Uploaded by trinhcuong1198

TigerGraph Introduction

advertisement
STRICTLY PRIVATE AND CONFIDENTIAL
Making Advanced Analytics Better With Graph
An Introduction to TigerGraph
Pawan K Mall
Senior Solution Engineer
Founded in 2012 , HQ in
Redwood City, California
Global Presence - 2022
40 Countries covered
Enterprise Scale,
40-300x faster than
competition
Foundational for AI
and ML solutions
Global Presence
Series C Funded -($105Mn-Tiger
Global Management)
Total Funding : 170Mn+
APJ Presence
Operations in India,
Singapore, Malaysia, S Korea,
China, Japan, Philippines,
Indonesia & ANZ
CONFIDENTIAL
Workload drives database choice
Key value
Document
Relational
Graph
High speed storage/retrieval apps
Front-end apps with
unstructured data
Transactional systems of record
with structured data
AI/ML powered apps and
wider, deeper analytics
Order1
Product
Order2
Product
Customer
Customer
●●●●
●●●●
●●●●●●
●●●●
Customer
●●●●
●●●●●●
●●●●
Location 1
Payment
●●●●
Order
Order
●●●●
Order3
Merchant
Order4
●●●●
●●●●●●
●●●●
●●●●
●●●●●●
●●●●
Merchant
Supplier
Supplier
•
Supplier
Merchant
Product
●●●●
Shopping carts, real-time bidding,
messaging and chats
•
Gaming, content management,
mobile apps, IoT
●●●●
•
Queries
Simple
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM
Location 2
Customer billing, payroll,
inventory monitoring, bank accounts
•
Fraud detection, compliance, supply chain, customer 360,
predictive maintenance
Complex
3
1. Connect
CONFIDENTIAL
Relational databases don’t tell the whole story
Relational databases store facts in tables
Graph databases view the world as it is
David
Name
Location
Product
Bank
⚫
John
Palm Springs
iPhone
JPM Chase
⚫
David
Los Angeles
MacBook
Capital One
⚫
Lisa
San Francisco
Watch
JPM Chase
⚫
Jim
Palm Springs
iPad
Capital One
⚫
Sally
San Francisco
Watch
HSBC
⚫
Steve
Los Angeles
iPhone
JPM Chase
⚫
Lisa
Siblings
iPhone
Capital One
San
Francisco
Resides
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM
Resides
Jim
JPM Chase
HSBC
Watch
Coworkers
Steve
Limited scalability for analytics
Los
Angeles
Palm Springs
John
MacBook
• Cannot easily model indirect relationships
• Cannot run queries across data sets without slow joins
• Cannot add new relationships without schema changes
iPad
Sally
• Flips the perspective from facts to relationships
• Scales massively without sampling
• Faster queries at greater depth
Rich, intuitive analysis
5
Deep Link Analysis Example
Fraud Detection in Financial Services(Payments)
Used_with
Phone_number 1
Device 1 (phone)
Sends_payment
Sets_Up
Hop 1
User 1
Account 1
Payment 1
Hop 2
Email 1
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
Credit Card
Learn more by reading this article: How the World’s Largest Banks Use Graph Analytics to Fight Fraud
Technology Difference
Regular Analytics (Shallow)
vs
Advanced Analytics(Deep) with TigerGraph
Phone_number 2
Hop 5
Device 101
Used_with
Phone_number 1
Hop 6
Phone_number 101
Has
Hop 4
Device 1 (phone)
Account 101
Stolen Credit Card
Sends_payment
Sets_Up
User 1
Account 1
Sets_Up
User 2
Hop 1
Hop 3
Payment 1
Payment 101
Hop 2
User 101
New accounts 1 & 2 - linked back to device
101 used for prior fraudulent payment 101
& account 101 - Payment 1 rejected!
User 1 & User 2 flagged for investigation.
