SlideShare a Scribd company logo
1 of 2
Download to read offline
Strategic Actionable Intelligence Platform
SAIP
SAIP for Intelligence Agencies
More than ever, organizations require a comprehensive suite of powerful tools for analyzing information,
identifying patterns, and facilitating effective action. The Mer Group Security Division dedicated team of
intelligence technology experts who thoroughly understand the nature, constraint’s and implications of
intelligence work, has developed SAIP - an innovative platform for accelerating intelligence work. SAIP
collects data from multiple and diverse sources and enriches them with real-world information, tracing
the hidden connections between seemingly unrelated events, and disseminates actionable intelligence
to authorized stakeholders.
Big Data Analytics for Intelligence Agencies
Mer Group Security Division’s SAIP (Big data Analytics system) is a comprehensive platform that
transforms Big Data into usable, real-time and actionable intelligence. SAIP prioritizes information as
it comes through, enabling your organization to proactively take measures to cope with threats before
they materialize.
SAIP enables governments and enterprises to combine and correlate external and internal information,
structured or unstructured, and apply advanced analytics to big data sets in order to identify security
events and get the bigger picture of existing threats.
COLLECTION
DATA ACQUISTION
FUSION
AUTO PROCESSES
CDRs
Emails
Messaging
Travels
Financial
DATA FEEDS
Social Networks
Deep Web
Dark Net
Multi Media
Web Sites
RSS
OPEN SOURCES
Organization
Public
Agencies
Automatic
Collection
Manual
Collection
Streaming
Avatar
Management
Data Sources
Management
DATABASES
Data
Centric
Target
Centric
Entity
Extraction
Rule Engine
Identity
Resolution
Watch Lists
Automatic Entity
Enrichment
Statistics
Taxonomy
Scoring
ANALYSIS
TOOLS & PEOPLE
Link Analysis
Temporal
Geospatial
Trends
What If
Alerts
Case
Management
Document
Management
Collaboration
Reports
WWW
STRUCTURED &
UNSTRUCTURED
DATA
DISSEMINATION
Mer Group Security Division
Headquarters: 5 Hatzoref St., Holon 58856, Israel
T+972-3-5572555 | F+972-3-5580282
www.mer-group.com | info@mer-group.com
SAIP Enables:
•	 Cutting down on background noise and false alerts in existing monitoring systems.
•	 Correlating the resulting high-priority alerts across data sources and detecting patterns of threats.
•	 Identifying real world entities and correlating their profiles with their cyber counterparts.
•	 Pooling internal data and relevant external data into a single coherent place.
•	 Profiling accounts, users or other entities, and correlating anomalous transactions with these
profiles.
•	 Remaining agile, and staying ahead of malicious actors and activities.
Technical Information
•	 Entity Extraction from structured and unstructured data.
•	 Analytical tools – from raw-data to inference (links, graph search, patterns, abnormalities, entity
enrichment).
•	 “Push” mechanism based on a powerful intelligence graphical rule engine and alerting system.
•	 Multi-lingual – from entity extraction to documents exploitation.
•	 Data analysis in real time.
•	 Schema-less architecture – user defined data model for customer autonomy.
•	 Scalable infrastructure.
•	 Modular components.
•	 A Service Oriented Architecture - (SOA).
•	 Plug-in connectivity to legacy systems.
•	 Supports standard communication and data protocols such as XML and related XML
technologies (XSD Schema), Web Services (SOAP, WSDL) and HTTP/S.
•	 Based on HTML5 technology.
Why SAIP
•	 Full intelligence lifecycle – from tasking to sharing.
•	 All-source methodology – from osint/webint to techint.
•	 Big data technology – from collection to analysis.
•	 Incident management lifecycle – from alerts to investigative vase management.
•	 Collaboration & compartmentalization.
•	 Search, match, discover and analyze.
•	 Dissemination.

