 830-1300
www.centrifugesystems.com

Mais conteúdo relacionado

Mais procurados

HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHxRefactored
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness TestDruva
 
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...Shahid Shah
 
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems DeticaBig data and social media, BAE Systems Detica
Big data and social media, BAE Systems DeticaInternet World
 
Patientory Blockchain Privacy, How is it Achieved?
Patientory Blockchain Privacy, How is it Achieved?Patientory Blockchain Privacy, How is it Achieved?
Patientory Blockchain Privacy, How is it Achieved?Patientory
 
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device PlatformsHow to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device PlatformsShahid Shah
 
The Digital Innovation Award - Healthy Health
The Digital Innovation Award - Healthy HealthThe Digital Innovation Award - Healthy Health
The Digital Innovation Award - Healthy HealthThe Digital Insurer
 
Tear Down Data Silos - CROWN 2019 conference
Tear Down Data Silos - CROWN 2019 conferenceTear Down Data Silos - CROWN 2019 conference
Tear Down Data Silos - CROWN 2019 conferenceSaama
 
Blockchain Applications in Healthcare
Blockchain Applications in HealthcareBlockchain Applications in Healthcare
Blockchain Applications in HealthcareCitiusTech
 
Connected medical devices
Connected medical devicesConnected medical devices
Connected medical devicesShahid Shah
 
SOA enabled next generatione EMR/EHR
SOA enabled next generatione EMR/EHRSOA enabled next generatione EMR/EHR
SOA enabled next generatione EMR/EHRVictor Chai
 
Building a Next Generation Clinical and Scientific Data Management Solution
Building a Next Generation Clinical and Scientific Data Management SolutionBuilding a Next Generation Clinical and Scientific Data Management Solution
Building a Next Generation Clinical and Scientific Data Management SolutionSaama
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalJohn Weiler
 
CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...
CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...
CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...Saama
 
Artificial Intelligence in Life Sciences: Friend or Foe? by Luke Stewart
Artificial Intelligence in Life Sciences: Friend or Foe? by Luke StewartArtificial Intelligence in Life Sciences: Friend or Foe? by Luke Stewart
Artificial Intelligence in Life Sciences: Friend or Foe? by Luke StewartSaama
 
Proper Data Integration can change Medical Science
Proper Data Integration can change Medical ScienceProper Data Integration can change Medical Science
Proper Data Integration can change Medical ScienceShahid Shah
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 

Mais procurados (20)

HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
OSEHRA Summit 2012 Lunch Keynote: Current health IT systems integrate poorly ...
 
Big data and social media, BAE Systems Detica
Big data and social media, BAE Systems DeticaBig data and social media, BAE Systems Detica
Big data and social media, BAE Systems Detica
 
Patientory Blockchain Privacy, How is it Achieved?
Patientory Blockchain Privacy, How is it Achieved?Patientory Blockchain Privacy, How is it Achieved?
Patientory Blockchain Privacy, How is it Achieved?
 
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device PlatformsHow to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
 
The Digital Innovation Award - Healthy Health
The Digital Innovation Award - Healthy HealthThe Digital Innovation Award - Healthy Health
The Digital Innovation Award - Healthy Health
 
Pro Emtech - Promed
Pro Emtech - PromedPro Emtech - Promed
Pro Emtech - Promed
 
Tear Down Data Silos - CROWN 2019 conference
Tear Down Data Silos - CROWN 2019 conferenceTear Down Data Silos - CROWN 2019 conference
Tear Down Data Silos - CROWN 2019 conference
 
Blockchain Applications in Healthcare
Blockchain Applications in HealthcareBlockchain Applications in Healthcare
Blockchain Applications in Healthcare
 
Connected medical devices
Connected medical devicesConnected medical devices
Connected medical devices
 
SOA enabled next generatione EMR/EHR
SOA enabled next generatione EMR/EHRSOA enabled next generatione EMR/EHR
SOA enabled next generatione EMR/EHR
 
Building a Next Generation Clinical and Scientific Data Management Solution
Building a Next Generation Clinical and Scientific Data Management SolutionBuilding a Next Generation Clinical and Scientific Data Management Solution
Building a Next Generation Clinical and Scientific Data Management Solution
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_final
 
CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...
CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...
CBI Gain Cross-Industry Insights to Uncover Improvements and Optimize Trial P...
 