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
Email 1
Credit Card
Account 2
Bank
7
2. Graph Algorithms
7 Key Data Science Capabilities Powered By A Native Parallel Graph
Multi-dimensional Entity &
Pattern Matching
Deep Link Analysis
A
1
2
Query Pattern P
Relational Commonality
Discovery and Computation
3
A
Hub & Community Detection
4
Community 1
Match
B
C
D
From a set of entities (e.g. customers,
accounts, doctors), show all links or
connections
B
Given a pattern (e.g. a type of
suspicious activity), find similar
patterns in the graph
Given 2 entities (e.g. customers,
merchants, devices), follow their
relationships to find commonality
Community 2
Find most influential members
(customers, doctors, citizens) & detect
community around them
5
Geospatial Graph Analysis
Analyze changes in entities & relationships with location data
6
Temporal (Time-Series) Graph Analysis
Analyze changes in entities & relationships over time
7
Machine Learning Feature Generation & Explainable AI
Extract graph-based features to feed as training data for machine
learning; Power Explainable AI
© 2022 TigerGraph. All Rights Reserved
Centrality
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
10
Community
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
11
Similarity
Same as
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
Algorithm Types
❏ Centrality
Assign numbers or rankings to each vertex corresponding to their network position
❏ Classification
Classify the vertices into sets according to some external rule
❏ Community
Group the vertices so that each group is densely connected
❏ GraphML/Embeddings
Convert the neighborhood topology of each vertex into a fixed size vector of decimal values
❏ Path
Find the best paths from one vertex to another (shortest, lowest weight, or other criteria)
❏ Similarity
Compute similarity between pairs of items
❏ Topological Link Prediction
Predict the existence of a link between two entities in a network
❏ Frequent Pattern Mining
Find subgraph patterns that occur the most frequently
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
13
Algorithms
❏
❏
Centrality
■ PageRank
■ Article Rank
■ Betweenness
■ Closeness
■ Degree
■ Eigenvector
■ Harmonic
■ Influence Maximization
Community
■ Connected Components
■ K Core
■ K Means
■ Label Propagation
■ Local Cluster Coefficient
■ Louvain
■ Speaker-Listener Label
Propagation
■ Triangle Counting
❏
❏
❏
GraphML/Embeddings
■ FastRP
■ Node2Vec
Path
■ Astar_shortest_path
■ BFS
■ Cycle_detection
■ Estimated_diameter
■ Maxflow
■ Minimum_spanning_forest
■ Minimum_spanning_tree
■ Shortest Path
Classification
■ Greedy Graph Coloring
■ Maximal_independent_set
❏
Similarity
■ Cosine
■ Jaccard
■ K Nearest Neighbors
■ Approximate Nearest
Neighbors
❏
Topological Link Prediction
■ Adamic Adar
■ Common Neighbors
■ Preferential Attachment
■ Resource Allocation
■ Same Community
■ Total Neighbors
Frequent Pattern Mining
■ Apriori
❏
Some of these, such as Shortest Path and PageRank, have
several variations, so the total number is over 50.
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
14
3. Improve ML with Graph
features
Machine Learning has reached a limit in accuracy
● You can only squeeze so
much out of what you
have.
● Tuning your ML algorithms
can only yield diminishing
returns.
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
16
Top banks have used graph features to get a
quantum leap in detection rates
Core
Systems
4 tier 1 US Banks are using TigerGraph in production to
generate Graph Features for their existing AI fraud
detection systems.
●
●
●
One bank reported a 20% increase in synthetic
identity fraud detection using TigerGraph.
Another told us that TigerGraph was by far the best
technology ROI from their technology investments
that year, and it is making them $100 million pa.
JPMorgan Chase gave TigerGraph the coveted Hall of
Innovation Award 2021.