More Related Content

What's hot

Personal Data Privacy Semantics in Multi-Agent Systems Interactions
Personal Data Privacy Semantics in Multi-Agent Systems InteractionsPersonal Data Privacy Semantics in Multi-Agent Systems Interactions
Personal Data Privacy Semantics in Multi-Agent Systems InteractionsJean-Paul Calbimonte
 
CXAIR for Healthcare Brochure
CXAIR for Healthcare BrochureCXAIR for Healthcare Brochure
CXAIR for Healthcare BrochureConnexica
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data miningDataminingTools Inc
 
(Web User Interfaces track) "Getting the Query Right: User Interface Design o...
(Web User Interfaces track) "Getting the Query Right: User Interface Design o...(Web User Interfaces track) "Getting the Query Right: User Interface Design o...
(Web User Interfaces track) "Getting the Query Right: User Interface Design o...icwe2015
 
Near Duplicate Detection for Medical Imaging Data Warehouse Construction
Near Duplicate Detection for Medical Imaging Data Warehouse ConstructionNear Duplicate Detection for Medical Imaging Data Warehouse Construction
Near Duplicate Detection for Medical Imaging Data Warehouse ConstructionPradeeban Kathiravelu, Ph.D.
 
Using graph technology for multi-INT investigations
Using graph technology for multi-INT investigationsUsing graph technology for multi-INT investigations
Using graph technology for multi-INT investigationsLinkurious
 
Data Café — A Platform For Creating Biomedical Data Lakes
Data Café — A Platform For Creating Biomedical Data LakesData Café — A Platform For Creating Biomedical Data Lakes
Data Café — A Platform For Creating Biomedical Data LakesPradeeban Kathiravelu, Ph.D.
 
RESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWARE
RESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWARERESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWARE
RESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWAREI3E Technologies
 
4 Steps to Go Beyond Visualization - Pyramid Analytics
4 Steps to Go Beyond Visualization - Pyramid Analytics4 Steps to Go Beyond Visualization - Pyramid Analytics
4 Steps to Go Beyond Visualization - Pyramid AnalyticsElsa MacDonald
 
Uncover Untold Stories in Your Data: A Deep Dive on Data Profiling
Uncover Untold Stories in Your Data: A Deep Dive on Data ProfilingUncover Untold Stories in Your Data: A Deep Dive on Data Profiling
Uncover Untold Stories in Your Data: A Deep Dive on Data ProfilingJosiah Renaudin
 
Graph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise PapersGraph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise PapersLinkurious
 
Clinical Trials & Big Data-Final
Clinical Trials & Big Data-FinalClinical Trials & Big Data-Final
Clinical Trials & Big Data-FinalManoj Vig
 
Big Data and Health Care
Big Data and Health CareBig Data and Health Care
Big Data and Health CareJeffrey Funk
 
9 facts about statice's data anonymization solution
9 facts about statice's data anonymization solution9 facts about statice's data anonymization solution
9 facts about statice's data anonymization solutionStatice
 
Smack presentation sneak_preview
Smack presentation sneak_previewSmack presentation sneak_preview
Smack presentation sneak_previewRelevantz
 
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...CompTIA
 

What's hot (20)

Personal Data Privacy Semantics in Multi-Agent Systems Interactions
Personal Data Privacy Semantics in Multi-Agent Systems InteractionsPersonal Data Privacy Semantics in Multi-Agent Systems Interactions
Personal Data Privacy Semantics in Multi-Agent Systems Interactions
 
CXAIR for Healthcare Brochure
CXAIR for Healthcare BrochureCXAIR for Healthcare Brochure
CXAIR for Healthcare Brochure
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Web Mining
Web MiningWeb Mining
Web Mining
 
(Web User Interfaces track) "Getting the Query Right: User Interface Design o...
(Web User Interfaces track) "Getting the Query Right: User Interface Design o...(Web User Interfaces track) "Getting the Query Right: User Interface Design o...
(Web User Interfaces track) "Getting the Query Right: User Interface Design o...
 
