WYNYARD GROUP ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE. CONNECTING THE DOTS.



Similar documents
WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME

WYNYARD RISK MANAGEMENT POWERFUL SOFTWARE. CONNECTING THE DOTS.

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

Audit Management. service definition document

Service Definition Document

WebFOCUS Cloud Express. The WebFOCUS Cloud Express service is delivered as a managed G-Cloud service by Amtex Solutions Ltd.

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. DECEMBER 2013

PAAS Public Sector Managed Services

OPERATIONAL RISK MANAGEMENT & MODELLING FROM WYNYARD GROUP & EVMTECH

Physical Security Services

EmpLive Technical Overview

Agilisys G-Cloud Service V

SERVICE DEFINITION G-CLOUD 7 SECURE FILE TRANSFER DIODE. Classification: Open

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.

Caretower s SIEM Managed Security Services

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

G-Cloud Service Definition. Atos Accredited Oracle Business Intelligence Solutions SCS

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Service Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management

Amazon Relational Database Service (RDS)

Service Definition Nine23 MDM

Digital Forensics G-Cloud Service Definition

How To Create An Insight Analysis For Cyber Security

Lot 1 Service Specification MANAGED SECURITY SERVICES

AUSTRAC. supervision strategy

G-CLOUD FRAMEWORK SERVICE DEFINITION. Kofax Model Office Bundle Proposal ISSUE 1

<cloud> Secure Hosting Services

IBM G-Cloud Microsoft Windows Active Directory as a Service

Making critical connections: predictive analytics in government

Virtual Server Hosting Service Definition. SD021 v1.8 Issue Date 20 December 10

IBM QRadar as a Service

ACEYUS REPORTING. Aceyus Intelligence Executive Summary

Cloud Vendor Evaluation

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION

Kaseya IT Automation Framework

GPS G-Cloud Lot 4: Oracle Business Intelligence Cloud Consultancy Service Definition

<workers> Online Claims and Injury Management

Assuria from ZeroDayLab

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services

Simplify Your Network Security with All-In-One Unified Threat Management

Third Party Approval & Risk Management

Cloud Technology Platform Enables Leading HR and Payroll Services Provider To Meet Solution Objectives

Private Cloud. One solution managed by Applied

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

Customer Guide Helpdesk & Product Support. [Customer Name] Page 1 of 13

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

Platform as a Service

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

<risk> Enterprise Risk Management

Making Critical Connections: Predictive Analytics in Government

How To Protect Your Network From Attack From A Network Security Threat

Unicenter Asset Intelligence r11

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Xerox Workflow Automation Services Solutions Brochure. Xerox DocuShare 7.0. Enterprise content management for every organization.

United Nations Office on Drugs and Crime

SILOBREAKER ENTERPRISE SOFTWARE SUITE

Marval Software Limited. G Cloud iii Framework Service Definition

How To Use Concerto.Com

KNOW YOUR THIRD PARTY

Specific recommendations

Symantec ediscovery Platform, powered by Clearwell

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

Company Overview. Enterprise Cloud Solutions

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.

Firewall Administration and Management

GPG13 Protective Monitoring. Service Definition

Hosted SharePoint: Questions every provider should answer

The SIEM Evaluator s Guide

AVANTGARD Hosting and Managed Services

The Education Fellowship Finance Centralisation IT Security Strategy

Citrix XenApp Design & Implementation Service

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber Security Metrics Dashboards & Analytics

Defending against modern cyber threats

First Line of Defense

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION

Case Management powered by Microsoft Dynamics CRM

Riverbed SteelCentral. Product Family Brochure

SharePoint Microsoft SharePoint has become

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Amazon Compute - EC2 and Related Services

How To Protect Yourself Online

e2e Secure Cloud Connect Service - Service Definition Document

Office SharePoint Server 2007

Use of Exchange Mail and Diary Service Code of Practice

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

Transcription:

WYNYARD GROUP ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE. CONNECTING THE DOTS.