Data
Lake
Graph Database
ML Feature
Generation
Graph Features
Fraud Detection
Application
Investigation
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM
17
ML Generalisation
Data
Features
Model
Output
Conventional feature
engineering pipeline
Combine
Features
Structure as a graph
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM
Graph
feature
engineering
ML
Test, Train,
Predict
20%+
Uplift in
Accuracy
18
CONFIDENTIAL
Graph databases make AI/ML models faster and more accurate
Richer, smarter data
Deeper, complex
questions
Accelerated
performance
Explainable results
• Relationships-as-data
• Connect different datasets, break down silos
% of data and analytics
innovations using graph
technologies –
80
%
• Look for semantic patterns (implicit relationships)
• Easily and quickly search far and wide
• High-speed queries
• Relationship powered algorithms and machine
learning
• Intuitive models, queries and answers
• Visual exploration and results
10%
2021
2025
Source: Gartner
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM
19
Graph database use cases
Powered by Machine Learning and AI
Supply Chain Management
Fraud Detection
and Prevention
Knowledge Graphs
Investment
Opportunity Analysis
Law Enforcement
Network & IT Resource
Utilization
Recommendation
Systems
Product and Service
Marketing
Drug Reaction Analysis
Entity Resolution
Cybersecurity
Social Network
Analysis
Customer 360
Influencer & Community
Identification
Data Lineage
CONFIDENTIAL
Best of breed graph platform powered by a native distributed GraphDB
Tools
User Interface
AI / ML
ML
Workbench
Performance
Deployment
Graph Data
Science Library
Visualization Toolkits
Customer
360
Financial
Crimes
Connectors
Supply
Chain
Deep analysis
Extreme scalability
Real-time
In-database analytics
Search for patterns
across 5-10+
relationship hops
Automatic storage partitioning
and massive parallel
processing
Query speeds 40-300x faster
than any other graph database
Continuous graph-based
feature generation and training
Self-managed
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM
Cloud DBaaS
21
CONFIDENTIAL
Seamless integration with modern cloud infrastructure
BUSINESS APPLICATIONS
DATA SOURCES
Restful APIs
Visual design
DATA USES
GSQL queries
Data Clouds
Machine Learning
ML
Workbench
Enterprise Apps
Graph Storage
Engine
Graph Processing
Engine
Artificial Intelligence
Analytics
Relational DBs
Visualization
Business Intelligence
Streaming
Self-managed
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM
Cloud DBaaS
22
Financial Services
Impact Analysis:
Communities or
Clusters impacted
by the fraud rings
8 of the Top
10 Global
Banks Use
TigerGraph
Credit Card Fraud:
Is applicant
connected to
potential fraudsters?
Merchant Analytics:
Transaction
sequencing to detect
geolocation proximity.
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
Trade
Surveillance:
Are employees
following the
rules?
Credit Scoring:
Real-time credit
scoring to help
recommend
offers best suited
to customer
profiles?
Wealth
Management:
What Accounts,
HNI to target for
stocks or life
change events.
24
Use Cases
Key Drivers
Strategic Objectives
Example Use Cases
Trade Optimization | Portfolio
Core Business Platform
Increase
Revenue
(make money)
$↑
Customer Experience
(CX)
Digital
Transformation
KYC - Customer Journey
Execs & Mgt
Cross Sell | Upsell
Fraud Analysts
Churn Avoidance
ML & Data Science
Audit | Compliance
$
Business
Value
Roles /
Persona Types
Decrease
Costs
Increase Operational
Efficiency
Fraud Prevention - AML, Cyber, etc
(save
money)
$↓
Risk & Segmentation
Migrate to Cloud
Trade & Sanctions
Disputes & Claims
Mitigate Risk
Material C360
Detection
Audit & Governance - Data Providence
(protect money)
$↔
Audit, Regulatory
Compliance Process & Regulatory
Technical Teams
Graph usecases for financial services
Corporate Bank
Customer 360 - generate
revenue with personalised
and targeted experiences
AML - detect networks of
people and transactions
Fraud Prevention - detect
unlikely payments
KYC - determine the
legitimacy of the customer
identity
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
Private Bank
Retail Bank
Financial Crimes Solution Goals
●
Increase Accuracy - Human and Algorithms
(e.g., False Positives)
●
Decrease False Positives - Capture and incorporate
human instincts and expertise (esp for expert users)
●
Increase Speed & Efficiency - More accurate and trusted
outcomes (both automated & human)
●
Adapt to changes - Alert and ‘Quarantine’ transactions on
lesser seen cases, etc.
●
Continuous improvement - A system that can learn,
adapt & get better over time
●
Utilize My Current Tech - May have 3rd Party (Actimize,
Cybersource, etc) - Bolt on and make better
27
Deep Link Analysis Example
Fraud Detection in Financial Services(Payments)
Used_with
Phone_number 1
Device 1 (phone)
Sends_payment
Sets_Up
Hop 1
User 1
Account 1
Payment 1
Hop 2
Email 1
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
Credit Card
Learn more by reading this article: How the World’s Largest Banks Use Graph Analytics to Fight Fraud
Technology Difference
Regular Analytics (Shallow)
vs
Advanced Analytics(Deep) with TigerGraph
Phone_number 2
Hop 5
Device 101
Used_with
Phone_number 1
Hop 6
Phone_number 101
Has
Hop 4
Device 1 (phone)
Account 101
Stolen Credit Card
Sends_payment
Sets_Up
User 1
Account 1
Sets_Up
User 2
Hop 1
Hop 3
Payment 1
Payment 101
Hop 2
User 101
New accounts 1 & 2 - linked back to device
101 used for prior fraudulent payment 101
& account 101 - Payment 1 rejected!
