Customer Case Studies

News and opinion from the team behind the KeyLines network visualization toolkit

trust-hub: using graph technologies to power personal data compliance

9th April, 2018
Estimated reading time 5–8 minutes

We look at trust-hub’s Privacy Lens application to see how it uses KeyLines-powered graph visualization to help organizations map, understand, optimize and control the flow of personal data.

Logtrust: Democratizing real time big data

21st February, 2017
Estimated reading time 4–7 minutes

Democratizing Real time Analytics with KeyLines: Logtrust’s Story How Logtrust empowers analysts to harness the connections in their big data,…

| |

KeyLines chosen for new Police Contact Management Platform

10th January, 2017
Estimated reading time 4–6 minutes

Identifying Threat, Risk & Harm KeyLines has been incorporated into a new Microsoft Services platform for UK Police forces. The…

| | | | |

EclecticIQ: Understanding Cyber Threat Intel as a Graph

13th January, 2016
Estimated reading time 4–6 minutes

Cyber security start-up, EclecticIQ, builds a pioneering threat intelligence platform with KeyLines toolkit. Application bootstraps cyber intelligence activity by empowering…

| | |

Graphs and Cyber Security Intelligence

13th January, 2016
Estimated reading time 5–8 minutes

Cyber intelligence data is big, complex and varied. Graph visualization is fast becoming a ‘must-have’ technology tools for organizations serious about cyber threats. We caught up with Raymon van der Velde, Co-Founder and VP Product at EclecticIQ – an award-winning pioneer of graph-based cyber security tools – to learn more about what they are doing.

| | | |

iMapData: Integrated risk intelligence with KeyLines

23rd November, 2015
Estimated reading time 5–8 minutes

Screenshot of the AIMS™ social media exploration component, showing connections between corporations and other entities, derived from mentions on social…

Kantwert: Networks of authority

27th May, 2015
Estimated reading time 4–6 minutes

32 million business and political relationships analyzed and visualized using KeyLines and Neo4j First KeyLines graphs produced after just two…

|

Case Study: Insurance Fraud

5th May, 2015
Estimated reading time 4–6 minutes

KeyLines has been used to deploy sophisticated network visualization capability in many high profile and complex organizations. In 2013, we…

| | | | |

Case Study: Innovative CRM

6th March, 2015
Estimated reading time 3–4 minutes

Highlights At least one year of development time saved Dramatically faster product to market timescales New visualization capability adds ‘wow’…

| | |

CyberFlow: Securing the Internet of Things

16th December, 2014
Estimated reading time 4–6 minutes

Highlights KeyLines integrated into award-winning cyber security solution Designed to visualize thousands of entities in real-time Cloud and on-premise deployments…

| | |

Subscribe to our newsletter

Get occasional data visualization updates, stories and best practice tips by email