Siren is a flexible, investigative intelligence platform that uses a data model to drive the discovery of associated data. Siren fuses previously-disconnected paradigms such as business intelligence (BI) dashboards, link analysis, content search, and operational monitoring.
See how Siren delivers a modern search experience for all users through the world’s only search-based investigative intelligence platform.
A data model (or ontology) is a formal representation of the entities and relationships that exist in a domain.
Traditionally, investigative software required the loading of data into a predefined data model.
With Siren, you can either clone the data or leave the data in the back-end system while you dynamically apply the data model and virtually transform it into a knowledge graph.
While previous semantic data model tools worked on very limited datasets, Siren Platform can work at scale and make use of your existing big data infrastructure.
Connect to Elasticsearch, RDBMs, graph databases, web services and more, with over 200 connectors.
Siren Investigate is the Siren Platform user interface. Powered by the data model, it coherently blends:
Powered by Elasticsearch, Siren offers an exciting basis for unstructured content search and analysis, including visual topic clustering.
The exploration happens in real time, with no pre-processing, so it works perfectly on live streaming data and investigation-specific content subsets.
Time is not just another variable in your data: It deserves top-of-the-line visualizations and tools.
Create timelines and investigate causal connections between events that are residing inside multiple or disconnected data sources.
With Siren Platform, you can:
Explore relations on maps and see the network evolution over time
Siren Investigate delivers a set of components that are capable of advanced multivariate correlations.
Among these are interactive speed scatterplots, heat maps, and parallel lines; visualizations that are key in advanced quantitative analysis.
Siren Investigate comes with built-in enterprise access control. Set your access control at the index, record or field level, audit user activity, and implement SSL and encryption at rest to protect data and communications.