User 1 & User 2 flagged for investigation.
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
Email 1
Credit Card
Account 2
Bank
29
Real-Time Fraud Detection & Prevention
Customer
Activity
T1
T2
T3
T4 (Fraud)
1
T4
TigerGraph can leverages rules:
●
Basic relational logic
●
Graph based logic
3
T1
T2
Data Ingest,
Matching,
And In-DB
Pattern Matching
1
Location comparison:
● High-risk location
● Compare to previous
location
2
Link analysis: 4 hops to fraud
community
C1
T3
Matched rule
2
FC1
3
High Risk Alert
Alert
Yes
Investigator
Investigate
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
No
Link analysis:
● community detection included in fraud
community
Link analysis: direct relation
with fraud community
30
TigerGraph Fraud Platform vs Other Fraud Applications
Incremental business value
Fraud Capabilities
Entity Resolution
Customer 360
Risk Scoring
Threat/Pattern
Detection
Enable cross-system
matching even when
matching IDs are not
available
Increase fraud
detection accuracy by
using all relevant
customer context
Take a weighted
approach to avoid
high numbers of false
positives
Auto-detect fraud
risks so that they can
be dealt with
appropriately
In-Database Fraud
Detection
Deep-link
In-Database Fraud
Detection
Real-time
Detection at any
Data Volume
Process fraud logic in
the same platform
with data – no data
copy & redundancy
Catch all convoluted
and sophisticated
fraud, not just fraud
that’s easy to spot
Prevent fraud in realtime regardless of the
scale of data required
to catch it
Cannot handle 4+
hops/connections
analysis
Cannot scale to
terabytes of data
Other Graph
Platforms
Legacy Fraud
Detection Application
ACI PRM
Common
issue:
Huge bottleneck to join all information
Traditional Fraud
Detection Application
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM | CONFIDENTIAL INFORMATION |
Extensive data preparation process
before using the software
Data duplication
for fraud and other
analysis activities
TigerShield Anti-Fraud Solution Focus
Account
Monitoring
health scanning, risk
Transaction
Monitoring
Fastest Graph Analytic with
Distributed MPP Architecture
for Unlimited Data
(<100ms for 10TB of data)
Easy to Integrate and
consolidate all data sources
(structured + unstructured
data)
Deep Linked Analytics
(10+ hops to find the
hidden Fraudster)
Fastest ROI
Shortest Time to
Implement and Use
Ready to Use Toolkit
Built for and used by
Fraud Investigators
money movement, payer-payee
collusion, account takeover
Fraud Detection
Identify Fraud at account
opening, credit abuse,
synthetic ID
Open Source Algorithms
Highly customizable
(no blackbox and vendor lock-in)
TigerGraph Graph Studio
●
●
●
●
Design schema
Load data
Explore Graph
Run Graph Queries
© 2022 TigerGraph. All Rights Reserved
33
Financial Crimes Workbench
●
●
●
●
Rules / Alerts
Dashboards
Analytics
Case & Alert Mgt
© 2022 TigerGraph. All Rights Reserved
34
AML Explorer Workbench
VALUE PROP
User Specific UI & Workflow
ROI
●
●
●
●
Increase Accuracy & outcomes
Better returns/otherwise missed
opportunities
Deep link patterns for regulatory audits
Cost of manually tracking and complexity
ML + GRAPH MODEL
Temporal deep learning & Connections
●
Deep Links, No-Code Investigation
●
Pattern & Community Algorithms
●
Deep learning/Model interpretability
© 2022 TigerGraph. All Rights Reserved
35
Anti Money Laundering
Cutting Through Layers of Synthetic Identities & Accounts To
Find Money Laundering
Visit the solution page - https://www.tigergraph.com/solutions/anti-money-laundering-aml/
© 2019 TigerGraph. All Rights Reserved
37
Why does Graph create new KYC opportunity in
addition to existing KYC automation?