Wynyard Group Advanced Crime Analytics 1 POWERFUL SOFTWARE. CONNECTING THE DOTS. Government and financial institutions face challenges that continue to grow in scale, complexity and impact. These challenges include: Growth in the volume and sophistication of crime which includes violent offences, cybercrime, internal and external fraud, as well as money laundering, drug trafficking and other serious crimes. Managing exponential increases in data volumes that may be stored in disparate, siloed systems and the challenge of creating value from that information in order to address the threats of crime. Time and resource pressures, and highly organised criminal networks. At Wynyard Group, we understand these challenges and have been helping government and financial institutions globally to solve them. Wynyard s software enables its clients to gain a better understanding of the criminal environment as well as overcome issues of data silos, duplicate or conflicting data and share information securely for more effective outcomes. ADVANCED CRIME ANALYTICS RISK MANAGEMENT INVESTIGATIVE CASE MANAGEMENT Wynyard Group is a market leader in advanced crime analytics, risk management and investigative case management software. Built on a highly configurable platform, Wynyard s software can be deployed to meet a range of needs. Our team works with clients to design and configure solutions for their individual requirements. Wynyard s offerings include: DIGITAL FORENSICS Digital evidence investigator ADVANCED CRIME ANALYTICS Fraud analytics Anti-money laundering/counter-terrorism financing (AML/CTF) Serious and organised crime analytics Mobile device analytics Person of interest analytics Gun crime analytics INVESTIGATIVE CASE MANAGEMENT Financial crime investigations Breach and incident management Covert operations

2 Wynyard Group Advanced Crime Analytics ADVANCED CRIME ANALYTICS Wynyard s advanced crime analytics is a powerful software platform enabling the automatic identification of threats, vulnerabilities and connections within the ever-increasing amount of information available. Configured to meet specific needs and challenges of government and financial services agencies, Wynyard s advanced crime analytics software is used around the world to help in the fight against serious and organised crime, human trafficking, gun running, drug smuggling, fraud, anti-money laundering and counter terrorist financing. Advanced crime analytics helps by: Utilising operational and specialist resources more effectively Addressing the exponential increase in data Connecting complex and disparate data sets for a comprehensive view and better analysis Enhancing inter-agency co-operation Increasing efficiency by getting users to the answers faster Visualise and discover the relationships between entities in order to identify suspicious activities and determine causes Key features: Flexible rules management and transaction monitoring Rules can be created or modified at any time as information becomes clearer, business models evolve, new processes are introduced or regulations change. Context aware visualisation Uncover, visualise and analyse data and relationships or patterns that may otherwise remain hidden. Text mining Text mining aims to obtain valuable insights from large amounts of unstructured text. The software can automatically extract and classify entities and then connect and link these to other known entities to provide a comprehensive view of the data. Open source intelligence ingestion Open source intelligence (OSINT) including social media and news feeds can be used throughout Wynyard s solutions as a data source for intelligence gathering and network analysis purposes.

Wynyard Group Advanced Crime Analytics 3 Watchlists and screening Wynyard s system is fully integrated with world-leading watchlists from Dow Jones Risk and Compliance to provide complete and up-to-date data when screening people to identify politically exposed persons (PEPs) and their relatives or close associates (RCAs), special interest persons or entities (SIPs/SIEs) government sanctioned entities, and high-profile criminals. Powerful search and queries The Wynyard platform contains a high-performance, full-featured text search engine. It delivers ranked search results and supports many powerful query types including phrase queries, wildcard queries, fuzzy queries, proximity queries, and range queries. Highly configurable solutions Wynyard s advanced crime analytics platform is scalable both in terms of users and data volume and can be deployed agency wide and configured to address all analysis requirements. Alternatively it can be installed within a department or team to address a specific operational challenge. Wynyard advanced crime analytics for government provides capabilities such as: Mobile device analytics Gun crime analytics Serious and organised crime analytics Person of interest analytics Mobile device analytics Gun crime analytics Serious and organised crime analytics Wynyard advanced crime analytics for financial services provides capabilities such as: Fraud analytics to detect cross-channel or internal fraud, or anomalous fraudulent behaviours. It is designed specifically for insurers, banks and credit unions to aid in the rapid detection and prevention of fraud, to reduce the risk of loss and to increase the effective management of fraud across the organisation. Allowing organisations to build on traditional anti-money laundering/counter-terrorism financing detection, alerts and reporting, adding rules, analytics and visualisation capabilities. It allows risk mitigation by rapidly delivering enhanced due diligence integrated with industry-leading watchlists. ANALYSE DATA Identify: Linked incidents, entities, crime networks and locations PRODUCE EVIDENCE Prepare: Case graphics/timelines, link charts, evidence report INVESTIGATION APPLY ADVANCED CRIME ANALYTICS INTELLIGENCE-LED INVESTIGATIONS CASE REPORT PROSECUTE INCIDENT CASE