Near Duplicate Detection for Medical Imaging Data Warehouse Construction
Near Duplicate Detection for Medical Imaging Data Warehouse ConstructionNear Duplicate Detection for Medical Imaging Data Warehouse Construction
Near Duplicate Detection for Medical Imaging Data Warehouse Construction
 
Using graph technology for multi-INT investigations
Using graph technology for multi-INT investigationsUsing graph technology for multi-INT investigations
Using graph technology for multi-INT investigations
 
Data Café — A Platform For Creating Biomedical Data Lakes
Data Café — A Platform For Creating Biomedical Data LakesData Café — A Platform For Creating Biomedical Data Lakes
Data Café — A Platform For Creating Biomedical Data Lakes
 
RESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWARE
RESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWARERESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWARE
RESEARCH DIRECTIONS FOR ENGINEERING BIG DATA ANALYTICS SOFTWARE
 
4 Steps to Go Beyond Visualization - Pyramid Analytics
4 Steps to Go Beyond Visualization - Pyramid Analytics4 Steps to Go Beyond Visualization - Pyramid Analytics
4 Steps to Go Beyond Visualization - Pyramid Analytics
 
Uncover Untold Stories in Your Data: A Deep Dive on Data Profiling
Uncover Untold Stories in Your Data: A Deep Dive on Data ProfilingUncover Untold Stories in Your Data: A Deep Dive on Data Profiling
Uncover Untold Stories in Your Data: A Deep Dive on Data Profiling
 
web mining
web miningweb mining
web mining
 
Graph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise PapersGraph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise Papers
 
Clinical Trials & Big Data-Final
Clinical Trials & Big Data-FinalClinical Trials & Big Data-Final
Clinical Trials & Big Data-Final
 
Big Data and Health Care
Big Data and Health CareBig Data and Health Care
Big Data and Health Care
 
9 facts about statice's data anonymization solution
9 facts about statice's data anonymization solution9 facts about statice's data anonymization solution
9 facts about statice's data anonymization solution
 
Big Data Visibility
Big Data VisibilityBig Data Visibility
Big Data Visibility
 
Smack presentation sneak_preview
Smack presentation sneak_previewSmack presentation sneak_preview
Smack presentation sneak_preview
 
Data mining
Data miningData mining
Data mining
 
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
 

Similar to SAIP-Intelligence-Brochure

RSA-Pivotal Security Big Data Reference Architecture
RSA-Pivotal Security Big Data Reference ArchitectureRSA-Pivotal Security Big Data Reference Architecture
RSA-Pivotal Security Big Data Reference ArchitectureEMC
 
Sqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax Technology
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wpCMR WORLD TECH
 
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl
 
DataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayDataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayInterset
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Splunk for big_data
Splunk for big_dataSplunk for big_data
Splunk for big_dataGreg Hanchin
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsAdeo Security
 
Applications of Semantic Technology in the Real World Today
Applications of Semantic Technology in the Real World TodayApplications of Semantic Technology in the Real World Today
Applications of Semantic Technology in the Real World TodayAmit Sheth
 
Intelligence and investigation management
 Intelligence and investigation management Intelligence and investigation management
Intelligence and investigation managementAdeola Taiwo-Ogunbode
 
Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Matt Soseman
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax Technology
 
Harness the power of data
Harness the power of dataHarness the power of data
Harness the power of dataHarsha MV
 
Information and Integration Management Vision
Information and Integration Management VisionInformation and Integration Management Vision
Information and Integration Management VisionColin Bell
 
Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011Mills Davis
 

Similar to SAIP-Intelligence-Brochure (20)

RSA-Pivotal Security Big Data Reference Architecture
RSA-Pivotal Security Big Data Reference ArchitectureRSA-Pivotal Security Big Data Reference Architecture
RSA-Pivotal Security Big Data Reference Architecture
 
Sqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, Analyze
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network Services
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use Case
 
DataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayDataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the Day
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Splunk for big_data
Splunk for big_dataSplunk for big_data
Splunk for big_data
 
Sqrrl
SqrrlSqrrl
Sqrrl
 
Haystax Technology - About Us
Haystax Technology - About UsHaystax Technology - About Us
Haystax Technology - About Us
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
Applications of Semantic Technology in the Real World Today
Applications of Semantic Technology in the Real World TodayApplications of Semantic Technology in the Real World Today
Applications of Semantic Technology in the Real World Today
 
