SlideShare a Scribd company logo
1 of 24
Private & Confidential
Introduction
June 2019
Private & Confidential
Z Zeno Founder of the stoic school of philosophy
I Issac Asimov Finest writer & creator of science fiction
G Sir Francis Galton One of the greatest polymaths of our time
R S. Ramanujan Famous mathematician with almost no formal training
A Augustus Founder of the Roman Empire and Pax Romana
M John McCarthy Computer scientist known as the ‘Father of AI’
Private & Confidential
What is ZIGRAM?
ZIGRAM is a data focussed organization which operates in the
Data Asset space.
Our team is made up of professionals from varied domains like
data science, technology, sales, risk, analytics, financial
services, research and business consulting.
Our aim is to deliver value to clients by Building Solutions,
Developing Data and Managing Data Assets across use
cases - thereby boosting revenues and reducing the cost of
doing business, in a data driven world.
Private & Confidential
A Data Asset is a structured, comprehensive
and validated database of information which
is built and maintained for a specific use case
or in response to a problem
Comprehensive
Built-For-Purpose
Validated
Structured
What is a Data Asset?
Gold Standard or
Reference Data
Data Asset {
Private & Confidential
Data So? The Answer
Why are Data Assets Important?
Banks & FIs suffer frauds
due to lack of data,
monitoring and timely alerts
Private & Confidential
Our Offerings
I Applications
Applications created by using multiple technologies including automation, analytics,
machine learning and AI to help build Data Assets – Faster, Cheaper and Better
II Services
Deploying experienced resources, subject matter experts and specialists to execute
projects and operations across the Data Asset lifecycle – From Conceptualization
To Delivery
III Products
Data Asset products built in-house, either in partnership with other players or wholly
managed, with subscription, application or API based access – Solutions For
Specific Use-cases
What do we do?
Private & Confidential
Built to create Data Assets – Faster, Cheaper and Better
Development
Maintenance
Enhancement
Enrichment
 Regular Expressions
 Translation & Transliteration
 Source Assessment
 Scraping and Crawlers
 Data Dictionary
 AI / Machine Learning
 Testing Methodologies
 Workflow Automation
 Profile Development
 NLP
 Link Extraction
 Statistical Testing
 Validation Methodologies
 Master Structures
 Scaling Techniques
 Cloud Services
 External Integrations
 Application Development
Technology Solutions for Data Asset Projects
Applications
I Applications
Applications created by using multiple technologies including automation, analytics,
machine learning and AI to help build Data Assets – Faster, Cheaper and Better
Private & Confidential
Profile Builder
Performance Visual Analytics Process Management Extraction Machine Learning Integrations
EnhancedCoverage
EfficientMaintenance
TimeReduction
CurrentTechnology
Pipeline
More comprehensive coverage and completion rates for PEPs and
Associations, globally
Maintain 100% of PEPs by addressing the issue of unsustainable backlog
Upfront, reduce time by a third to build PEP profiles and ensure ongoing
efficiency
PROFILE BUILDER is an application
designed to manage PEP data asset
maintenance and development by
leveraging:
 Technology driven workflows
 Embedded Data Asset operations processes
 Automation of extraction of sources and content
 Machine learning
 End-to-end project management
Fully Featured. With the right context
Built on the Azure cloud with .Net, Python & HTML/CSS, with ML, NLP,
proxy and scraping services integrated
Politically Exposed Persons use-case focused application
Private & Confidential
Research Optimization
Built for institutions who want a solution to manage
their entire research, risk and compliance process
Designed for individual researchers who want a
seamless low cost solution to initiate research
- Financial Institutions
- Risk focused teams
- Vendor & supply chain departments
- Government Agencies
- Consultants & Advisors
- Educational institutions
- Hiring and Executive search
- Data Asset development teams
Use-case specific
algorithms for global search
on individuals, businesses &
events
Machine learning driven
search to provide 50%+
time savings
Workflow automation
integrated with NLP, tools,
templates and intelligent
services
1 2 3
Machine Learning driven search for research
Private & Confidential
Our team has demonstratable capabilities and
skill sets required to develop and manage data
asset projects across use cases and industries
for clients globally.
 Research
 Process Development
 Analytics
 Reports & MIS
 Project Management
Executing, managing and delivering projects for clients, globally
Services
II Services
Deploying experienced resources, subject matter experts and specialists to execute
projects and operations across the Data Asset lifecycle – From Conceptualization
To Delivery
Private & Confidential
Data Asset Framework
The ZIGRAM proprietary framework
We leverage our proprietary Data
Asset Framework to manage data
asset projects from
Conceptualization to Delivery i.e.
across the Data Asset lifecycle.
