All Videos Tagged systems (AnalyticBridge) - AnalyticBridge 2020-10-30T01:30:32Z https://www.analyticbridge.datasciencecentral.com/video/video/listTagged?tag=systems&rss=yes&xn_auth=no Intelligence Analysis: Centrifuge Visual Network Analytics 2.5 tag:www.analyticbridge.datasciencecentral.com,2011-11-03:2004291:Video:160285 2011-11-03T18:34:16.611Z Tony Agresta https://www.analyticbridge.datasciencecentral.com/profile/TonyAgresta <a href="https://www.analyticbridge.datasciencecentral.com/video/intelligence-analysis-centrifuge-visual-network-analytics-2-5"><br /> <img alt="Thumbnail" height="148" src="https://storage.ning.com/topology/rest/1.0/file/get/2178993540?profile=original&amp;width=240&amp;height=148" width="240"></img><br /> </a> <br></br>This short video demonstrates how to integrate data, create relationship maps and interactively visualize your data. The video uses passenger flight data for individuals arriving into the US. To learn more please visit… <a href="https://www.analyticbridge.datasciencecentral.com/video/intelligence-analysis-centrifuge-visual-network-analytics-2-5"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2178993540?profile=original&amp;width=240&amp;height=148" width="240" height="148" alt="Thumbnail" /><br /> </a><br />This short video demonstrates how to integrate data, create relationship maps and interactively visualize your data. The video uses passenger flight data for individuals arriving into the US. To learn more please visit <a href="http://www.centrifugesystems.com">www.centrifugesystems.com</a> Cyber Security Analysis - Part 3 - Centrifuge Systems tag:www.analyticbridge.datasciencecentral.com,2010-09-29:2004291:Video:79658 2010-09-29T20:16:47.063Z Tony Agresta https://www.analyticbridge.datasciencecentral.com/profile/TonyAgresta <a href="https://www.analyticbridge.datasciencecentral.com/video/cyber-security-analysis-part-2"><br /> <img alt="Thumbnail" height="180" src="https://storage.ning.com/topology/rest/1.0/file/get/2178993758?profile=original&amp;width=240&amp;height=180" width="240"></img><br /> </a> <br></br>This 5 minute video shows cyber analysts how they can integrate 3rd party data using Centrifuge 2.0. See how you can turn suspicious network traffic into real contact information for the investigation. Learn how to apply advanced link analysis to pinpoint your… <a href="https://www.analyticbridge.datasciencecentral.com/video/cyber-security-analysis-part-2"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2178993758?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />This 5 minute video shows cyber analysts how they can integrate 3rd party data using Centrifuge 2.0. See how you can turn suspicious network traffic into real contact information for the investigation. Learn how to apply advanced link analysis to pinpoint your investigation. Cyber Security Analysis - Part 2 - Centrifuge Systems tag:www.analyticbridge.datasciencecentral.com,2010-09-29:2004291:Video:79655 2010-09-29T20:14:04.682Z Tony Agresta https://www.analyticbridge.datasciencecentral.com/profile/TonyAgresta <a href="https://www.analyticbridge.datasciencecentral.com/video/cyber-security-analysis-part-1"><br /> <img alt="Thumbnail" height="180" src="https://storage.ning.com/topology/rest/1.0/file/get/2178992937?profile=original&amp;width=240&amp;height=180" width="240"></img><br /> </a> <br></br>This short video shows cyber analysts how they can quickly pinpoint cyber security problems using relationship graphs in Centrifuge 2.0. See how you can use data-driven relationships graphs to speed up your… <a href="https://www.analyticbridge.datasciencecentral.com/video/cyber-security-analysis-part-1"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2178992937?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />This short video shows cyber analysts how they can quickly pinpoint cyber security problems using relationship graphs in Centrifuge 2.0. See how you can use data-driven relationships graphs to speed up your investigation. Cyber Security Analysis - Part 1 - Centrifuge Systems tag:www.analyticbridge.datasciencecentral.com,2010-09-29:2004291:Video:79652 2010-09-29T20:09:59.996Z Tony Agresta https://www.analyticbridge.datasciencecentral.com/profile/TonyAgresta <a href="https://www.analyticbridge.datasciencecentral.com/video/cyber-security-analysis-part"><br /> <img alt="Thumbnail" height="180" src="https://storage.ning.com/topology/rest/1.0/file/get/2178992946?profile=original&amp;width=240&amp;height=180" width="240"></img><br /> </a> <br></br>This short video shows cyber analysts how they can quickly detect data anomalies that indicate a cyber data breach using Centrifuge 2.0. See how you can apply our Flexible Workspace to analyze multiple visualizations… <a href="https://www.analyticbridge.datasciencecentral.com/video/cyber-security-analysis-part"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2178992946?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />This short video shows cyber analysts how they can quickly detect data anomalies that indicate a cyber data breach using Centrifuge 2.0. See how you can apply our Flexible Workspace to analyze multiple visualizations simultaneously. Fraud Analysis Using Centrifuge Data Visualization tag:www.analyticbridge.datasciencecentral.com,2010-04-23:2004291:Video:67271 2010-04-23T18:35:08.816Z Tony Agresta https://www.analyticbridge.datasciencecentral.com/profile/TonyAgresta <a href="https://www.analyticbridge.datasciencecentral.com/video/fraud-analysis-using"><br /> <img alt="Thumbnail" height="180" src="https://storage.ning.com/topology/rest/1.0/file/get/2178992558?profile=original&amp;width=240&amp;height=180" width="240"></img><br /> </a> <br></br>This short video shows you how to apply data visualization techniques to identify fraud. The analyst uses charting, mapping and link analysis as he analyzes a series of fraud alerts across banking business lines. Watch him connect the… <a href="https://www.analyticbridge.datasciencecentral.com/video/fraud-analysis-using"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2178992558?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />This short video shows you how to apply data visualization techniques to identify fraud. The analyst uses charting, mapping and link analysis as he analyzes a series of fraud alerts across banking business lines. Watch him connect the dots.