Step 1: Build the identity graph
Personal ID Data
Robert Evans
r.evans@gmail.com
07777444333
Brand Marketer
PEP List
Robert Evans
07888999888
Corruption List
Rob Evans
r.evans@gmail.com
Law Enforcement Data
Rob Evans
07777444333
bob.e@gmail.com
Social Media Data
Bob Evans
07888999888
bob.e@gmail.com
Age 24
Male
© 2021. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
1. Data relating to a customer is not always captured
uniformly - which makes it difficult to use all possible
data sources that would enhance KYC.
2. In this example, it is only through capturing indirect
connections through Corruption, Law Enforcement and
PEP lists that the right social media profile can be
identified and related to the Personal ID record.
3. The more indirect connections to the social media profile
from the personal ID data we can find, the more
confident we are that it is the same person.
Without a graph for this exercise, you must logically
anticipate all the potential connections and then develop
computer rules that search for those connections in one
swoop. This quickly becomes a time consuming and clunky
process to run - and can often miss connections or even
timeout before finding them.
Fraud Prevention analytics is enhanced by KYC data - and
graph can uncover fraud currently going undetected
Step 2: Overlay Transaction data onto the identity graph
Consumer Type
$
A
$
Account
1. Once your customer identity is clear from KYC
activities, the customer account begins to transact.
Transaction
$
Merchant Type
A
Geography
$
$
Account
Business Type
$
$
$
Transaction
A
$
A
$
© 2021. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
Payee Business
Type
Geography
2. The context provided by the KYC identity will help to
determine anticipated types of transactions - and
ringfence any unexpected behaviour.
3. For retail bank customers, layering transaction data
such as merchant types and geo-location of spend can
help isolate any unexpected transactions for that KYC
customer type - e.g. this may indicate credit card
fraud.
4. For business customers, layering transaction data
such as payee business category and geography can
help isolate any unexpected transactions for that KYC
customer type - e.g. this may uncover invoice fraud.
This kind of fraud prevention without graph requires
joining many tables - meaning longer processing times,
and a risk that the query will timeout before identifying the
crime.
AML analytics is enhanced by KYC and Fraud data - and graph can
uncover laundering rings currently going undetected
Step 3: Model the network of transactions and identities
1. Your graph can model the journey of all
money movements between accounts.
Co-Directors
A
Source
Account
Destination
Account 1
A
A
A
A
A
A
A
A
Destination
Account 2
Destination
Account 3
Payee
Business
Type
© 2021. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
$
Geography
2. Combining this journey data with fraud and
KYC data helps to determine whether
money is moving in the right directions for
reasons known to be common to normal
business and consumer activities.
3. Where movement is unexpected, it is
possible that it is a result of financial crime
e.g. money laundering.
Without graph, this kind of financial crime
detection requires joining a very high volume of
data points together - meaning much longer
processing times, and a high risk that the query
will timeout before identifying the crime.