Artificial Intelligence in Life Sciences: Friend or Foe? by Luke Stewart
Artificial Intelligence in Life Sciences: Friend or Foe? by Luke StewartArtificial Intelligence in Life Sciences: Friend or Foe? by Luke Stewart
Artificial Intelligence in Life Sciences: Friend or Foe? by Luke Stewart
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Proper Data Integration can change Medical Science
Proper Data Integration can change Medical ScienceProper Data Integration can change Medical Science
Proper Data Integration can change Medical Science
 
Case Study
Case StudyCase Study
Case Study
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 

Semelhante a Centrifuge Systems Overview

From information to intelligence
From information to intelligence From information to intelligence
From information to intelligence Srini Koushik
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataNeo4j
 
Put Alternative Data to Use in Capital Markets

Put Alternative Data to Use in Capital Markets
Put Alternative Data to Use in Capital Markets

Put Alternative Data to Use in Capital Markets
Cloudera, Inc.
 
Data Privacy in the Work From Home Era
Data Privacy in the Work From Home EraData Privacy in the Work From Home Era
Data Privacy in the Work From Home EraNeo4j
 
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin   simplifying big data delivery to drive new insights finalTdwi austin   simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights finalSal Marcus
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital ageAccenture Technology
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix LLC
 
Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...DataWorks Summit
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
Michael Josephs
Michael JosephsMichael Josephs
Michael JosephsdaveGBE
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 
Webinar: Leveraging big data in life sciences & healthcare
Webinar: Leveraging big data in life sciences & healthcareWebinar: Leveraging big data in life sciences & healthcare
Webinar: Leveraging big data in life sciences & healthcareKnowledgent
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceDATAVERSITY
 
GDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationGDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationDenodo
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
Hadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitHadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitDataWorks Summit
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceCloudera, Inc.
 

Semelhante a Centrifuge Systems Overview (20)

From information to intelligence
From information to intelligence From information to intelligence
From information to intelligence
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
Put Alternative Data to Use in Capital Markets

Put Alternative Data to Use in Capital Markets
Put Alternative Data to Use in Capital Markets

Put Alternative Data to Use in Capital Markets

 
Data Privacy in the Work From Home Era
Data Privacy in the Work From Home EraData Privacy in the Work From Home Era
Data Privacy in the Work From Home Era
 
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin   simplifying big data delivery to drive new insights finalTdwi austin   simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights final
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
Webinar: Leveraging big data in life sciences & healthcare
Webinar: Leveraging big data in life sciences & healthcareWebinar: Leveraging big data in life sciences & healthcare
Webinar: Leveraging big data in life sciences & healthcare
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data Governance
 
GDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationGDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data Virtualization
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Hadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitHadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business Unit
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Centrifuge Systems Overview