Intelligence and investigation management
 Intelligence and investigation management Intelligence and investigation management
Intelligence and investigation management
 
Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck
 
Thilga
ThilgaThilga
Thilga
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence Platform
 
Harness the power of data
Harness the power of dataHarness the power of data
Harness the power of data
 
Information and Integration Management Vision
Information and Integration Management VisionInformation and Integration Management Vision
Information and Integration Management Vision
 
Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011Semantic business applications - case examples - Ontology Summit 2011
Semantic business applications - case examples - Ontology Summit 2011
 
Matrix Mapper
Matrix MapperMatrix Mapper
Matrix Mapper
 

SAIP-Intelligence-Brochure

  • 1. Strategic Actionable Intelligence Platform SAIP SAIP for Intelligence Agencies More than ever, organizations require a comprehensive suite of powerful tools for analyzing information, identifying patterns, and facilitating effective action. The Mer Group Security Division dedicated team of intelligence technology experts who thoroughly understand the nature, constraint’s and implications of intelligence work, has developed SAIP - an innovative platform for accelerating intelligence work. SAIP collects data from multiple and diverse sources and enriches them with real-world information, tracing the hidden connections between seemingly unrelated events, and disseminates actionable intelligence to authorized stakeholders. Big Data Analytics for Intelligence Agencies Mer Group Security Division’s SAIP (Big data Analytics system) is a comprehensive platform that transforms Big Data into usable, real-time and actionable intelligence. SAIP prioritizes information as it comes through, enabling your organization to proactively take measures to cope with threats before they materialize. SAIP enables governments and enterprises to combine and correlate external and internal information, structured or unstructured, and apply advanced analytics to big data sets in order to identify security events and get the bigger picture of existing threats. COLLECTION DATA ACQUISTION FUSION AUTO PROCESSES CDRs Emails Messaging Travels Financial DATA FEEDS Social Networks Deep Web Dark Net Multi Media Web Sites RSS OPEN SOURCES Organization Public Agencies Automatic Collection Manual Collection Streaming Avatar Management Data Sources Management DATABASES Data Centric Target Centric Entity Extraction Rule Engine Identity Resolution Watch Lists Automatic Entity Enrichment Statistics Taxonomy Scoring ANALYSIS TOOLS & PEOPLE Link Analysis Temporal Geospatial Trends What If Alerts Case Management Document Management Collaboration Reports WWW STRUCTURED & UNSTRUCTURED DATA DISSEMINATION
  • 2. Mer Group Security Division Headquarters: 5 Hatzoref St., Holon 58856, Israel T+972-3-5572555 | F+972-3-5580282 www.mer-group.com | info@mer-group.com SAIP Enables: • Cutting down on background noise and false alerts in existing monitoring systems. • Correlating the resulting high-priority alerts across data sources and detecting patterns of threats. • Identifying real world entities and correlating their profiles with their cyber counterparts. • Pooling internal data and relevant external data into a single coherent place. • Profiling accounts, users or other entities, and correlating anomalous transactions with these profiles. • Remaining agile, and staying ahead of malicious actors and activities. Technical Information • Entity Extraction from structured and unstructured data. • Analytical tools – from raw-data to inference (links, graph search, patterns, abnormalities, entity enrichment). • “Push” mechanism based on a powerful intelligence graphical rule engine and alerting system. • Multi-lingual – from entity extraction to documents exploitation. • Data analysis in real time. • Schema-less architecture – user defined data model for customer autonomy. • Scalable infrastructure. • Modular components. • A Service Oriented Architecture - (SOA). • Plug-in connectivity to legacy systems. • Supports standard communication and data protocols such as XML and related XML technologies (XSD Schema), Web Services (SOAP, WSDL) and HTTP/S. • Based on HTML5 technology. Why SAIP • Full intelligence lifecycle – from tasking to sharing. • All-source methodology – from osint/webint to techint. • Big data technology – from collection to analysis. • Incident management lifecycle – from alerts to investigative vase management. • Collaboration & compartmentalization. • Search, match, discover and analyze. • Dissemination.