SlideShare a Scribd company logo
Graph Gurus 22
Guarding Against Cyber Security Threats with a
Native Parallel Graph Database
1
© 2019 TigerGraph. All Rights Reserved
Today’s Presenters
● Co-authored GSQL, TigerGraph’s query
language, and expertise in graph
solutions and algorithms
● Developed solutions for many Fortune 50
companies
● 5+ years with TigerGraph
Xinyu Chang,
Director of Customer Solutions
Victor Lee,
Head of Product Strategy
● BS in Electrical Engineering and Computer
Science from UC Berkeley, MS in Electrical
Engineering from Stanford University
● PhD in Computer Science from Kent State
University focused on graph data mining
● 15+ years in tech industry
2
© 2019 TigerGraph. All Rights Reserved
Some Housekeeping Items
● Although your phone is muted we do want to answer your questions -
submit your questions at any time using the Q&A tab in the menu
● The webinar is being recorded and will uploaded to our website shortly
(https://www.tigergraph.com/webinars-and-events/) and the URL will be
emailed you
● If you have issues with Zoom please contact the panelists via chat
3
© 2019 TigerGraph. All Rights Reserved
Some Big and Bad Cyberattacks
Yahoo Date: 2013-14 Impact: 3 billion user accounts
Marriott International Date: 2014-18 Impact: 500 million customers
eBay Date: May 2014 Impact: 145 million users compromised
Equifax Date: July 29 2017 Impact: PII of 209 million individuals
Source: https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html
4
© 2019 TigerGraph. All Rights Reserved
Ransomware Attacks Reported Yesterday
5
© 2019 TigerGraph. All Rights Reserved
Cybersecurity Statistics At-a-Glance
● 92% of malware is delivered by email.
● 56% of IT decision makers say targeted phishing attacks are their top security
threat.
● The average ransomware attack costs a company $5 million.
● It takes organizations an average of 191 days to identify data breaches.
● 69% of companies see compliance mandates driving spending.
● 88% companies spent more than $1 million on preparing for the GDPR.
● 25% of organizations have a standalone security department.
● 54% of companies experienced an industrial control system security incident
● 61% of organizations have experienced an IoT security incident
Source: https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html
6
© 2019 TigerGraph. All Rights Reserved
A Connected Data View of Cyberattacks
● Your system is a graph
● The attack is a chain of
events:
7
● A few perpetrators issue a
vast number of attacks: hubs
DDOS
Attack
© 2019 TigerGraph. All Rights Reserved
Basics of Graph-Based Cyberattack Defense
● Your system is a network of components and processes →
make a real-time graph model
● Set up monitoring and known-pattern defenses at strategic
points
● If an attack occurs, graph assists in tracing both upstream to
source and downstream to effects
● Collect historical data to feed into Machine Learning →
Develop AI models to detect future attacks
8
© 2019 TigerGraph. All Rights Reserved
Motivation - Why Native Parallel Graph?
Why use graph database to minimize cyber security problems?
1. Huge data size.
Up to terabytes of log generated per day.
2. Integrating multiple data source.
log files, infrastructure info, user info.
3. Interconnected multi-level data structure.