4 Wynyard Group Advanced Crime Analytics INVESTIGATIVE CASE MANAGEMENT Wynyard investigative case management is a comprehensive, highly configurable, secure, solution for managing investigations. Wynyard s software incorporates intelligence-led case management techniques and provides the tools for investigators to identify and act on critical information faster. Investigation teams and specialist departments face rising pressure to efficiently and effectively manage investigations and cases supporting at-risk individuals. Providing a 360 degree view of the case Wynyard s solution integrates reports, charts, evidence packs and data analysis capability streamlining investigations and enabling investigators to identify opportunities for both independent overt and covert activity, whilst simultaneously building the case file using standardised categories. Investigative Case Management helps by: Enhancing analysis and providing access to data in real time Enabling more effective and efficient case management Delivery of a granular security model designed to meet the highest security and privacy standards Integrating case management data with wider intelligence holdings Providing a complete view of the case Tracking of user s access and activity with comprehensive audit functionality Key features Complete Configurability Meet your specific requirements without incurring extra costs by configuring the solution in house. Intuitive Visualisation See a complete picture of the case by visualising all the key entities, relationships and events involved. Full Auditability Keep track of every user s access and activity with comprehensive audit functionality. Connect Intelligence and Investigations data together Combine case data with wider intelligence holdings by importing and exporting data into advanced crime analytics for more in depth analysis.

Wynyard Group Advanced Crime Analytics 5 Highly configurable solutions Wynyard s Investigative Case Management enables you to tailor the software to meet specific operational requirements for managing investigations, witness protection programmes, the protection of other at-risk individuals and any other type of operation. The solution can be deployed organisation wide to support all of your investigation and case management requirements or alternatively it can be deployed within a department or team to address a specific operational challenge. Wynyard s serious and organised crime case management software is purpose built to manage tasks, evidence and cases. Wynyard s software is highly secure and can be configured to support business processes to reduce manual processes and the duplication of effort. This enables investigative teams to work more efficiently. The integration of crime analytics enables intelligenceled operations so users can identify patterns, anomalies and relationships. Information is rapidly made available to frontline agents to solve serious crimes faster and disrupt organised criminal networks. The granular security model is a core component of the system and limits access to information based upon the case and the user s permissions. Witness protection case management is a secure, robust and configurable solution for managing the protection of victims, witnesses and associated people. This solution is purpose built for law enforcement agencies and designed to protect the integrity of investigations through effective action plan management and secure communication and collaboration. Wynyard s software has a comprehensive security model that is designed to isolate information with layered mechanisms in place to counter unauthorised access. Covert operations case management is a scalable, highly configurable, secure and comprehensive solution for covert operations. Wynyard s software is purpose built to protect all details of covert operations: the software has a proven and granular security model that is designed to isolate information; a series of layered defences limits the ability for users to access data; and an alert and audit system provides an additional layer to counter attempted or unauthorised access. All data, information, evidence and exhibits may be loaded into a single repository so that investigators and analysts can rapidly understand complex relationships and extract more value out of their information, which in turn reduces the time required to achieve operational benefits. EMPLOYEE INTERVIEWS BANKING RECORDS OPEN SOURCE INTELLIGENCE CCTV EMPLOYEE RECORDS EMAILS INCIDENT FILE OPENED INVESTIGATIVE CASE MANAGMENT REPORT AUTHORITIES NOTIFIED SUBSIDIARY COMPANIES ADVANCED CRIME ANALYTICS OTHER DEPARTMENTS OTHER INCIDENTS