These projects are managed by an
experienced, multi-skilled team,
supported by the right use-case
subject matter experts.
Private & Confidential
Country Risk
Check
Fraud/Bribery/
Bankruptcy
Check
Litigation &
Restricted Lists
Key
Management
Personnel (KMP)
Check
Media & Internet
Search
PEP Association
Business
Registration,
Profile, Concerns
& Related
Details
Reputation
Check /Trade
Check/ Site Visit
Associated Party
Check
Components of ResearchThird Party Due Diligence reports have been
designed to determine potential red flags that may
be associated with an entity, its key management
personnel or by association.
Due Diligence & Research
Managing projects across the risk landscape
Research Report Audit Report Source Copies
Background Check
1Private & Confidential ABC Inc.
El Chapo
Drug Lord | Sinola Cartel
Mexico
Background Check
23 February 2019
Hercule Poirot
ABC Inc.
Research
Report
Private & Confidential
Products
Building world-class DaaS & SaaS products
III Products
Data Asset products built in-house, either in partnership with other players or wholly
managed, with subscription, application or API based access – Solutions For
Specific Use-cases
Developed to give the global AML
professional an analytics based,
comprehensive and easy to reference
resource for AML cases, penalties,
regulations, trends & actions.
$
AML Zone
Under Development
Developing and delivering primed
account data assets for specific end-
customer requirements, along with
insights, KPIs and predictive analytics
with the aim to increase conversion,
ticket size and traction.
Inside Sales
Beta
Images & profiles of RSCI (Religious,
Social & Culturally Important
Individuals) to aid a facial recognition
software in providing information about
these individuals
Facial Recognition
Concept
Focused on reducing costs, enhancing
cyber & data security and managing
compliance norms for organizations
across supply chains & ecosystems.
(Cyber & Data Security + Compliance)
CDSC
Testing
Private & Confidential
Politically Exposed Persons
1.2+ Million
Building and maintenance of a global database of PEPs
done across 240 Countries & Jurisdictions covering 30
Languages
Suspected Players Online
200,000+
Negative news of the online space – Websites linked to
individuals & entities covering IP theft, OC, human-trafficking,
terrorism etc.
Marijuana Related Businesses
55,000+
US and Canada list for Marijuana business across the
supply chain
Rogue Mobile Apps
10,000+
Identification of mobile applications which contravene
regulations and client’s brand & acceptable usage
High Risk Correspondent Banks
3000+
Research and updation of global high risk correspondent
banking relationships
Slavery & Human Trafficking
Global
Conceptualization to framework development of a
database related to slavery associated individuals &
companies
Anti-Corruption Referral Directory
10,000+
Development of Anti-Corruption referral directory on Civil
Servants for the UN in India
Ports & Vessels
4000+
Development of TBML information related to sanctions,
sea ports and vessels
Entertainment
100,000+
Development of a Best-In-Class Region focused
Entertainment Data Asset
EDD Reports
Africa, Middle East & Asia
Research reports on clients
Correspondent Banks
15,000+
Research and updation of global correspondent banking
relationships centered around North America
Civil Servants
500,000+
Database of Civil Servants (other than PEPs)
Team Experience in Data Assets
Private & Confidential
Research & Operations Data Science Technology Representation
+ Profile Development
+ Project Management
+ Online Research
+ Data Projects
+ Data Asset Framework
+ Remediation
+ Enhancement
+ Enrichment
+ Maintenance
+ Analytics
+ Machine Learning
+ NLP
+ Deep Learning
+ Statistical Testing
+ Visual Analytics
+ Data Mining
+ Automation
+ Application Development
+ Cloud Technology
+ APIs
+ Data Architecture
+ ETL Methodologies
+ Scrapers & Crawlers
+ External Services
+ Dashboards
+ Visual Analytics
+ Relationship Maps
+ Reporting
+ Infographics
+ Journey Maps
Core Data
Insights &
Efficiency
Delivery &
Deployment
Reporting &
Showcasing
Building the right mix of skills and resources
Our Capabilities
Private & Confidential
To integrate our products, data and
services in DIKW organizations
globally, to help solve real world
problems by leveraging Data Assets
DIKW {Data, Information, Knowledge & Wisdom}
Our Vision
Private & Confidential
Use Cases
Snapshot of areas of focus
Private & Confidential
MRB Data Asset is being developed
to be the most comprehensive and
detailed database of Marijuana-
Related Businesses (“MRBs”) and
their related Ultimate Beneficial
Owners (“UBOs”).
Marijuana Related
Businesses (MRB)
Risk & Diligence
31 Legal Medical Marijuana States & DC
9 Legal Recreational Marijuana States & DC
150K Estimated MRB Profiles
The Need
For organizations to screen, identify and act
in the event of an MRB customer/third party
Drivers
- Rapidly changing regulation
- Legalization for medical & other users
- Difference between federal & state laws
- Client specific risk appetite
End Users
- Banks & Financial Institutions
- Investors & Marketing Agencies
- Regulatory and Government Agencies