service-microservice, domain-subdomain, organization chart…
4. Required to do deep-link analytics
Anomaly behavior pattern matching, source tracing
5. Real-time response to minimize the loss
9
© 2019 TigerGraph. All Rights Reserved
Integrating Multiple Data Sources
System Log Cyber Security System
Service Info
User Info
Server Info
Resource Info
Organization Info
Domain-URL-IP Info
10
© 2019 TigerGraph. All Rights Reserved
A Graph View
Queries
from
Submitted
Request To
Deployed
in
Reports To
Serves
As
Has
Admin
Has IP
In Domain
Has Micro
Service
Has IP
Has
Device
Works for
Department
Outputs To
Has URL
Has
Alert
Has
Status
Has
Email
11
© 2019 TigerGraph. All Rights Reserved
Cyber Security Problems
Common Attack Pattern Classification (CAPEC)
• Engage in deceptive interactions
• Abuse existing functionality
• Manipulate data structures
• Manipulate system resources
• Inject unexpected items
• Employ probabilistic techniques
• Manipulate timing and state
• Collect and analyze information
• Subvert access control
12
© 2019 TigerGraph. All Rights Reserved
Graph Use Cases in Cyber Security
1. Match user behavior pattern
2. Trace the source of an error/alert/
problem
3. Anomaly detection
4. Graph feature extraction for machine
learning
13
© 2019 TigerGraph. All Rights Reserved
Detect Specific User Behavior Patterns
Add Mobile
Disk Event
File Move
Event
Restricted File
Remove Mobile
Disk Event
1
2
3
Restricted File
File Read
Event
Firewall Check
Missing
A user plugged in a
mobile disk, copied
the file then removed
the mobile disk
A user read from the
restricted file bypassed
the firewall check
Firewall Service
14
© 2019 TigerGraph. All Rights Reserved
Tracing the Source of an Error/Alert/Problem
File Corrupted Alert
File Read
Event
File Write
Event
Login EventWhat is the login IP of the user whose write
operation resulted in a File Corrupted Alert
for other services ?
High CPU
Usage Alert
Request Login Event
Which login IP resulted in a High CPU Usage Alert ?
15
© 2019 TigerGraph. All Rights Reserved
Detecting Anomalies
Flooding Detection
One service receives way
more requests than usual
Request
Request
Request
Request
Request
Request
Request
Footprinting Detection
One service receives a
much larger number of
different requests from the
same IP/user ID than usual
Request
Request
Request
Request
Request
Request
Request
16
© 2019 TigerGraph. All Rights Reserved
Graph Feature Extraction
# of shortest paths to
blacklisted users/IP
# of blacklisted user/IP in
1/2/3...k hops
K Nearest Neighbor
Having similar sequence of user
behavior with blacklisted users
17
© 2019 TigerGraph. All Rights Reserved
DEMO
18
Q&A
Please submit your questions via the Q&A tab in Zoom
© 2019 TigerGraph. All Rights Reserved
Additional Resources
20
Start Free at TigerGraph Cloud Today!
https://www.tigergraph.com/cloud/
Test Drive Online Demo
https://www.tigergraph.com/demo
Download the Developer Edition
https://www.tigergraph.com/download/
Guru Scripts
https://github.com/tigergraph/ecosys/tree/master/guru_scripts
Join our Developer Forum
https://groups.google.com/a/opengsql.org/forum/#!forum/gsql-users
© 2019 TigerGraph. All Rights Reserved
Coming To A City Near You
21
Let us know if you would like to help organize a Graph Gurus
Comes To You workshop in your city
https://info.tigergraph.com/graph-gurus-request
Thank You

