The first step in adopting digital intelligence solutions is to conduct a needs analysis of the areas in which your organization requires enhanced capabilities today and to consider future needs. Common examples include: + Investigating crime and terror activities + Identifying and preventing cyber-attacks + Detecting cryptocurrency crimes and deanonymizing their transaction makers + Protecting critical infrastructure from physical attacks Consider whether it makes sense to implement one, or multiple, point solutions from separate vendors or to choose a platform- based solution that supports multiple use cases. INVESTIGATIVE AND THREAT DETECTION USE CASES Point solutions provide capabilities for a discrete purpose or use case, e.g. open-source intelligence. Point solutions can be effective in the short term, however, over time this approach becomes impractical and costly, due to the fact that: + Integrating point solutions together is often difficult, and as a result, this perpetuates the problem of data silos and leads to an incomplete data view. In addition, there is a missed opportunity in sharing analytical insights, threat alerts and other data between different teams and their technology systems. + Multiple technology stacks typically lead to a higher total cost of ownership (TCO) over time as well as a tangle of disconnected roadmaps and upgrade paths. A Practical Guide to Adopting a Digital Intelligence Solution 5