NEXYTE Product Description Page 7
Example of data lineage
2.2 Data Flow Access
Using NEXYTE’s ETL and API tools, customers can easily define access to governmental records (e.g.
population registration, vehicle and vessels registrations), financial records, security agencies’ data
(criminal records, border control information, License Plate Recognition tagging, surveillance
cameras, forensics), intelligence collection and management systems, dedicated data systems
(maritime and aviation information), ad hock input (flash-drive, user input) and many other relevant
sources.
+ Federated ingestion. NEXYTE applies Ingestion federation to enrich collected data by
adding data from external enrichment databases. The types of enrichment databases,
whether third party industry databases, or proprietary customer databases, are
determined according to customer needs, preferences, and agenda.
+ Tailored upload modes. Different sources and databases require different synchronization
modes and upload schedules according to local regulations, or to comply with third party
access policies. NEXYTE supports multiple synchronization modes including scheduled
upload in batch or incremental modes or federated online mode for databases that are
queried but are not uploaded into the system.
+ For intelligence collection systems, NEXYTE leans on decades of experience and know-
how accumulated by Cognyte as a leader in these domains. This includes special
connectors for network intelligence systems, open-source (OSINT) systems, cyber security
systems, video surveillance systems, HUMINT data management systems and other highly
sensitive intelligence collection and management systems. NEXYTE empowers customers
with out-of-the-box connectivity to a diverse range of those systems. This comprehensive
integration capability eliminates the need for additional modeling, enabling customers to
effortlessly deploy and utilize the system. With NEXYTE, customers have the power to