- Aggregators & B2B service providers
Legal MRB Market ~ $5 Billion
Marijuana Related Businesses
Private & Confidential
69% companies see rise in costs
USD 248.26 billion by 2023
Cyber Security and
Compliance Market
Focused on reducing costs, enhancing
cyber & data security and managing
compliance norms for organizations across
supply chains & ecosystems.
(Cyber & Data Security + Compliance)
Cyber Security
CDSC
The Need
With the increase in compliance norms,
regulations and reputational impact,
organizations need a scalable solution for
compliance & data security
Drivers
- Cyber Compliance Norms
- Dependence on Third Parties
- Rising Compliance Costs / Complexity
- Cyber Risk Management
End Users
- Fortune 1000 Companies
- Suppliers / Vendors / Third Parties
- Insurance & FIs
- Regulators & Agencies
Cyber & Data Security + Compliance
Private & Confidential
Developed to give the global AML
professional an analytics based,
comprehensive and easy to
reference resource for AML cases,
penalties & actions.
$
AML Data Asset
Risk & Compliance
100+ focus countries
AML timeline stretching back 20+ years
15,000+ AML cases
The Need
Adequate coverage, overview and
oversight of specific AML based risks
related to individuals and organizations
Drivers
- Need for validated information
- Screening & Due Diligence on third parties
- Correspondent banking based risk
- Risk based assessment requirements
End Users
- Banks & Financial Institutions
- Risk & Compliance Professionals
- Regulatory and Government Agencies
150K AML Professionals
AML Zone
Private & Confidential
A database containing images &
profiles of RSCI entities (Religious,
Social & Culturally Important
Individuals) to aid a facial recognition
software in identifying, recognising
and providing information about
these individuals
Facial Recognition
Security
The Need
Organizations need reference images and
profile details about an important individual
so that they may be able to identify, preempt
or act based on Facial Recognition triggers
Drivers
- Security and Risk
- KYC and Customer Loyalty Programs
- Facility Risk
- Authentication via Online Channels
End Users
- Banks & Financial Institutions
- Law Enforcement
- Airports & Casinos
- Events & Retail
400K RSCI Profiles
Market Size ~ $7.5 Billion
Area of Deployment
Generic facial recognition framework and
process
Facial Recognition
Private & Confidential
Developing and delivering primed
account data assets for specific end-
customer requirements, along with
insights, KPIs and predictive
analytics with the aim to increase
conversion, ticket size and traction.
Inside Sales
Sales & Marketing
The Need
To reduce the cost of sales, customer
acquisition and increase CLV, organizations
globally have started using Inside Sales as
the primary methodology of sales
Drivers
- Increasing Sales Costs
- Targeting small and SME entities
- Need to educate and engage prior to sales
- Making smaller ticket size sales, viable
End Users
- SaaS companies with SME target Market
- Organizations selling product bundles
- Whitespace targeting firms
65 Million SMEs in India
$10B India SMB SaaS Market
Inside Sales requires high quality data, good
context and a tech enabled ecosystem
Inside Sales
Private & Confidential
The Harmonized Commodity
Description and Coding System
generally refers to “Harmonized
System of Nomenclature” or simply
“HSN”. It has been developed by the
World Customs Organization (WCO).
HSN Codes
Tax & Trade
The Need
HSN is applicable in India after
implementation of GST. The code is critical
for businesses to be able to adhere with the
GST norms and avoid penalties
Drivers
- HSN is applicable post GST
- Confusion & ambiguity in relevant codes
- Claiming input credit tax
- Tax liability and penalties
End Users
- Global MNCs in India
- Export and Import companies
- Tax advisors & consultants
09024020 is the code for Black Tea sold
as leaf in bulk, where 09 is the Chapter,
02 is the heading and 40 is the product
code for Black Tea.
10 Million Combinations (5000 codes)
1.3 Million GST professionals
The last 2 digits of 20 is code allotted
by Indian taxation system for Black
Tea sold in leaf form and in bulk.
Had it been Black Tea bags then the
last two digits of the HSN code would
have been replaced with 40 instead
of 20.
HSN Codes
Private & Confidential
Contact
contact@zigram.tech
linkedin.com/zigram
www.zigram.tech
twitter.com/zigramt
© Zigram Data Technologies Private Limited 2019.
All information contained in this presentation is the IP of ZIGRAM. This presentation is meant only for the recipient. No part of this
document may be reproduced / shared / divulged or referred to in part or in full without the prior written consent of ZIGRAM. The
ideas / views presented in this document are those of ZIGRAM and may not be replicated or used without the written consent of
ZIGRAM. While considerable care has been taken in gathering the thoughts/ information included in this document, ZIGRAM has not
validated such information and hence does not confirm accuracy of such information. This document is preliminary in nature and is
purely indicative of the approach recommended by ZIGRAM.
facebook.com/zigram.tech
zigram.tech/subscribe