More Related Content

PDF
Graph Gurus Episode 6: Community Detection
PDF
Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...
PDF
Graph Gurus Episode 25: Unleash the Business Value of Your Data Lake with Gra...
PDF
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
PDF
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
PDF
Using Graph Algorithms For Advanced Analytics - Part 4 Similarity 30 graph al...
PDF
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
PDF
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Graph Gurus Episode 6: Community Detection
Graph Gurus Episode 17: Seven Key Data Science Capabilities Powered by a Nati...
Graph Gurus Episode 25: Unleash the Business Value of Your Data Lake with Gra...
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Using Graph Algorithms For Advanced Analytics - Part 4 Similarity 30 graph al...
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 5 Classification

What's hot (19)

PDF
Graph Gurus 23: Best Practices To Model Your Data Using A Graph Database
PDF
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
PDF
Graph Gurus Episode 31: GSQL Writing Best Practices Part 1
PDF
Graph Gurus 24: How to Build Innovative Applications with TigerGraph Cloud
PPTX
Distributed deep learning_over_spark_20_nov_2014_ver_2.8
PDF
Graph Hardware Architecture - Enterprise graphs deserve great hardware!
PPTX
Distributed deep learning_framework_spark_4_may_2015_ver_0.7
PDF
Threat Detection in Surveillance Videos
PDF
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
PPTX
Tales from an ip worker in consulting and software
PDF
How Graph Technology is Changing AI
PDF
Large-Scale Malicious Domain Detection with Spark AI
PDF
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...
PDF
Neo4j Graph Data Science Training - June 9 & 10 - Slides #7 GDS Best Practices
PDF
Data Tactics Semantic and Interoperability Summit Feb 12, 2013
PDF
Scaling AI in production using PyTorch
PDF
Building AI with Security and Privacy in mind
PDF
Explain Yourself: Why You Get the Recommendations You Do
PDF
Building Interpretable & Secure AI Systems using PyTorch
Graph Gurus 23: Best Practices To Model Your Data Using A Graph Database
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
Graph Gurus Episode 31: GSQL Writing Best Practices Part 1
Graph Gurus 24: How to Build Innovative Applications with TigerGraph Cloud
Distributed deep learning_over_spark_20_nov_2014_ver_2.8
Graph Hardware Architecture - Enterprise graphs deserve great hardware!
Distributed deep learning_framework_spark_4_may_2015_ver_0.7
Threat Detection in Surveillance Videos
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Tales from an ip worker in consulting and software
How Graph Technology is Changing AI
Large-Scale Malicious Domain Detection with Spark AI
Shift Remote: AI: Smarter AI with analytical graph databases - Victor Lee (Ti...
Neo4j Graph Data Science Training - June 9 & 10 - Slides #7 GDS Best Practices
Data Tactics Semantic and Interoperability Summit Feb 12, 2013
Scaling AI in production using PyTorch
Building AI with Security and Privacy in mind
Explain Yourself: Why You Get the Recommendations You Do
Building Interpretable & Secure AI Systems using PyTorch
Ad

Similar to Graph Gurus Episode 22: Cybersecurity (20)

PDF
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
PDF
THE ESSENTIAL ELEMENT OF YOUR SECURITY
PDF
Graph Gurus 21: Integrating Real-Time Deep-Link Graph Analytics with Spark AI
PPTX
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
PPTX
Evolution security controls towards Cloud Services
PDF
Detect & Remediate Malware & Advanced Targeted Attacks
PDF
Inteligentní ochrana osobních údajů v procesu digitální transformace
PPTX
Advanced threat protection and big data
PPTX
Lecture 8- information technology slides
PPTX
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
PPTX
Automation: Embracing the Future of SecOps
PPTX
Lecture 5.pptx
PPTX
CASB: Securing your cloud applications
PPTX
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
PPTX
Forcepoint Corporate Presentation_Short.pptx
PPTX
Empowering the Cloud Through G Suite
PPTX
Where in the world is your Corporate data?
PDF
ACS Talk (Melbourne) - The future of security
PDF
Reducing Attack Surface in Budget Constrained Environments
PPTX
Iia 2012 Spring Conference Philly V Final
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
THE ESSENTIAL ELEMENT OF YOUR SECURITY
Graph Gurus 21: Integrating Real-Time Deep-Link Graph Analytics with Spark AI
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Evolution security controls towards Cloud Services
Detect & Remediate Malware & Advanced Targeted Attacks
Inteligentní ochrana osobních údajů v procesu digitální transformace
Advanced threat protection and big data
Lecture 8- information technology slides
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Automation: Embracing the Future of SecOps
Lecture 5.pptx
CASB: Securing your cloud applications
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
Forcepoint Corporate Presentation_Short.pptx
Empowering the Cloud Through G Suite
Where in the world is your Corporate data?
ACS Talk (Melbourne) - The future of security
Reducing Attack Surface in Budget Constrained Environments
Iia 2012 Spring Conference Philly V Final
Ad

More from TigerGraph (20)