  • 1. CENTRIFUGE SYSTEMS OVERVIEW Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 1 See Clearly Now A Powerful, Flexible Lens for Data Discovery
  • 2. Centrifuge Corporate Overview  Visual data analysis pioneer since 2007  Genesis in US National Intelligence Sector  Funded by Novak Biddle Venture Partners  Used by thousands of analysts in both public sector and commercial organizations  Headquartered in McLean, VA Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 2
  • 3. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 3  Social Network Analysis (SNA)  Sentiment Analysis  Claims Fraud  Telephony / Text Messaging  Gang Activity  Evidence Discovery Analysis  Financial Money Laundering  Serial Crimes  Cyber & Computer Network Analysis Analyzing large volumes of diverse data Targets trying to avoid detection
  • 4. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. Commercial Examples Problem: Criminal networks arrange procurement of medication through low-cost government contracts, then sell on open market for high profit. Problem: Sophisticated fraud rings of patients, providers and pharmacies conspire to circumvent law . Difficult to detect with via traditional analytics. Drug Profiteering Prescription Fraud 4 BIG “Pharma” Healthcare
  • 5. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. Third Party Recognition 5 Honored as a 2012 FinTech Innovation Lab participant for Wall Street-focused startup companies Recently chosen by Gartner as a 2013 “Cool Vendor” for Security Intelligence
  • 6. Centrifuge Systems Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 6  Data Remains at the Source • No need for redundant storage silos or client-side resources  Client Access via Lightweight Browser • Browser-based clients promotes both collaboration and security  Easy and Secure Collaboration • Collaboration performed at server • Data does not transfer ownership during analysis  Modern Server-based Java Architecture • No feature lock-in, Interact with other best-in-class applications • Highly scalable with no client-side resource requirements
  • 7. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 7 No Data Preprocessing or Redundant Data Storage • Avoid the time & cost of preprocessing / prepositioning target data sets and the resulting storage management overhead (hardware, security, backup, etc.) • Data remains on its original server and native format allowing quick access to newly discovered or updated data; • Templates can created and saved for ease of future analysis.
  • 8. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 8  Client Access through Lightweight Browser • Browser-based clients can connect from anywhere, promote ad hoc collaboration • Client issues eliminated, extreme server scalability • (RAM, storage, conflicts, etc.) • No data touches the client, greatly reducing privacy concerns
  • 9. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 9  Collaboration constraints removed • Collaboration occurs on a secure server, NO data touches a client • Data is not in jeopardy if client is “compromised” • Collaborators can share data without transfer of ownership, greatly reducing security and privacy concerns • Two ways to share • Static PDF image • Fully functional Centrifuge Dataview, each collaborator can contribute Static, or Live and Interactive
  • 10. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 10  Leverage other best-in-class capabilities via standards-based Java/JavaScript and REST APIs, plus the included Solution Factory • Early adopter of Ozone Widget Framework (OWF) • Our focus is visual data analytics, not user lock-in • We readily interface with best-in-class partners as determined by your needs Unstructured data Entity extraction Fuzzy matching Web harvesting Geo-tagging Statistical Algorithms NLP Embedded
  • 11. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. VISUAL DATA ANALYTICS See Clearly Now May 6, 2013 11 A Powerful Lens for Data Discovery
  • 13. Copyright 2012 Centrifuge Systems Inc 13 Scenario: Health care insurance provider looking for prescription fraud Dataset: Claims data relating drug, pharmacy, prescribing doctor and consumer Initial Graph Using Opacity Using Size Applying iterative filtering
  • 14. Copyright 2012 Centrifuge Systems Inc Highlight Paths and Degrees of Separation 14 Scenario: Cyber Security – investigating network traffic and identifying potential threats Dataset: NetFlow data with originating and destination IP addresses and users/orgs 1. Identify all paths Visually highlight all paths that connect subjects of interest 2. Identify & isolate path of interest 3. Iteratively explore suspicious elements 1. Start with suspects 2. Reveal nodes associated with suspect organizations 3. Reveal where traffic is being directed 4. Reveal users associated with suspect traffic (targets)
  • 15. Copyright 2012 Centrifuge Systems Inc Choose Link Layouts & Placement 15 Force-Directed Radial Circular Algorithmic layouts allow placement of nodes to be based on different criteria allowing natural patterns to emerge Hierarchical
  • 16. Graphically Select or Filter Select and filter from one visual to another Narrow results, highlight subsets
  • 17. Query Build Out As “link-ups” are run, the new “associates” are brought into the picture – building out our relationship graph based on added connections. “Link ups” can be added for as many associates as desired.
  • 18. Copyright 2012 Centrifuge Systems, Inc. All Rights reserved. 18 Contact us for more information Russ Holmes Centrifuge Systems, Inc. 7926 Jones Branch Dr., Suite 210 McLean, VA 22102 (571) 830-1300 www.centrifugesystems.com

Notas do Editor

  1. Centrifuge beganby addressing the needs of the Intelligence CommunityLarge volumes of seemingly unrelated dataJoin together disparate sources quickly and without regard to the original formatExtreme time sensitivityLooking for activities or relationships that were actively trying to avoid detection
  2. We’ve now been embraced across both national and local governmental organizations, as well as within the commercial sector.
  3. We’ve now been embraced across both national and local governmental organizations, as well as within the commercial sector.
  4. BYOD: Bring Your Own Data
  5. BYOD: Bring Your Own Data
  6. BYOD: Bring Your Own Data
  7. BYOD: Bring Your Own Data
  8. BYOD: Bring Your Own Data
  9. In this simple example of a two-variable relationship graph involving warranty claims data, we display the relationships or connections between customers (green) and warranty claims (blue). As is typically the case, the vast majority of relationships are “normal”, in this case meaning a one-to-one relationship between claims and owners. These types of data connection are often referred to as “noise” in the term “signal to noise ratio”. Most data is pedestrian and useful to an analyst for nothing, other than masking, through layers of “routine activity” noise, those activities that are truly novel.One relationship of interest in this data set is the magnified one in the top left that shows 3 customers, two of which have an unusually large amount of claims associated to them, and who both share a single claim with each other and a third customer. This would certainly warrant closer inspection.
  10. Now we jump to a more complex graph. This is based on a use case for a health insurance company what wanted to analyze the relationship between doctors, pharmacies and consumers to identify anything out of the ordinary – doctor-shopping, excessive prescriptions etc.Size can be used to visually represent the node based on any metric - either native data or derived - Opacity – individual icons for nodes can be brighter or lighter based on any metric – simplest metric to use is the number of neighbors.Also, the entire graph can be adjusted in layers so that either nodes, labels are emphasized.