More Related Content

What's hot

Big Data LDN 2018: THE THIRD REVOLUTION IN ANALYTICS
Big Data LDN 2018: THE THIRD REVOLUTION IN ANALYTICSBig Data LDN 2018: THE THIRD REVOLUTION IN ANALYTICS
Big Data LDN 2018: THE THIRD REVOLUTION IN ANALYTICSMatt Stubbs
 
SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"
SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"
SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"MDS ap
 
Matt McIlwain opening keynote
Matt McIlwain opening keynoteMatt McIlwain opening keynote
Matt McIlwain opening keynoteSeattleSIM
 
Bigdata based fraud detection
Bigdata based fraud detectionBigdata based fraud detection
Bigdata based fraud detectionMk Kim
 
Keynote GraphTour Europe 2019, Emil Eifrem, CEO & Co-Founder Neo4j
Keynote GraphTour Europe 2019, Emil Eifrem, CEO & Co-Founder Neo4jKeynote GraphTour Europe 2019, Emil Eifrem, CEO & Co-Founder Neo4j
Keynote GraphTour Europe 2019, Emil Eifrem, CEO & Co-Founder Neo4jNeo4j
 
Key Considerations for Putting Hadoop in Production SlideShare
Key Considerations for Putting Hadoop in Production SlideShareKey Considerations for Putting Hadoop in Production SlideShare
Key Considerations for Putting Hadoop in Production SlideShareMapR Technologies
 
Neo4j im Fianzsektor: DIVIZEND
Neo4j im Fianzsektor: DIVIZENDNeo4j im Fianzsektor: DIVIZEND
Neo4j im Fianzsektor: DIVIZENDNeo4j
 
Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...
Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...
Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...DATAVERSITY
 
IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014
IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014
IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014Findwise
 
McKinsey Big Data Overview
McKinsey Big Data OverviewMcKinsey Big Data Overview
McKinsey Big Data Overviewoptier
 
The Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallThe Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallTrillium Software
 
Keynote talk at Financial Times Forum - BigData and Advanced Analytics at SIB...
Keynote talk at Financial Times Forum - BigData and Advanced Analytics at SIB...Keynote talk at Financial Times Forum - BigData and Advanced Analytics at SIB...
Keynote talk at Financial Times Forum - BigData and Advanced Analytics at SIB...Usama Fayyad
 
Oracle Big Data Governance Webcast Charts
Oracle Big Data Governance Webcast ChartsOracle Big Data Governance Webcast Charts
Oracle Big Data Governance Webcast ChartsJeffrey T. Pollock
 
Nasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningNasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningRatnakar Pandey
 
Data Lake: A simple introduction
Data Lake: A simple introductionData Lake: A simple introduction
Data Lake: A simple introductionIBM Analytics
 
Detection of Anomalous Behavior
Detection of Anomalous BehaviorDetection of Anomalous Behavior
Detection of Anomalous BehaviorCapgemini
 
Graphs & the Police: How Law Enforcement Analyze Connected Data at Scale
Graphs & the Police: How Law Enforcement Analyze Connected Data at ScaleGraphs & the Police: How Law Enforcement Analyze Connected Data at Scale
Graphs & the Police: How Law Enforcement Analyze Connected Data at ScaleNeo4j
 
TeraStream - Data Integration/Migration/ETL/Batch Tool
TeraStream - Data Integration/Migration/ETL/Batch ToolTeraStream - Data Integration/Migration/ETL/Batch Tool
TeraStream - Data Integration/Migration/ETL/Batch ToolDataStreams
 
Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013 Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013 IBM Sverige
 

What's hot (20)

Big Data LDN 2018: THE THIRD REVOLUTION IN ANALYTICS
Big Data LDN 2018: THE THIRD REVOLUTION IN ANALYTICSBig Data LDN 2018: THE THIRD REVOLUTION IN ANALYTICS
Big Data LDN 2018: THE THIRD REVOLUTION IN ANALYTICS
 
SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"
SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"
SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"
 
Matt McIlwain opening keynote
Matt McIlwain opening keynoteMatt McIlwain opening keynote
Matt McIlwain opening keynote
 
Bigdata based fraud detection
Bigdata based fraud detectionBigdata based fraud detection
Bigdata based fraud detection
 
Keynote GraphTour Europe 2019, Emil Eifrem, CEO & Co-Founder Neo4j
Keynote GraphTour Europe 2019, Emil Eifrem, CEO & Co-Founder Neo4jKeynote GraphTour Europe 2019, Emil Eifrem, CEO & Co-Founder Neo4j
Keynote GraphTour Europe 2019, Emil Eifrem, CEO & Co-Founder Neo4j
 
Key Considerations for Putting Hadoop in Production SlideShare
Key Considerations for Putting Hadoop in Production SlideShareKey Considerations for Putting Hadoop in Production SlideShare
Key Considerations for Putting Hadoop in Production SlideShare
 
Fraud and Risk in Big Data
Fraud and Risk in Big DataFraud and Risk in Big Data
Fraud and Risk in Big Data
 
Neo4j im Fianzsektor: DIVIZEND
Neo4j im Fianzsektor: DIVIZENDNeo4j im Fianzsektor: DIVIZEND
Neo4j im Fianzsektor: DIVIZEND
 
Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...
Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...
Slides: Using Analytics and Fraud Management To Increase Revenues and Differe...
 
IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014
IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014
IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014
 
McKinsey Big Data Overview
McKinsey Big Data OverviewMcKinsey Big Data Overview
McKinsey Big Data Overview
 
The Bigger They Are The Harder They Fall
The Bigger They Are The Harder They FallThe Bigger They Are The Harder They Fall
The Bigger They Are The Harder They Fall
 
Keynote talk at Financial Times Forum - BigData and Advanced Analytics at SIB...
Keynote talk at Financial Times Forum - BigData and Advanced Analytics at SIB...Keynote talk at Financial Times Forum - BigData and Advanced Analytics at SIB...
Keynote talk at Financial Times Forum - BigData and Advanced Analytics at SIB...
 
