Nuix Insight Analytics & Intelligence

Nuix Insight Analytics & Intelligence is a powerful data analysis platform that makes it superiorly intuitive to extract and interact with intelligence from nearly any data source or file type. From security and forensic use cases like conducting digital investigations and detecting insider threats, to solving complex data analysis projects, Nuix Insight Analytics & Intelligence delivers insights into otherwise overlooked or unnoticed activity.

Nuix Insight Analytics & Intelligence analyzes data in four dimensions—people, objects, locations, and events (POLE)—augmenting digital evidence with human context to simplify investigations and data analysis. The POLE framework automatically correlates data to show connections between these four dimensions and displays them in a graph-like visualization, allowing professionals of all levels of expertise to quickly see and drill down into the hidden relationships in their data without requiring advanced skills.

Nuix Insight Analytics & Intelligence analyzes people, objects, locations, and events

Gather Data from Virtually Any Source

Leveraging the patented Nuix Engine for parallel data processing, Nuix Insight Analytics & Intelligence can gather and process anything from a few files to petabytes of data at superior speeds. From local and cloud stores of user and system files, to emails, virtual machines, databases, mobile images, and hundreds more systems and file types, Nuix Insight Analytics & Intelligence makes sure your investigations and data analysis projects are thorough and complete.

Analyze Data Intuitively, No Expertise Required

Traditional analytics products can be quite cumbersome, requiring data science expertise or reliance on professional services to be of use. Nuix Insight Analytics & Intelligence features easy-to navigate graph and timeline analysis to visually examine data, and get all of the necessary details—including file metadata and text—that can help solve your investigation or data analysis project. Analysts can also run or customize analysis scripts to apply intelligence filters to their data, or leverage a pre-built solution pack to focus on a specific use case.

Understand Scenarios and Investigate Confidently

Nuix Insight Analytics & Intelligence enables analysts to trace POLE elements through the most complex chain of evidence visually, making it extremely easy to investigate, drill down, and understand any scenario. Analysts can iteratively query, analyze, and gain insight into the data and share conclusions with other stakeholders, make informed decisions, and take the necessary next steps.

Speed & Scale Of Insight

Nuix Insight Analytics & Intelligence offers you a ground-control view of all your active cases so you can easily manage multiple investigations and data analysis projects simultaneously, regardless of size or scope. It features a dedicated processing engine to ensure you get the right data in fast, accelerating the speed of your analysis. All data is stored in a distributed search and analytics database, designed for horizontal scalability, reliability, and easy management. You can restrict or grant access and visibility by setting user permissions based on role. Also, you have the ability to handle platform deployment and infrastructure management in the Admin Console.

Nuix Insight Analytics & Intelligence

Superior File Support

Your security investigations are not complete if your data analysis can only support a limited number of file formats and evidence sources.

Nuix Insight Analytics & Intelligence analyze data from over 600 sources and MIME types, even complex ones that competing products typically overlook:

  • Email and Loose Files
    • Microsoft Office files
    • Microsoft Exchange
    • Lotus Notes
    • Webmail
    • Browser history, cache, bookmarks, and downloads
    • HTML, Plain text, RTF, PDF
  • Incident Response
    • Forensic images
    • Log files
    • Network captures
    • System files
    • File system artifacts
    • Fuzzy hashing – SSDeep
  • Miscellaneous
    • Structured data
    • Browser and cloud artifacts
    • Container files
    • Virtual machine images
    • Archive systems
    • DMS systems
    • Unknown file systems (text is stripped)