Deploying TigerGraph in Your AML Network
1
2
3
Extract Features
● Suspicious
activity patterns
Heterogeneous data
sources including
NICE Actimize
5
Train ML Model
● In-Graph
or
● Out of Graph
● Neighborhood
graphlets
Connect
datasets and
pipelines
4
Enrich DB
with features
on nodes
Use
model
to predict
money
laundering
User
● Exec
● Analyst | ML
● IT - DBA
TigerGraph
Toolkit
7
6
Test Incoming Transactions
● Insert new transaction
● Extract its features
● Apply model
If money
Issue Alert
laundering
detected
41
Credit Risk
Solution Approach: Knowledge Graph
Core Banking:
Companies Data:
● Customer data
● Transactions
● Company information
● Ownership & Directorship
HR Information System:
● Demographic profile
● Position & transfers
● Performance review history
Geospatial Data:
CREDIT ASSESSMENT
SYSTEMS
Loan System:
● Loan submission
● Collateral information
● Loan approval &
rejection
© 2021. ALL RIGHTS RESERVED. | TIGERGRAPH.COM | CONFIDENTIAL INFORMATION |
● Region Hierarchy
● Geohash
● Longitude & latitude
Blacklist Information:
● Customer
● Blacklist type
● Source
43
Connected Information for Credit Assessment
© 2021. ALL RIGHTS RESERVED. | TIGERGRAPH.COM | CONFIDENTIAL INFORMATION |
44
Connected Information for Credit Assessment
Geospatial Data
Companies Data
Loan System
Core Banking
© 2021. ALL RIGHTS RESERVED. | TIGERGRAPH.COM | CONFIDENTIAL INFORMATION |
Blacklist Information
HR
45
Information
System
Collateral Fraud
1
Credit
Disbursement
Account 1
CS
2
CD
Loan
Application
CO
Process Workflow:
Using graph algorithm Path Finding - Circular Path Detection
1. Find all Credit Disbursement (CD) from specific date range
2. Do traversal analysis from CD to all Loan Applications (LA)
3. Do circular path detection from LA1 -- Branch (B1) -- Area (A) -- B2 -- LA2 -- CO - LA1
Collateral
LA
3
B
Account 2
CS
LA
Loan
Application
Branch-A
A
Area-1
B
Graph traversal pattern above will find all of the loan applications using the same
collateral in same area
Branch-B
© 2021. ALL RIGHTS RESERVED. | TIGERGRAPH.COM | CONFIDENTIAL INFORMATION |
46
Broker Fraud
4
Transaction
TRX
IE
CS
Account
CS
2
work_in
LA
IE
1
Credit
Disbursement
LA
CD
LA
CD
3
Loan
Application
Internal
Employee
B
ST
Collectibility
Status = BAD
Branch
Process Workflow:
Using graph traversal analysis
1. Find all credit disbursement (CD) from specific date range and traverse to the
account (CD -- CS1)
2. Find all Loan Applications (LA) from each CS that handled by the same sales
(internal employee - IE1)
Traversal CS1 -- LA -- IE1, Group by CS1, IE1 having count(LA) > 3
3. For all LA from #2, check if x% of it has bad collectibility status
LA -- (ST == “Bad”)
4. Graph traversal analysis to check if there is a transfer to internal account related
to the process
CS1 → TRX → CS2 -- IE2 -- B -- IE1, with additional logic:
○ Total transaction > 30% of credit disbursement value
© 2021. ALL RIGHTS RESERVED. | TIGERGRAPH.COM | CONFIDENTIAL INFORMATION |
47
Customer 360
CONFIDENTIAL
Building A Real-time Customer 360 Data Hub
Business Challenge
Combine all available data for the customer with transactions (orders,
payments, calls, rides..) in real-time to improve business outcomes
Solution
Build on top of current investments in master data management, data
warehouse/Hadoop data lake and NoSQL repositories
Find new relationships among data to drive product & service
marketing, targeted cross-sell and up-sell recommendation, superior
fraud and money laundering detection and improved credit risk scoring
and monitoring,
Analyze temporal (Time Series) and spatial data to find new patterns
and insights
Expand schema (attributes/fields, relationships) to accommodate new
data sources & use cases
Business Benefits
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM
Improve customer experience, increase revenue and lower costs
49
Customer Journey - Mapping out the customer engagement and
attribution over time
CONFIDENTIAL
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM
50
TigerGraph for Customer 360
Discover hidden trends and connections with extensive, configurable
data visualization and activity time series.
Acquire
For a deeper look, we offer segmentation for
customer targeting by demographic, along with
the ability to view individual journey maps.
Retain
Avoid churn with customer scoring, augmented
by machine learning and graph to pinpoint
silent complaints and take action immediately.
Grow
With graph and machine learning, you can
utilize customer analytics to bring new patterns
to light that you’ve never seen before.
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
51
All Data Culminates to Customer 360
Where Due Diligence and Compliance Regulations have driven customer information integrity and
richness, there is additional opportunity for revenue generation, experience improvement and cost
reduction from the same data.