Oracle Big Data Governance Webcast Charts
Oracle Big Data Governance Webcast ChartsOracle Big Data Governance Webcast Charts
Oracle Big Data Governance Webcast Charts
 
Nasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningNasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learning
 
Data Lake: A simple introduction
Data Lake: A simple introductionData Lake: A simple introduction
Data Lake: A simple introduction
 
Detection of Anomalous Behavior
Detection of Anomalous BehaviorDetection of Anomalous Behavior
Detection of Anomalous Behavior
 
Graphs & the Police: How Law Enforcement Analyze Connected Data at Scale
Graphs & the Police: How Law Enforcement Analyze Connected Data at ScaleGraphs & the Police: How Law Enforcement Analyze Connected Data at Scale
Graphs & the Police: How Law Enforcement Analyze Connected Data at Scale
 
TeraStream - Data Integration/Migration/ETL/Batch Tool
TeraStream - Data Integration/Migration/ETL/Batch ToolTeraStream - Data Integration/Migration/ETL/Batch Tool
TeraStream - Data Integration/Migration/ETL/Batch Tool
 
Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013 Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013
 

Similar to Private & Confidential Document Summary

Zigram (Introduction) Feb 2019
Zigram (Introduction) Feb 2019Zigram (Introduction) Feb 2019
Zigram (Introduction) Feb 2019ZIGRAM
 
ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM
 
AI: A risk and way to manage risk
AI: A risk and way to manage riskAI: A risk and way to manage risk
AI: A risk and way to manage riskKaran Sachdeva
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxSymptai Consulting Limited
 
AI Overview and Capabilities
AI Overview and CapabilitiesAI Overview and Capabilities
AI Overview and CapabilitiesAnandSRao1962
 
Revolutionizing the Legal Industry with Spark, NLP and Azure Databricks at Cl...
Revolutionizing the Legal Industry with Spark, NLP and Azure Databricks at Cl...Revolutionizing the Legal Industry with Spark, NLP and Azure Databricks at Cl...
Revolutionizing the Legal Industry with Spark, NLP and Azure Databricks at Cl...Databricks
 
Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...
Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...
Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...Enterprise Knowledge
 
Data monetization webinar
Data monetization webinarData monetization webinar
Data monetization webinarKaran Sachdeva
 
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Matt Stubbs
 
Your AI Transformation
Your AI Transformation Your AI Transformation
Your AI Transformation Sri Ambati
 
Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)AnandSRao1962
 
Three Dimensions of Data as a Service
Three Dimensions of Data as a ServiceThree Dimensions of Data as a Service
Three Dimensions of Data as a ServiceDenodo
 
How Big is Big Data business - Outsource People 2015
How Big is Big Data business - Outsource People 2015How Big is Big Data business - Outsource People 2015
How Big is Big Data business - Outsource People 2015Ihor Malchenyuk
 
ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019ZIGRAM
 
Big Data and MDM altogether: the winning association
Big Data and MDM altogether: the winning associationBig Data and MDM altogether: the winning association
Big Data and MDM altogether: the winning associationJean-Michel Franco
 
Overview of opensky's IT services and solutions
 Overview of opensky's IT services and solutions Overview of opensky's IT services and solutions
Overview of opensky's IT services and solutionsopensky Data Systems
 
From Foundation to Mastery – Building a Mature Analytics Roadmap - Manav Misra
From Foundation to Mastery – Building a Mature Analytics Roadmap - Manav MisraFrom Foundation to Mastery – Building a Mature Analytics Roadmap - Manav Misra
From Foundation to Mastery – Building a Mature Analytics Roadmap - Manav MisraMolly Alexander
 
Knowledge Graphs Webinar- 11/7/2017
Knowledge Graphs Webinar- 11/7/2017Knowledge Graphs Webinar- 11/7/2017
Knowledge Graphs Webinar- 11/7/2017Neo4j
 

Similar to Private & Confidential Document Summary (20)

Zigram (Introduction) Feb 2019
Zigram (Introduction) Feb 2019Zigram (Introduction) Feb 2019
Zigram (Introduction) Feb 2019
 
ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021
 
AI: A risk and way to manage risk
AI: A risk and way to manage riskAI: A risk and way to manage risk
AI: A risk and way to manage risk
 
Zigram Introduction
Zigram IntroductionZigram Introduction
Zigram Introduction
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 
AI Overview and Capabilities
AI Overview and CapabilitiesAI Overview and Capabilities
AI Overview and Capabilities
 
Revolutionizing the Legal Industry with Spark, NLP and Azure Databricks at Cl...
Revolutionizing the Legal Industry with Spark, NLP and Azure Databricks at Cl...Revolutionizing the Legal Industry with Spark, NLP and Azure Databricks at Cl...
Revolutionizing the Legal Industry with Spark, NLP and Azure Databricks at Cl...
 
Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...
Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...
Translating AI from Concept to Reality: Five Keys to Implementing AI for Know...
 
