***
Skip to content
image/svg+xml
EKG/Catalog
Ontologies
Initializing search
EKGF/ekg-catalog
Introduction
Use Cases
Datasets
Ontologies
Other
image/svg+xml
EKG/Catalog
EKGF/ekg-catalog
Introduction
Use Cases
Use Cases
Client 360 / Customer 360
Client 360 / Customer 360
Customer Relationship Management
Customer Relationship Management
Account Management
Account Management
Account Relationships
Activity Management
Activity Management
Interactions
Contact Management
Contact Management
Contact Relationships
Lead Management
Lead Management
Lead Qualification
Opportunity Management
Opportunity Management
Forecasting
Sales Pipeline
Know Your Customer
Know Your Customer
Anti Money Laundering (AML)
Anti Money Laundering (AML)
Correspondent-based AML
Network Based AML
Transaction / Finance based AML
Activity Monitoring
Crime Records
GDPR
High Net Worth Individuals
Identification Verification
Politically Exposed Persons (PEPs)
Risk Management
Sanctions
Relationships & Connections
Relationships & Connections
Business Connections
Family Connections
Political Connections
Social Connections
Social Media
Social Media
Interest Graph
Social Graph
Complex Construction Project Quotations
Complex Construction Project Quotations
Estimating & Pricing
Estimating & Pricing
Contingency & Escalation
Indirects, Overheads & General Conditions
Labor Productivity & Crew Modeling
Pricing Strategy (Margin/Markups)
Quantity Takeoff (2D/3D/BIM)
Unit Rates & Cost Libraries
Knowledge Capture & Continuous Improvement
Knowledge Capture & Continuous Improvement
Document Ingestion & Knowledge Extraction
Estimate vs Actual & Lessons Learned
SME Knowledge Capture
Traceability & Provenance
Opportunity & Tender Intake
Opportunity & Tender Intake
Bid/No-Bid Decisioning
RFP/RFQ Intake & Document Catalog
Site Visit & Existing Conditions
Proposal & Negotiation
Proposal & Negotiation
Compliance Matrix & Submission Packaging
Negotiation Support & Revisions
Proposal Document Generation & Assembly
Risk, Compliance & Contracts
Risk, Compliance & Contracts
Bonds, Insurance & Warranties
Contract Terms & Commercial Review
Regulatory, Safety & Environmental Compliance
Risk Register & Scenario Analysis
Scope & Requirements
Scope & Requirements
Assumptions, Exclusions & Qualifications
Constructability Review
RFIs, Clarifications & Addenda
Scope Decomposition (WBS/BoQ)
Supply Chain & Subcontractors
Supply Chain & Subcontractors
Bid Leveling & Comparative Analysis
Inventory & Distribution Constraints
Payments, Terms & Cash Flow
Subcontractor Bid Solicitation & Comparison
Subcontractor Scope Packages
Supplier RFQs & Material Pricing
Core Record Management
Core Record Management
Addresses
Audit
Buildings
Countries
Jurisdictions
Legal Entities
Locations
Regions
Cybersecurity
Cybersecurity
Contexts
Contexts
Cloud Security Context
Cloud Security Context
OT/ICS Security Context
OT/ICS Security Context
SaaS Security Context
SaaS Security Context
Detect (Cybersecurity Monitoring)
Detect (Cybersecurity Monitoring)
Anomaly & Behavior Detection
Detection Engineering
Logging & Telemetry
SOC Monitoring & Alerting
Threat Hunting
Threat Intelligence
Govern (Cybersecurity Governance)
Govern (Cybersecurity Governance)
Compliance, Controls & Audit Evidence
Cyber Risk Management
Security Architecture & Standards
Security Strategy & Policy
Third-Party & Supply Chain Security Risk
Identify (Cybersecurity Understanding)
Identify (Cybersecurity Understanding)
Attack Surface Management
Data Classification & Criticality
Threat Modeling & Scenario Mapping
Vulnerability Management
Protect (Cybersecurity Controls)
Protect (Cybersecurity Controls)
Application & API Security
Backup & Resilience Controls
Data Protection
Identity & Access Management (IAM)
Network Security & Segmentation
Privileged Access Management (PAM)
Secure Configuration & Hardening
Security Awareness & Training
Recover (Cybersecurity Recovery)
Recover (Cybersecurity Recovery)
Backup Restore & Integrity Validation
Disaster Recovery (DR) & Business Continuity (BCP)
Resilience Improvements
Service Restoration
Respond (Cybersecurity Incident Response)
Respond (Cybersecurity Incident Response)
Communications & Disclosure
Containment & Eradication
Incident Intake & Triage
Investigation & Forensics
Lessons Learned & Improvement
Data Privacy & Governance
Data Privacy & Governance
Digital Twin of Technology and Data Landscape
Digital Twin of Technology and Data Landscape
Data Flow & Lineage Mapping
Dependency & Relationship Mapping
Security & Compliance Posture Visibility
Technology Estate Inventory
Enterprise Fraud Detection
Enterprise Fraud Detection
Legal Entity Management
Legal Entity Management
Compliance & Documentation
Compliance & Documentation
Compliance
Documents
Contact & Location Information
Contact & Location Information
Addresses
Contacts
Corporate Governance
Corporate Governance
Directorships
Organizational Structure
Signatories
Financial Information
Financial Information
Assets
Earnings Estimates
Fundamentals
Liability Terms
Ratings
Identification & Registration
Identification & Registration
Business Registration
Classification
Commercial Register
Legal Forms
Lifecycle & Status
Lifecycle & Status
Dissolution
Liquidation
Ownership & Capital Structure
Ownership & Capital Structure
Corporate Actions
Corporate Actions
Dividends
Merger & Acquisition History
Parents & Subsidiaries
Spin-offs
Stock Splits
Control
Issued Capital
Ownership
Share Capital
Shares
Supporting Information
Supporting Information
Currencies
Organization Management
Organization Management
Recommendation Engine
Recommendation Engine
Behavioral Patterns
Behavioral Patterns
Content Relationships
Content Relationships
Enterprise-Spanning Regulatory Reports
Enterprise-Spanning Regulatory Reports
Enterprise Risk & Compliance Management
Enterprise Risk & Compliance Management
Supply Chain Management
Supply Chain Management
Vendor Management
Vendor Management
Vendor Lifecycle
Vendor Lifecycle
Vendor Offboarding
Vendor Relationship Management
Vendor Relationship Management
Vendor Contracts
Vendor Performance
Vendor Vetting & Onboarding
Vendor Vetting & Onboarding
Vendor Due Diligence
Vendor KYC
Vendor Onboarding
Other Usecases
Other Usecases
Enterprise Initiative Prioritization
Enterprise Initiative Prioritization
Identify Redundant Vendor Contracts
Identify Redundant Vendor Contracts
Merger and Acquisition Evaluation and Integration
Merger and Acquisition Evaluation and Integration
Datasets
Datasets
Ontologies
Ontologies
Other
Other
Ontologies
¶
Note
COMING SOON
Back to top