NEXYTE Product Description Page 7 Example of data lineage 2.2 Data Flow Access Using NEXYTE’s ETL and API tools, customers can easily define access to governmental records (e.g. population registration, vehicle and vessels registrations), financial records, security agencies’ data (criminal records, border control information, License Plate Recognition tagging, surveillance cameras, forensics), intelligence collection and management systems, dedicated data systems (maritime and aviation information), ad hock input (flash-drive, user input) and many other relevant sources. + Federated ingestion. NEXYTE applies Ingestion federation to enrich collected data by adding data from external enrichment databases. The types of enrichment databases, whether third party industry databases, or proprietary customer databases, are determined according to customer needs, preferences, and agenda. + Tailored upload modes. Different sources and databases require different synchronization modes and upload schedules according to local regulations, or to comply with third party access policies. NEXYTE supports multiple synchronization modes including scheduled upload in batch or incremental modes or federated online mode for databases that are queried but are not uploaded into the system. + For intelligence collection systems, NEXYTE leans on decades of experience and know- how accumulated by Cognyte as a leader in these domains. This includes special connectors for network intelligence systems, open-source (OSINT) systems, cyber security systems, video surveillance systems, HUMINT data management systems and other highly sensitive intelligence collection and management systems. NEXYTE empowers customers with out-of-the-box connectivity to a diverse range of those systems. This comprehensive integration capability eliminates the need for additional modeling, enabling customers to effortlessly deploy and utilize the system. With NEXYTE, customers have the power to