Use Cases

News and opinion from the team behind the KeyLines network visualization toolkit

Graph visualization use cases: part 3

6th November, 2017
Estimated reading time 5–8 minutes

This is our third and final post looking at real-world uses of graph visualization. First we explored how link analysis…

| | | | | | | | |

Graph visualization use cases: cyber security

25th September, 2017
Estimated reading time 4–7 minutes

Our last blog post was the first of three exploring real world applications for graph visualization. Use cases for graph…

| |

Enterprise Fraud Management: Investigation v Detection

21st June, 2017
Estimated reading time 5–8 minutes

We’ve written about fraud as a connected data problem before. We’ve shown how the key to fraud insight lies in…

| |

Restricted substance compliance – a data visualization challenge?

13th June, 2017
Estimated reading time 6–10 minutes

Managing restricted substances Have you ever wondered about the parts that make up your car, and what they’re made of?…

| |

Making sense of Cyber threats with graph technologies

12th May, 2017
Estimated reading time 5–8 minutes

Graph visualization is a vital component of any cyber security strategy. Without it, analysts struggle to uncover insight from complex…

| |

Using graph technologies to weed out fake news

28th February, 2017
Estimated reading time 8–13 minutes

Fake news is nothing new – bad journalism and propaganda have always existed – but recent concerns about its affect…

Graph visualization and law enforcement data

20th February, 2017
Estimated reading time 6–9 minutes

This blog post looks at how KeyLines can visualize the range and volume of data generated by law enforcement. In…

| | | |

Untangling the hairball: Visualizing Donald Trump’s network

6th February, 2017
Estimated reading time 6–10 minutes

A few weeks ago, four investigative journalists from Buzzfeed released an intriguing new dataset­­ called TrumpWorld. It’s a valiant attempt…

| | |

KeyLines chosen for new Police Contact Management Platform

10th January, 2017
Estimated reading time 4–6 minutes

Identifying Threat, Risk & Harm KeyLines has been incorporated into a new Microsoft Services platform for UK Police forces. The…

| | | | |

Visualizing Cyber Security Graphs: Data Breaches

29th April, 2016
Estimated reading time 5–8 minutes

Visualizing the VERIS community database of data breaches: How graph visualization can help us extract insight from cyber security data.

Subscribe to our newsletter

Get occasional data visualization updates, stories and best practice tips by email