This profile is not managed yet, if you would like to manage
this profile, please contact us at firstname.lastname@example.org
this profile, please contact us at email@example.com
Number of Case Studies4
UBS Enhances Risk Management and Compliance with Neo4j Data Lineage Tool
UBS, a multinational investment bank and financial services company, was faced with the challenge of complying with regulations put in place to strengthen systems for risk data aggregation and internal risk reporting following the 2007 global financial crisis. Specifically, UBS needed to comply with the Basel Committee on Banking Supervision issued standard 239 (BCBS 239). This regulation required banks to provide transparency into the data flows that feed their risk reporting, necessitating broad data governance and detailed data lineage. Data lineage, which involves tracking the entire lifecycle of information, is a crucial component of risk management. UBS initially built an application called Group Data Dictionary (GDD) as its data lineage and data governance tool on Oracle. However, they soon discovered limitations with an RDBMS approach, which relies on JOINS to connect data across tables. UBS realized it needed a better solution for creating real-time data lineage visualizations and exporting lineage information for ad-hoc analysis via Excel.
Novartis Leverages IoT for Enhanced Drug Discovery
Novartis, a global healthcare company, was faced with the challenge of managing and making sense of a vast amount of data. The company had decades of data on how various compounds affect protein targets, with about a billion data points in total. This historical data was critical but sparse compared to the granular data currently being collected. Novartis uses an automated process that captures high-content image data showing how a particular compound has affected an entire cell culture, generating terabytes of phenotypic data. The challenge was to combine this historical data with the burgeoning phenotypic data and place it within the larger context of ongoing medical research from around the world. The team also wanted to combine its data with medical information from NIH’s PubMed, which contains about 25 million abstracts from some 5,600 scientific journals.
Leveraging Graph Technology for Enhanced Cybersecurity: A Case Study on MITRE's CyGraph
MITRE, a federally-funded, not-for-profit company that manages seven national research and development laboratories in the United States, was grappling with the challenge of managing an influx of cybersecurity data. The constant changes in network environments were impacting the security posture of U.S. government agencies. Intrusion alerts, anti-virus warnings, and seemingly benign events like logins, service connections, and file share access were all potentially associated with adversary activity. The cybersecurity researchers at MITRE needed to go beyond rudimentary assessments of security posture and attack response. This required merging isolated data into higher-level knowledge of network-wide attack vulnerabilities and mission readiness. The challenge was not the lack of information, but the ability to assemble disparate pieces of information into an overall analytic picture for situational awareness, optimal courses of action, and maintaining mission readiness. The team also struggled with fully comprehending a given security environment and mapping all known vulnerabilities.
Number of Similar Suppliers5
Altair is a leading provider of enterprise-class engineering software enabling innovation, reduced development times, and lower costs through the entire product lifecycle from concept design to in-service operation. Our simulation-driven approach to innovation is powered by our integrated suite of software which optimizes design performance across multiple disciplines encompassing structures, motion, fluids, thermal management, electromagnetics, system modeling and embedded systems, while also providing data analytics and true-to-life visualization and rendering.
Opentrends provides the most advanced custom software solutions to place companies in the Digital Transformation path, allowing them to achieve innovation advantage and contribute to their growth acceleration.More than 18 years delivering innovative projects of high technological complexity in a wide range of industries, while guaranteeing quality and alignment with our client’s objectives. In fact, over a hundred global companies across various industries have full Trust in our unique ability to design, build, implement, and integrate complex software innovations into their organizations.Let’s excel your digital future today.
GlobalSign is the leading provider of trusted identity and security solutions enabling businesses, large enterprises, cloud service providers and IoT innovators around the world to secure online communications, manage millions of verified digital identities and automate Authentication and Encryption. Its high-scale PKI and identity and access management (IAM) solutions support the billions of services, devices, people and things comprising the Internet of Everything (IoE). The company has offices in the Americas, Europe and Asia.
HID Global is the trusted source for innovative products, services, solutions, and know-how related to the creation, management, and use of secure identities for millions of customers around the world. The company’s served markets include physical and logical access control, including strong Authentication and credential management; card printing and personalization; visitor management systems; highly secure government and citizen ID; and identification RFID technologies used in animal ID and industry and logistics applications.
Founded in 2001, Keyfactor empowers enterprises of all sizes to escape the exposure epidemic – when breaches, outages and failed audits from digital certificates and keys impact brand loyalty and the bottom line. Powered by an award-winning PKI as-a-service platform for certificate lifecycle automation and IoT device security, IT and infosec teams can easily manage digital certificates and keys. And product teams can build IoT devices with crypto-agility and at massive scale.