Cognyte I Actionable Intelligence for a Safer World 12 DEPENDENT ON THIRD PARTIES: Adding sources and making ongoing changes requires professional services and coding by external contractors/vendors, thus preventing organizations from reacting quickly to new threats and changes in their mandate. DIFFICULT TO UPGRADE: They are typically built as customized projects with a combination of separate products (each with a separate codebase and product roadmap), therefore upgrades are painful and costly. REQUIRE EXTENSIVE CUSTOMIZATION: Modifying generic business intelligence and data analytics software to try to address the nuanced and specific needs of security teams, such as case management workflows and security permissions, requires extensive customization. Not only is this very costly, but the results are usually less than optimal. RISKY AND TIME CONSUMING: They are typically built with complex integrations and patches, and as a result, often fail to deliver a working solution. Moreover, each project takes a great deal of time to build - and by the time the system is deployed, critical opportunities may have been missed. PROPRIETARY SOLUTIONS HAVE SIGNIFICANT LIMITATIONS In the past, organizations often built their own proprietary solutions with the help of system integrators and internal resources. However, these approaches are no longer sustainable because proprietary homegrown solutions have significant limitations in terms of keeping pace with the rapid evolution of technology, and moreover, they are: TREND 3: SECURITY ORGANIZATIONS ARE INCREASINGLY ADOPTING OPEN ANALYTICS PLATFORMS