6 Wynyard Group Advanced Crime Analytics DIGITAL EVIDENCE INVESTIGATOR Wynyard s digital evidence investigator software is a proven, purpose-built tool for investigators enabling rapid access and examination of digital evidence. The exponential growth in the number of devices seized as part of an investigation including CCTV footage, laptops, servers, mobile phones, game consoles and GPS units means that law enforcement agencies need to interrogate and analyse the content more efficiently. Wynyard s software enables frontline personnel to quickly identify which device or piece of information is relevant to the case. This reduces the need for extended custody periods and speeds up the judicial process. By allowing rapid access to digital content for investigative teams, Wynyard s solution allows evidence from the device to be introduced into the investigation at an early stage in the process and while the suspect is still in custody. Digital evidence investigator helps by: Providing rapid access to digital evidence for detectives and investigators Improving speed through the justice system Reducing forensic backlogs by managing the exponential growth in digital devices Delivering savings in financial and human resource by removing the reliance on specialist staff Key features: Analyse internet activity Utilising internet evidence finder inside the software enables a quick drill-down to analyse internet activity like Skype, Google searches, WhatsApp messages and many other communication methods. Automatic processing The processing engine can identify objectionable material such as images, videos and emails and then connect to external databases including INTERPOL, C4All, CETS and ANVIL for victim identification and rescue. Designed for investigators and detectives Keeps the investigation moving by enabling investigators familiar with the case to quickly produce actionable intelligence and evidential reports for prosecution. Integrate with advanced analytics Discover the relationships between acquired digital evidence and wider intelligence holdings by analysing the data and intuitively visualising the connections and networks.

Wynyard Group Advanced Crime Analytics 7 Design principles Reduce complexity Sequential processing model Simplified platform solution with commodity hardware Hardware-agnostic Increased performance Distributed and multi-threaded processing model enabling decreased time-to-completion of a single exhibit, or total processing throughput across all exhibits, or a combination of both Faster file I/O Enhanced operational impact Apple Mac O/S support C4ALL and local Image Hash database integration Enhance bookmarking and evidence tagging XRY and Cellebrite support Internet Evidence Finder (IEF) integration Increased forensic container support Terminology DEI implements the concepts of Cases, Exhibits and Media. A Case is a logical grouping of Exhibits and is identified using a case number. Another reference number (Operation name or other) can be attributed to a Case. An Exhibit is a logical grouping of Media and is identified using an exhibit number and a description. An exhibit is generally a computer, or other container that contains media. In the case of a piece of media that doesn t have a container object (e.g.; a hard drive, or USB stick found on a desk), then the exhibit and media are the same item. Media is a device or object that can contain electronic data. It typically represents hard disks, optical or other removable media. DEI functional areas Digital Evidence Investigator has a modern, adaptable and scalable architecture. The main functional areas are: The back-end (application tier), which contains the file processing agents. A front-end (client tier) browser based application used by investigators to serach, examine and bookmark the digital evidence. The third functional area is administration and security. These components provide full auditing and authorisation including the ability to manage users, cases, exhibits and security policy requirements. The software has removed an 18-24 month backlog. Our digital forensic specialists can now focus on more complex and high profile cases. Maarten Kleintjes MNZM, Manager National e-crime Group (Ret.) - NZ Police DEI SERVER NETWORK USER NETWORK DISTRIBUTED PROCESSING Web services SQL DATABASE STORAGE