Data monetization webinar
Data monetization webinarData monetization webinar
Data monetization webinar
 
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
 
Your AI Transformation
Your AI Transformation Your AI Transformation
Your AI Transformation
 
Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)
 
Three Dimensions of Data as a Service
Three Dimensions of Data as a ServiceThree Dimensions of Data as a Service
Three Dimensions of Data as a Service
 
How Big is Big Data business - Outsource People 2015
How Big is Big Data business - Outsource People 2015How Big is Big Data business - Outsource People 2015
How Big is Big Data business - Outsource People 2015
 
B. Lee Jones - Resume 2021
B. Lee Jones - Resume 2021B. Lee Jones - Resume 2021
B. Lee Jones - Resume 2021
 
ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019ZIGRAM Internship Program Nov 2019
ZIGRAM Internship Program Nov 2019
 
Big Data and MDM altogether: the winning association
Big Data and MDM altogether: the winning associationBig Data and MDM altogether: the winning association
Big Data and MDM altogether: the winning association
 
Overview of opensky's IT services and solutions
 Overview of opensky's IT services and solutions Overview of opensky's IT services and solutions
Overview of opensky's IT services and solutions
 
From Foundation to Mastery – Building a Mature Analytics Roadmap - Manav Misra
From Foundation to Mastery – Building a Mature Analytics Roadmap - Manav MisraFrom Foundation to Mastery – Building a Mature Analytics Roadmap - Manav Misra
From Foundation to Mastery – Building a Mature Analytics Roadmap - Manav Misra
 
Knowledge Graphs Webinar- 11/7/2017
Knowledge Graphs Webinar- 11/7/2017Knowledge Graphs Webinar- 11/7/2017
Knowledge Graphs Webinar- 11/7/2017
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Private & Confidential Document Summary

