sb-as logo
Story image

Unisys unveils 'critical component' for safe cities initiative

Unisys has unveiled its Digital Investigator, a total information management system that allows law enforcement agencies to share investigative intelligence across applications and agency boundaries.

Previously known as the Unisys Law Enforcement Application Framework, the system includes a public portal that enables citizens to give law enforcement and public safety agencies information and track requests from smartphones and other devices.

It also integrates with social media analytics to assist in compiling digital evidence.

As a key tool in the Unisys Safe Cities portfolio, Unisys puts emphasis on the fact that Digital Investigator goes beyond the capabilities of traditional records management systems.

Mark Forman, global head of public sector at Unisys, says the safe cities initiative was created to give justice and public safety

“The Unisys Safe Cities initiative was created to give justice and public safety organisations the solutions they need to better use data from sources like mobile devices and the Internet of Things to create a safe environment for the public,” he says.

“Digital Investigator represents a critical component of this initiative. It gives police departments a tool set that improves productivity through the ability to handle numerous forms of data across multiple lines of inquiry, while linking different pieces of related information.”

With so much information available from different sources, law enforcement agencies are tackling with the best way to collect, collate and analyse all pieces of evidence, including their movements through the justice system, as well as their storage and destruction.

Unisys affirms that Digital Investigator addresses this challenge by providing the capabilities needed to efficiently and successfully manage all police incident and investigative information.

Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Story image
Experiencing ransomware significantly impacts cybersecurity approach
"The survey findings illustrate clearly the impact of these near-impossible demands. Among other things, those hit by ransomware were found to have severely undermined confidence in their own cyber threat awareness."More
Story image
Fujitsu new tech ensures inter-business data trust
The technology can verify when and by whom the data was created, and whether it has been tampered with, to ensure trusted data exchange.More
Story image
IBM Security completes industry first with updates to Cloud Pak for Security solution
"With these updates, we will be the first in the industry to bring together external threat intelligence and threat management alongside data security and identity."More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Link image
Why the threat of ransomware requires quality resources to keep it at bay
With this ransomware prevention kit, learn actionable tactics for IT departments on how to manage backups and enable staff so that ransomware is a managed and controlled risk.More