The first step in adopting digital intelligence solutions is to
conduct a needs analysis of the areas in which your organization
requires enhanced capabilities today and to consider future
needs. Common examples include:
+ Investigating crime and terror activities
+ Identifying and preventing cyber-attacks
+ Detecting cryptocurrency crimes and deanonymizing their
transaction makers
+ Protecting critical infrastructure from physical attacks
Consider whether it makes sense to implement one, or multiple,
point solutions from separate vendors or to choose a platform-
based solution that supports multiple use cases.
INVESTIGATIVE AND THREAT
DETECTION USE CASES
Point solutions provide capabilities for a discrete purpose or
use case, e.g. open-source intelligence. Point solutions can be
effective in the short term, however, over time this approach
becomes impractical and costly, due to the fact that:
+ Integrating point solutions together is often difficult, and
as a result, this perpetuates the problem of data silos and
leads to an incomplete data view. In addition, there is a
missed opportunity in sharing analytical insights, threat
alerts and other data between different teams and their
technology systems.
+ Multiple technology stacks typically lead to a higher total
cost of ownership (TCO) over time as well as a tangle of
disconnected roadmaps and upgrade paths.
A Practical Guide to Adopting a Digital Intelligence Solution 5