  • 2. Private & Confidential Z Zeno Founder of the stoic school of philosophy I Issac Asimov Finest writer & creator of science fiction G Sir Francis Galton One of the greatest polymaths of our time R S. Ramanujan Famous mathematician with almost no formal training A Augustus Founder of the Roman Empire and Pax Romana M John McCarthy Computer scientist known as the ‘Father of AI’
  • 3. Private & Confidential What is ZIGRAM? ZIGRAM is a data focussed organization which operates in the Data Asset space. Our team is made up of professionals from varied domains like data science, technology, sales, risk, analytics, financial services, research and business consulting. Our aim is to deliver value to clients by Building Solutions, Developing Data and Managing Data Assets across use cases - thereby boosting revenues and reducing the cost of doing business, in a data driven world.
  • 4. Private & Confidential A Data Asset is a structured, comprehensive and validated database of information which is built and maintained for a specific use case or in response to a problem Comprehensive Built-For-Purpose Validated Structured What is a Data Asset? Gold Standard or Reference Data Data Asset {
  • 5. Private & Confidential Data So? The Answer Why are Data Assets Important? Banks & FIs suffer frauds due to lack of data, monitoring and timely alerts
  • 6. Private & Confidential Our Offerings I Applications Applications created by using multiple technologies including automation, analytics, machine learning and AI to help build Data Assets – Faster, Cheaper and Better II Services Deploying experienced resources, subject matter experts and specialists to execute projects and operations across the Data Asset lifecycle – From Conceptualization To Delivery III Products Data Asset products built in-house, either in partnership with other players or wholly managed, with subscription, application or API based access – Solutions For Specific Use-cases What do we do?
  • 7. Private & Confidential Built to create Data Assets – Faster, Cheaper and Better Development Maintenance Enhancement Enrichment  Regular Expressions  Translation & Transliteration  Source Assessment  Scraping and Crawlers  Data Dictionary  AI / Machine Learning  Testing Methodologies  Workflow Automation  Profile Development  NLP  Link Extraction  Statistical Testing  Validation Methodologies  Master Structures  Scaling Techniques  Cloud Services  External Integrations  Application Development Technology Solutions for Data Asset Projects Applications I Applications Applications created by using multiple technologies including automation, analytics, machine learning and AI to help build Data Assets – Faster, Cheaper and Better
  • 8. Private & Confidential Profile Builder Performance Visual Analytics Process Management Extraction Machine Learning Integrations EnhancedCoverage EfficientMaintenance TimeReduction CurrentTechnology Pipeline More comprehensive coverage and completion rates for PEPs and Associations, globally Maintain 100% of PEPs by addressing the issue of unsustainable backlog Upfront, reduce time by a third to build PEP profiles and ensure ongoing efficiency PROFILE BUILDER is an application designed to manage PEP data asset maintenance and development by leveraging:  Technology driven workflows  Embedded Data Asset operations processes  Automation of extraction of sources and content  Machine learning  End-to-end project management Fully Featured. With the right context Built on the Azure cloud with .Net, Python & HTML/CSS, with ML, NLP, proxy and scraping services integrated Politically Exposed Persons use-case focused application
  • 9. Private & Confidential Research Optimization Built for institutions who want a solution to manage their entire research, risk and compliance process Designed for individual researchers who want a seamless low cost solution to initiate research - Financial Institutions - Risk focused teams - Vendor & supply chain departments - Government Agencies - Consultants & Advisors - Educational institutions - Hiring and Executive search - Data Asset development teams Use-case specific algorithms for global search on individuals, businesses & events Machine learning driven search to provide 50%+ time savings Workflow automation integrated with NLP, tools, templates and intelligent services 1 2 3 Machine Learning driven search for research
  • 10. Private & Confidential Our team has demonstratable capabilities and skill sets required to develop and manage data asset projects across use cases and industries for clients globally.  Research  Process Development  Analytics  Reports & MIS  Project Management Executing, managing and delivering projects for clients, globally Services II Services Deploying experienced resources, subject matter experts and specialists to execute projects and operations across the Data Asset lifecycle – From Conceptualization To Delivery
  • 11. Private & Confidential Data Asset Framework The ZIGRAM proprietary framework We leverage our proprietary Data Asset Framework to manage data asset projects from Conceptualization to Delivery i.e. across the Data Asset lifecycle. These projects are managed by an experienced, multi-skilled team, supported by the right use-case subject matter experts.
  • 12. Private & Confidential Country Risk Check Fraud/Bribery/ Bankruptcy Check Litigation & Restricted Lists Key Management Personnel (KMP) Check Media & Internet Search PEP Association Business Registration, Profile, Concerns & Related Details Reputation Check /Trade Check/ Site Visit Associated Party Check Components of ResearchThird Party Due Diligence reports have been designed to determine potential red flags that may be associated with an entity, its key management personnel or by association. Due Diligence & Research Managing projects across the risk landscape Research Report Audit Report Source Copies Background Check 1Private & Confidential ABC Inc. El Chapo Drug Lord | Sinola Cartel Mexico Background Check 23 February 2019 Hercule Poirot ABC Inc. Research Report
  • 13. Private & Confidential Products Building world-class DaaS & SaaS products III Products Data Asset products built in-house, either in partnership with other players or wholly managed, with subscription, application or API based access – Solutions For Specific Use-cases Developed to give the global AML professional an analytics based, comprehensive and easy to reference resource for AML cases, penalties, regulations, trends & actions. $ AML Zone Under Development Developing and delivering primed account data assets for specific end- customer requirements, along with insights, KPIs and predictive analytics with the aim to increase conversion, ticket size and traction. Inside Sales Beta Images & profiles of RSCI (Religious, Social & Culturally Important Individuals) to aid a facial recognition software in providing information about these individuals Facial Recognition Concept Focused on reducing costs, enhancing cyber & data security and managing compliance norms for organizations across supply chains & ecosystems. (Cyber & Data Security + Compliance) CDSC Testing
