56 AST July 2021 | Page 38

38 www . AmericanSecurityToday . com July 2021 - Edition 56 Deep Web Data Aggrega- Deep Web Data Aggregation Like No Other . tion Like No Other . Conventional technologies rely Conventional technologies rely on a on a single platform or social single platform or social media API media API . Not Not Radi- Radiance ance , which uses , which uses concontinuous deep-web tinuous deep-web extraction extraction to ingest to ingest all all open source data . open source data . With With Radianc Radiance , the , the volumes of publicvolumes of publicly available ly available elecelectronic information tronic information are are cleaned cleaned and and prioritized prioritized , yield- , yielding relevant insights ing relevant insights into into high-risk inhigh-risk individuals , entities , events dividuals , entities , events , or sources or sources by agg by aggregating regating all the data scattered across all the data scattered across the Internet the Internet and me and measuring it asuring it against against config configurable BA urable BAMs Ms . Proprietary Risk Databas- Proprietary Risk Databases . es . Beyond the BAM search , Beyond the BAM search , Ra- Radiance diance cross-references cross-references ususer-enter er-entered names ed names with its with its proprietary , dynamic risk daproprietary , dynamic risk databases tabases . Name Name Extraction . Relation- Extraction . Relationship M ship Mapping . apping . Radian Radian INT ), Int INT ), Int Some Some

38 www . AmericanSecurityToday . com July 2021 - Edition 56 Deep Web Data Aggrega- Deep Web Data Aggregation Like No Other . tion Like No Other . Conventional technologies rely Conventional technologies rely on a on a single platform or social single platform or social media API media API . Not Not Radi- Radiance ance , which uses , which uses concontinuous deep-web tinuous deep-web extraction extraction to ingest to ingest all all open source data . open source data . With With Radianc Radiance , the , the volumes of publicvolumes of publicly available ly available elecelectronic information tronic information are are cleaned cleaned and and prioritized prioritized , yield- , yielding relevant insights ing relevant insights into into high-risk inhigh-risk individuals , entities , events dividuals , entities , events , or sources or sources by agg by aggregating regating all the data scattered across all the data scattered across the Internet the Internet and me and measuring it asuring it against against config configurable BA urable BAMs Ms . Proprietary Risk Databas- Proprietary Risk Databases . es . Beyond the BAM search , Beyond the BAM search , Ra- Radiance diance cross-references cross-references ususer-enter er-entered names ed names with its with its proprietary , dynamic risk daproprietary , dynamic risk databases tabases . Name Name Extraction . Relation- Extraction . Relationship M ship Mapping . apping . Radian Radian INT ), Int INT ), Int Some Some