Example Customer 360
Use Cases
Corporate Bank
Retail Bank
Upsell/ CrossSell
Private Bank
● Credit Rating
● Company Name
● Company Address
● Directors & Shareholders
● Transactions
● Accounts
● Geographies
● SARs
● Company Ownership
Structures
● Nature and location of
business, products &
services
© 2021. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
● Personal ID
● Tax #
● Nature and location of
customer income &
spending habits
● PEP Lists
● Criminal Activity/
Corruption lists
● Merchant Geography
● Merchant Credit
Rating
Customer
Experience
Customer
Segmentation
Content
Personalisation
Support
Personalisation
Adoption
Personalisation
Customer 360 for Retail Customer
●
Relation identification
●
●
●
Commonly, not all of the customer
demographic data is updated,
such as the employment status,
employer, etc
TigerGraph customer 360 helps
the identification of the relationship
between corporate customers and
retail customer.
With the rise of digital payment,
TigerGraph can help with the
digital account identification
between the customers to
merchant
Both of the point above will enrich
the retail customers profile for
better analytics and campaign
purposes
Digital account identification
© 2021. ALL RIGHTS RESERVED. | TIGERGRAPH.COM | CONFIDENTIAL INFORMATION |
53
Using TigerGraph to Provide Next Best Offer
Combine demographic, personal
preferences, interests, reward, etc to get
full subscriber view. Use Graph algorithm
to score importance of preference and life
value
Graph Algorithms can provide
products bests suited for upsell
and/or cross-sell based on Entity
Resolution and customer
preference
Graph NLP for Sentiment Analysis
and build Knowledge Graph and
Integrate with Chatbot
© 2020. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
Market
Vestibulum
congue
Segmentation
Prebuilt Graph Queries with Trained
models can drive real-time
personalized next best action and
recommendation. Ie, customized
offer on mobile app based on recent
purchase
Understand LTV and profitability of
each customer (high value, etc…)
TigerGraph Enriches Consumer 360 Insights
Entity
Resolution
Data Driven
Marketing Campaigns
Data
Democratization
Actionable
Insights
• Take the “Artwork” out of
the equation
• Consistent Decisions
• Augment Decisions with
ML/AI
• Proactive Real-time and
personalized Campaigns
• Front line sales (regional
sales to store managers)
• Marketeers
• Product managers
• Data Analysts & Data
Scientists
© 2020. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
Data
Monetization
• Single entity for
each customer who
views content on
different platforms /
devices
• promote targeted
content and ads to
existing users to
maintain their
customer loyalty
• Powerful and
flexible API to
provide unique data
insights
• Single Pane UI
empowering non
technical users to
drive insights
Expanding the C360 dataset further creates net new
revenue opportunities
Omnichannel Retail Banking
Value Chain Banking
(Consumer-to-HNW, Cons/HNW-toSMB)
-
-
Capitalise on captive market
- increase revenue
Target bundles / develop new
propositions
Life stage upsell/cross-sell
Compete with Fintechs on experience
Marketing ROI/conversion uplift
AML - detect networks of
people and transactions
Fraud Prevention - detect
unlikely payments-out
KYC - determine the
legitimacy of the customer
identity
B2B2C Business Banking
-
Usage-based pricing - enabling new
propositions and higher margins
Better customer service
Division Portfolio Banking
Including additional system data in the Customer
360 will uncover further revenue, cost and
experience opportunities
© 2021. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
-
Upsell/Cross-sell across Portfolio
Portfolio credit/risk scoring
Profitability gains (targeted pricing)
TG STUDIO
TIGERGRAPH EXPLORER
End to End Solution for Customer 360 Use Cases
EXECUTIVES
LINE OF BUSINESS
CUSTOMER FACING
TEAM INVESTIGATION
ANALYTICS
IT | PLATFORM
Dashboards & Reports
Macro Trends
Drill In Elements
Product Specific Dashboards & Reports
Upsell | Cross Sell
Journey
Segmentation
Churn
Analytics
Loyalty
C360 Interaction and Communication
Visual & Non Visual
Alerts & Updates
Investigation Teams - Workbench
Investigations & Teams
Findings & Connectivity
Exploration
Relationship Diagrams
ML & Algorithms
Complex analytics and ‘scenarios’
Graph & Management
Data Models
Graph Ops & Attributes
Core Capabilities
TigerGraph: 3rd Generation Graph Database
Real-time Performance
Deep Link Multi-Hop Analytics
Sub-second response for queries touching
tens of millions of entities/relationships
Queries traverse 10+ hops deep into the graph
performing complex calculations
Ease of Development & Deployment
Transactional (Mutable) Graph
●
●
Hundreds of thousands of updates
per second, Billions of transactions
per day
●
GraphStudio - visual SDK
GSQL - Intuitive, Turing complete graph
query language for developing
complex analytics in days
User extensible graph algorithms library
Enterprise Grade Security
●
●
Scalability for Massive Datasets
100 B+ entities, 1 Trillion+ relationships
© 2021 TigerGraph. All Rights Reserved
59
Encryption Support
Control access to sensitive data based on
user role, dept or organization with
MultiGraph
TigerGraph Distributed Database Architecture
Simple setup, Performant design
●
●
●
Setup: Just tell TigerGraph how many servers.