PDF
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
PDF
Better Together: How Graph database enables easy data integration with Spark ...
PDF
Building an accurate understanding of consumers based on real-world signals
PDF
Care Intervention Assistant - Omaha Clinical Data Information System
PDF
Correspondent Banking Networks
PDF
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
PDF
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
PDF
Fraud Detection and Compliance with Graph Learning
PDF
Fraudulent credit card cash-out detection On Graphs
PDF
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
PDF
Customer Experience Management
PDF
Graph+AI for Fin. Services
PDF
Davraz - A graph visualization and exploration software.
PDF
Plume - A Code Property Graph Extraction and Analysis Library
PDF
TigerGraph.js
PDF
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
PDF
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
PDF
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
PDF
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
PDF
Recommendation Engine with In-Database Machine Learning
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
Better Together: How Graph database enables easy data integration with Spark ...
Building an accurate understanding of consumers based on real-world signals
Care Intervention Assistant - Omaha Clinical Data Information System
Correspondent Banking Networks
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Fraud Detection and Compliance with Graph Learning
Fraudulent credit card cash-out detection On Graphs
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
Customer Experience Management
Graph+AI for Fin. Services
Davraz - A graph visualization and exploration software.
Plume - A Code Property Graph Extraction and Analysis Library
TigerGraph.js
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Recommendation Engine with In-Database Machine Learning

Recently uploaded (20)

PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
1_Introduction to advance data techniques.pptx
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPT
Reliability_Chapter_ presentation 1221.5784
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PDF
annual-report-2024-2025 original latest.
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
Computer network topology notes for revision
PPTX
Supervised vs unsupervised machine learning algorithms
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPTX
Introduction to Knowledge Engineering Part 1
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
Database Infoormation System (DBIS).pptx
PDF
Fluorescence-microscope_Botany_detailed content
IBA_Chapter_11_Slides_Final_Accessible.pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
1_Introduction to advance data techniques.pptx
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
Reliability_Chapter_ presentation 1221.5784
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
annual-report-2024-2025 original latest.
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
Computer network topology notes for revision
Supervised vs unsupervised machine learning algorithms
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
Introduction to Knowledge Engineering Part 1
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
Database Infoormation System (DBIS).pptx
Fluorescence-microscope_Botany_detailed content