  • 14. Private & Confidential Politically Exposed Persons 1.2+ Million Building and maintenance of a global database of PEPs done across 240 Countries & Jurisdictions covering 30 Languages Suspected Players Online 200,000+ Negative news of the online space – Websites linked to individuals & entities covering IP theft, OC, human-trafficking, terrorism etc. Marijuana Related Businesses 55,000+ US and Canada list for Marijuana business across the supply chain Rogue Mobile Apps 10,000+ Identification of mobile applications which contravene regulations and client’s brand & acceptable usage High Risk Correspondent Banks 3000+ Research and updation of global high risk correspondent banking relationships Slavery & Human Trafficking Global Conceptualization to framework development of a database related to slavery associated individuals & companies Anti-Corruption Referral Directory 10,000+ Development of Anti-Corruption referral directory on Civil Servants for the UN in India Ports & Vessels 4000+ Development of TBML information related to sanctions, sea ports and vessels Entertainment 100,000+ Development of a Best-In-Class Region focused Entertainment Data Asset EDD Reports Africa, Middle East & Asia Research reports on clients Correspondent Banks 15,000+ Research and updation of global correspondent banking relationships centered around North America Civil Servants 500,000+ Database of Civil Servants (other than PEPs) Team Experience in Data Assets
  • 15. Private & Confidential Research & Operations Data Science Technology Representation + Profile Development + Project Management + Online Research + Data Projects + Data Asset Framework + Remediation + Enhancement + Enrichment + Maintenance + Analytics + Machine Learning + NLP + Deep Learning + Statistical Testing + Visual Analytics + Data Mining + Automation + Application Development + Cloud Technology + APIs + Data Architecture + ETL Methodologies + Scrapers & Crawlers + External Services + Dashboards + Visual Analytics + Relationship Maps + Reporting + Infographics + Journey Maps Core Data Insights & Efficiency Delivery & Deployment Reporting & Showcasing Building the right mix of skills and resources Our Capabilities
  • 16. Private & Confidential To integrate our products, data and services in DIKW organizations globally, to help solve real world problems by leveraging Data Assets DIKW {Data, Information, Knowledge & Wisdom} Our Vision
  • 17. Private & Confidential Use Cases Snapshot of areas of focus
  • 18. Private & Confidential MRB Data Asset is being developed to be the most comprehensive and detailed database of Marijuana- Related Businesses (“MRBs”) and their related Ultimate Beneficial Owners (“UBOs”). Marijuana Related Businesses (MRB) Risk & Diligence 31 Legal Medical Marijuana States & DC 9 Legal Recreational Marijuana States & DC 150K Estimated MRB Profiles The Need For organizations to screen, identify and act in the event of an MRB customer/third party Drivers - Rapidly changing regulation - Legalization for medical & other users - Difference between federal & state laws - Client specific risk appetite End Users - Banks & Financial Institutions - Investors & Marketing Agencies - Regulatory and Government Agencies - Aggregators & B2B service providers Legal MRB Market ~ $5 Billion Marijuana Related Businesses
  • 19. Private & Confidential 69% companies see rise in costs USD 248.26 billion by 2023 Cyber Security and Compliance Market Focused on reducing costs, enhancing cyber & data security and managing compliance norms for organizations across supply chains & ecosystems. (Cyber & Data Security + Compliance) Cyber Security CDSC The Need With the increase in compliance norms, regulations and reputational impact, organizations need a scalable solution for compliance & data security Drivers - Cyber Compliance Norms - Dependence on Third Parties - Rising Compliance Costs / Complexity - Cyber Risk Management End Users - Fortune 1000 Companies - Suppliers / Vendors / Third Parties - Insurance & FIs - Regulators & Agencies Cyber & Data Security + Compliance
  • 20. Private & Confidential Developed to give the global AML professional an analytics based, comprehensive and easy to reference resource for AML cases, penalties & actions. $ AML Data Asset Risk & Compliance 100+ focus countries AML timeline stretching back 20+ years 15,000+ AML cases The Need Adequate coverage, overview and oversight of specific AML based risks related to individuals and organizations Drivers - Need for validated information - Screening & Due Diligence on third parties - Correspondent banking based risk - Risk based assessment requirements End Users - Banks & Financial Institutions - Risk & Compliance Professionals - Regulatory and Government Agencies 150K AML Professionals AML Zone
  • 21. Private & Confidential A database containing images & profiles of RSCI entities (Religious, Social & Culturally Important Individuals) to aid a facial recognition software in identifying, recognising and providing information about these individuals Facial Recognition Security The Need Organizations need reference images and profile details about an important individual so that they may be able to identify, preempt or act based on Facial Recognition triggers Drivers - Security and Risk - KYC and Customer Loyalty Programs - Facility Risk - Authentication via Online Channels End Users - Banks & Financial Institutions - Law Enforcement - Airports & Casinos - Events & Retail 400K RSCI Profiles Market Size ~ $7.5 Billion Area of Deployment Generic facial recognition framework and process Facial Recognition
  • 22. Private & Confidential Developing and delivering primed account data assets for specific end- customer requirements, along with insights, KPIs and predictive analytics with the aim to increase conversion, ticket size and traction. Inside Sales Sales & Marketing The Need To reduce the cost of sales, customer acquisition and increase CLV, organizations globally have started using Inside Sales as the primary methodology of sales Drivers - Increasing Sales Costs - Targeting small and SME entities - Need to educate and engage prior to sales - Making smaller ticket size sales, viable End Users - SaaS companies with SME target Market - Organizations selling product bundles - Whitespace targeting firms 65 Million SMEs in India $10B India SMB SaaS Market Inside Sales requires high quality data, good context and a tech enabled ecosystem Inside Sales
  • 23. Private & Confidential The Harmonized Commodity Description and Coding System generally refers to “Harmonized System of Nomenclature” or simply “HSN”. It has been developed by the World Customs Organization (WCO). HSN Codes Tax & Trade The Need HSN is applicable in India after implementation of GST. The code is critical for businesses to be able to adhere with the GST norms and avoid penalties Drivers - HSN is applicable post GST - Confusion & ambiguity in relevant codes - Claiming input credit tax - Tax liability and penalties End Users - Global MNCs in India - Export and Import companies - Tax advisors & consultants 09024020 is the code for Black Tea sold as leaf in bulk, where 09 is the Chapter, 02 is the heading and 40 is the product code for Black Tea. 10 Million Combinations (5000 codes) 1.3 Million GST professionals The last 2 digits of 20 is code allotted by Indian taxation system for Black Tea sold in leaf form and in bulk. Had it been Black Tea bags then the last two digits of the HSN code would have been replaced with 40 instead of 20. HSN Codes
  • 24. Private & Confidential Contact contact@zigram.tech linkedin.com/zigram www.zigram.tech twitter.com/zigramt © Zigram Data Technologies Private Limited 2019. All information contained in this presentation is the IP of ZIGRAM. This presentation is meant only for the recipient. No part of this document may be reproduced / shared / divulged or referred to in part or in full without the prior written consent of ZIGRAM. The ideas / views presented in this document are those of ZIGRAM and may not be replicated or used without the written consent of ZIGRAM. While considerable care has been taken in gathering the thoughts/ information included in this document, ZIGRAM has not validated such information and hence does not confirm accuracy of such information. This document is preliminary in nature and is purely indicative of the approach recommended by ZIGRAM. facebook.com/zigram.tech zigram.tech/subscribe

Editor's Notes

  1. https://www.marketsandmarkets.com/PressReleases/cyber-security.asp