TigerGraph seamlessly distributes data.
Users see a single database, not shards.
Real-time active
replication
for High Availability (HA)
● write to all
● read from any
● strong consistency
MPP OLAP
OLTP concurrent
ACID transaction
Unlimited
scale-out
simple to expand
$
Simple to setup
and manage
Economical
60
MPP - Distributed Cluster in Single or Distributed mode
Distributed Mode
Server 1
Server 2
Server 3
● The server that receives the
query becomes the master.
● Computations execute on
all servers in parallel.
Distributed Query
Distributed Query
(Master Node)
Distributed
Query
● Global accumulators are
transferred across the
cluster.
● If your query starts from all
or most vertices, use this
mode.
© 2020. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
61
Enterprise Security: MultiGraph for RBAC and Data Sharing
●
Share & Collaborate
○ Multiple groups share one master
database
⇒ data integration, insights, productivity
●
Real-time, Updatable
Shared updates, no copying
⇒ cleaner, faster, cheaper, safer
●
Fine-Grained Security
○ Each group is granted its own view
○ Each group has its own admin user,
who manages local users' privileges.
62
GSQL Design Features
Schema-Based
Optimizes storage
efficiency and query
speed. Supports dataindependent app/query
development.
Conventional
Control Flow (FOR,
WHILE, IF/ELSE)
Makes it easy to
implement conventional
algorithms
© 2019 TigerGraph. All Rights Reserved
Built-in HighPerformance Parallelism
Achieves fast results
while being easy to code
Procedural Queries
Parameterized queries
are flexible and can be
used to build more
complex queries
63
SQL-Like
Familiar to 1 million
users
Transactional Graph
Updates
HTAP - Hybrid
Transactional / Analytical
Processing with real-time
data updates
The TigerGraph Difference
Feature
Real-Time Deep-Link Querying
5 to 10+ hops
Handling Massive Scale
In-Database Analytics & Machine
Learning
© 2022 TigerGraph. All Rights Reserved
Design Difference
Benefit
● Native Graph design
● C++ engine for high performance
● Storage Architecture
● Uncovers hard-to-find patterns
● Operational, real-time
● HTAP: Transactions+Analytics
● Distributed DB architecture
● Massively parallel processing
● Compressed storage reduces
footprint and messaging
● Integrates all your data
● Automatic partitioning
● Elastic scaling of resource usage
● GSQL: High-level yet Turingcomplete language
● User-extensible graph algorithm
library, runs in-DB
● ACID (OLTP) & Accumulators
(OLAP)
● Avoids transferring data
● Richer graph context
● Graph-based feature extraction for
supervised machine learning
● In-DB machine learning training
● No-code migration from RDBMS
● No-code Visual Query Builder
●
Democratize self-service analytics
to derive new-insights from
legacy/external data stores
Uncompromising Performance & Technology
Latest 36TB LDBC Benchmark available on
https://www.tigergraph.com/benchmark/
Reference Architecture
66
TigerGraph Banking Reference Architecture
Data Sources
Real Time Queries
EDW &
Data Lake
Mobile App / Website
Raw & Normalized data
TigerGraph
Insights Engine
Activity & Usage
Batch or
Real-Time
Streaming
API
Batch or Real-Time
Streaming
Customer
Service/Chatbot
Customer 360 Machine Learning
Transaction
Visualization
Batch or Real-Time Streaming
Model
Recommendation
Management
Engine
Interactions
Campaign Application
Archive Graph Data
Campaign results and logs
Products & Services
© 2022. ALL RIGHTS RESERVED. | TIGERGRAPH.COM |
Download