8 Wynyard Group Advanced Crime Analytics TECHNICAL OVERVIEW On-boarding and off-boarding Wynyard provides a structured and managed process to support the efficient on-boarding of new customers ensuring that the operational benefit is rapidly achieved. This process is supported by an agile requirements capture process to ensure that Advanced Crime Analytics (ACA) is deployed in a configuration to maximise the achievement of key operational drivers as defined by the customer. The off-boarding processes are equally structured to ensure that the customer has a responsive and efficient mechanism to securely terminate utilisation of ACA or transition to an alternative solution. Data backup Wynyard provides a range of standard and bespoke data backup options (including Disaster Recovery services where required) to provide a proven solution to protect the integrity and security of the data within ACA. Database backup services incorporate encryption services to ensure that the security model is maintained when data backups are undertaken. If required, additional CESG approved infrastructure solutions can provide disk level encryption services to supplement the ACA database security model. Real-time database replication can be used to facilitate low impact online backups and, optionally, as a method to provide geographic disaster recovery of the intelligence database. Data restoration / service migration Wynyard provides a range of data restoration and service migration services that can be bespoke to a customer s specific requirements based upon the scope and complexity of the project. Data restoration services will be scoped as part of the overall service definition, either as a standard service or bespoke for specific customer requirements for business continuity and disaster recovery. Wynyard offers a range of service migration services that can be bespoke to meet both on boarding and off boarding activities. These services include: Service Design; Requirements capture and analysis; Development; Project Management; Transition Management. Connectivity The ACA application architecture utilises industry standard network protocols and services to provide a secure but flexible deployment model. HTTP and HTTPS protocols are utilised providing a simple to deploy but secure model to support the required level of accreditation. The ACA client is browser based and utilises only the HTTP/HTTPS protocols, simplifying customer network access requirements. Data integration The ACA solution provides a flexible data integration model to support the integration and ingestion of a wide range of data sources and structures as outlined below. ACA utilises an XML/XSD based framework for the ingest process, simplifying the source data mapping activities. The ACA solution supports a broad range of data integration capabilities, including: Structured data. E.g. CSV, Excel, JSON, XML; Unstructured data. Raw textual data. E.g. MS Word, PDFs, web articles, email, web blogs, reports etc; Semi-structured data. Raw textual data combined with structured data. E.g. email, interview transcripts, case notes, government forms containing free text fields. Where infrastructure and security factors permit, Extract, Transform and Load (ETL) and Enterprise Service Bus (ESB) integrations can also be supported. Wynyard would welcome discussions for bespoke integration of such services. User interface ACA supports a range of commercial browser solutions to provide the client presentation layer, which includes Microsoft Internet Explorer, Google Chrome, Firefox, etc. The browser can be configured to both utilise the default HTTP configuration as well as fully supporting HTTPS connectivity to the business logic tier of ACA. Secure Socket Layers (SSL) can be configured to the required levels of encryption to provide transport layer security. The ACA client therefore only requires HTTP/HTTPS protocols to be supported within the transport layer of the network it is installed in which simplifies firewall configuration requirements and provides a robust and secure architecture. Scalability ACA provides an extensible and open architecture which allows for the scaling of the solution to meet customer requirements as their operational utilisation grows. The ACA architecture utilises COTS products which provides a value for money solution to support step changes in the scaling of the solution. Information assurance ACA can be deployed at IL2 and above to meet customer specific requirements.

Wynyard Group Advanced Crime Analytics 9 UNSTRUCTURED DATA STRUCTURED DATA DATA MAPPING EXTRACT TRANSFORM RESULTS LOADED XEREM MODEL

10 Wynyard Group Advanced Crime Analytics WORKING WITH US Led by our professional services team and built over 20 years working in tandem with our clients in government and financial services, Wynyard s robust and proven solution implementation process brings together leading industry experts, data scientists and software engineers to design, configure and deploy advanced software solutions. Our team is made up of professionals with real world experience of our customers environments. Many of our team members come from the financial services, consulting and law enforcement sectors with experience in investigations, analytics, operational risks and financial crime applications. Throughout the design and delivery phase Wynyard ensure our clients work with a team who have a deep domain understanding of their challenges. SOLUTION DESIGN Requirements gathering and security analysis Solution design, data mapping and integration SOLUTION CONFIGURATION Define scope Workflow, alerts and security Dashboards WYNYARD PLATFORM THREAT ASSESSMENT ADVANCED CRIME ANALYTICS INVESTIGATIVE CASE MANAGEMENT Solution pilot Soft data models Visualisation CHANGE MANAGEMENT PROJECT MANAGEMENT Infrastructure and operation Support IMPLEMENTATION, OPERATION & SUPPORT Install Migrate Test Train users Go live

JIM OAKES Director Financial Crime Wynyard Group Jim Oakes has been with Wynyard Group since 2013 as the Director of Financial Crime. A former Fraud Squad Detective, Jim is a Certified Fraud Examiner and Certified Financial Crimes Investigator. He is an invaluable industry expert and advisor for Wynyard and brings over 30 years experience in Fraud, Security and Anti-Money Laundering. Jim has deep operational experience having operated as Financial Crime Director with some of the world s largest banks in countries across Europe, the Middle East, Africa, North America, and Asia. As organised crime continues to take advantage of new technologies and develops ever increasingly complex techniques to commit financial crime, the need for advanced crime analytics has never been greater.

12 Wynyard Group Advanced Crime Analytics TRAINING Wynyard adopts a train-the-trainer approach with its customers and offers the following training packages for all products. These can be modified and tailored to suit individual customer requirements. Application Admin Training: Includes user setup and day-today administration of the software. Super User Training: Includes training in advanced product functionality aimed at frequent users of the software. Business User Training: This includes training for normal usage of the software. IT Training: This includes training around operational maintenance, backups, recovery, installation etc.

Wynyard Group Advanced Crime Analytics 13 TEAM COMPOSTITION Wynyard provides expert maintenance and support services throughout the lifecycle of engagement with the customer. Our Professional and Technical Services teams are spread across the globe and come from a range of backgrounds that equip them with in-depth industry knowledge and expertise. Some members of Wynyard s global professional services and support team: SOLUTIONS ARCHITECTS: Architectural design for Wynyard solutions to meet unique client specifications. Support regional Wynyard sales and services teams in pre-sales, solution design and solution implementation. Configuration of the Wynyard platform based on customer goals and preferences. Provides expertise to identify and translate system requirements into software design documentation. SOLUTIONS CONSULTANTS: Analysis and definition of customer requirements by conducting client requirements workshops, functional design documents and configuration of software solutions. Designing, testing and implementing Wynyard solutions tailored to the specific needs of clients. Overall solution delivery of Wynyard solutions. TECHNICAL SERVICES AND SUPPORT CONSULTANTS: Implementation of Wynyard products at client site and post-implementation support. Providing application configuration and maintenance of Wynyard systems. On-site customer interaction and product training. Administering and diagnosing technical issues. WYNYARD SUPPORT SERVICES HELP DESK Wynyard Technical Services & Support (TSS) team provides application support to our global client base. Wynyard s experienced TSS consultants are supported by mature process and tools to provide improved support service levels. Customers can subscribe for 2nd line or 3rd line support to improve response and resolution time for user issues. Users can raise issues directly on a web based portal as well access Wynyard TSS consultants on our manned service desk number during normal business hours. The service is subject to maintenance windows and planned downtimes. Wynyard will provide monthly report on SLA performance and conduct periodic performance review of the support engagement.

SERVICE COVERAGE The Maintenance and Support Services provided by Wynyard comprise of the following: Services Description Corrective Maintenance Software Updates Documentation Updates Help Desk Service Site Attendance Monthly Fault Report Critical Support Hours Fixes to specific software faults which may include new versions of a program, patches or fixes, remedial software or workarounds, Wynyard reserving the right at all times to determine what is included and excluded in any corrective maintenance release. Interim updates to the software that may contain enhancements and bug fixes. Periodic or interim updates to software documentation. Help desk services are operated through the 24/7 customer portal or via email if the customer portal is unavailable; and is used for problem reporting, progressing resolution and general help. The attendance on site by a support consultant (at the client s cost) to assist in the provision of the maintenance and support services should it be deemed necessary by Wynyard. A monthly fault status report. 24 x 364 (excludes 25th of December). NORMAL SUPPORT HOURS All times based on the selected time zone: 08:00 18:00 Note: Category 1 faults are supported outside of normal support hours We also set categories of software faults, response times and action timetable for each category. The service levels relating to each category will be reviewed on an annual basis.

Wynyard Group Advanced Crime Analytics 15 ABOUT WYNYARD GROUP Know the threats, connect the dots & uncover the truth. Wynyard Group is a market leader in risk management and crime fighting software used in investigations and intelligence operations by government agencies and financial organisations. Wynyard solutions help solve and prevent crime, defend against advanced persistent cyber threats and counter terrorism. Wynyard s powerful software platform combines big data, advanced crime analytics and tradecraft to identify persons of interest, stop offenders and protect victims. Wynyard has more than 100,000 users of its solutions and offices in the United States, United Kingdom, Canada, United Arab Emirates, Australia and New Zealand. For more information visit www.wynyardgroup.com Toronto Arlington, VA London Dubai Sydney Auckland Wellington Christchurch FEMALE TRAFFICKING Wynyard Group Trans-national organised PIRACY crime movements Office locations DRUGS Female trafficking Piracy MIGRANT SMUGGLING Drugs FIREARMS Migrant smuggling COUNTERFEIT GOODS Firearms Counterfeit goods CYBER CRIME Cyber crime Contact us wynyardgroup.com advisor@wynyardgroup.com

16 Wynyard Group Advanced Crime Analytics Wynyard Group Advanced Crime Analytics