Graph Gurus Episode 22: Cybersecurity

  • 1. Graph Gurus 22 Guarding Against Cyber Security Threats with a Native Parallel Graph Database 1
  • 2. © 2019 TigerGraph. All Rights Reserved Today’s Presenters ● Co-authored GSQL, TigerGraph’s query language, and expertise in graph solutions and algorithms ● Developed solutions for many Fortune 50 companies ● 5+ years with TigerGraph Xinyu Chang, Director of Customer Solutions Victor Lee, Head of Product Strategy ● BS in Electrical Engineering and Computer Science from UC Berkeley, MS in Electrical Engineering from Stanford University ● PhD in Computer Science from Kent State University focused on graph data mining ● 15+ years in tech industry 2
  • 3. © 2019 TigerGraph. All Rights Reserved Some Housekeeping Items ● Although your phone is muted we do want to answer your questions - submit your questions at any time using the Q&A tab in the menu ● The webinar is being recorded and will uploaded to our website shortly (https://www.tigergraph.com/webinars-and-events/) and the URL will be emailed you ● If you have issues with Zoom please contact the panelists via chat 3
  • 4. © 2019 TigerGraph. All Rights Reserved Some Big and Bad Cyberattacks Yahoo Date: 2013-14 Impact: 3 billion user accounts Marriott International Date: 2014-18 Impact: 500 million customers eBay Date: May 2014 Impact: 145 million users compromised Equifax Date: July 29 2017 Impact: PII of 209 million individuals Source: https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html 4
  • 5. © 2019 TigerGraph. All Rights Reserved Ransomware Attacks Reported Yesterday 5
  • 6. © 2019 TigerGraph. All Rights Reserved Cybersecurity Statistics At-a-Glance ● 92% of malware is delivered by email. ● 56% of IT decision makers say targeted phishing attacks are their top security threat. ● The average ransomware attack costs a company $5 million. ● It takes organizations an average of 191 days to identify data breaches. ● 69% of companies see compliance mandates driving spending. ● 88% companies spent more than $1 million on preparing for the GDPR. ● 25% of organizations have a standalone security department. ● 54% of companies experienced an industrial control system security incident ● 61% of organizations have experienced an IoT security incident Source: https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html 6
  • 7. © 2019 TigerGraph. All Rights Reserved A Connected Data View of Cyberattacks ● Your system is a graph ● The attack is a chain of events: 7 ● A few perpetrators issue a vast number of attacks: hubs DDOS Attack
  • 8. © 2019 TigerGraph. All Rights Reserved Basics of Graph-Based Cyberattack Defense ● Your system is a network of components and processes → make a real-time graph model ● Set up monitoring and known-pattern defenses at strategic points ● If an attack occurs, graph assists in tracing both upstream to source and downstream to effects ● Collect historical data to feed into Machine Learning → Develop AI models to detect future attacks 8
  • 9. © 2019 TigerGraph. All Rights Reserved Motivation - Why Native Parallel Graph? Why use graph database to minimize cyber security problems? 1. Huge data size. Up to terabytes of log generated per day. 2. Integrating multiple data source. log files, infrastructure info, user info. 3. Interconnected multi-level data structure. service-microservice, domain-subdomain, organization chart… 4. Required to do deep-link analytics Anomaly behavior pattern matching, source tracing 5. Real-time response to minimize the loss 9
  • 10. © 2019 TigerGraph. All Rights Reserved Integrating Multiple Data Sources System Log Cyber Security System Service Info User Info Server Info Resource Info Organization Info Domain-URL-IP Info 10
  • 11. © 2019 TigerGraph. All Rights Reserved A Graph View Queries from Submitted Request To Deployed in Reports To Serves As Has Admin Has IP In Domain Has Micro Service Has IP Has Device Works for Department Outputs To Has URL Has Alert Has Status Has Email 11
  • 12. © 2019 TigerGraph. All Rights Reserved Cyber Security Problems Common Attack Pattern Classification (CAPEC) • Engage in deceptive interactions • Abuse existing functionality • Manipulate data structures • Manipulate system resources • Inject unexpected items • Employ probabilistic techniques • Manipulate timing and state • Collect and analyze information • Subvert access control 12
  • 13. © 2019 TigerGraph. All Rights Reserved Graph Use Cases in Cyber Security 1. Match user behavior pattern 2. Trace the source of an error/alert/ problem 3. Anomaly detection 4. Graph feature extraction for machine learning 13
  • 14. © 2019 TigerGraph. All Rights Reserved Detect Specific User Behavior Patterns Add Mobile Disk Event File Move Event Restricted File Remove Mobile Disk Event 1 2 3 Restricted File File Read Event Firewall Check Missing A user plugged in a mobile disk, copied the file then removed the mobile disk A user read from the restricted file bypassed the firewall check Firewall Service 14
  • 15. © 2019 TigerGraph. All Rights Reserved Tracing the Source of an Error/Alert/Problem File Corrupted Alert File Read Event File Write Event Login EventWhat is the login IP of the user whose write operation resulted in a File Corrupted Alert for other services ? High CPU Usage Alert Request Login Event Which login IP resulted in a High CPU Usage Alert ? 15
  • 16. © 2019 TigerGraph. All Rights Reserved Detecting Anomalies Flooding Detection One service receives way more requests than usual Request Request Request Request Request Request Request Footprinting Detection One service receives a much larger number of different requests from the same IP/user ID than usual Request Request Request Request Request Request Request 16
  • 17. © 2019 TigerGraph. All Rights Reserved Graph Feature Extraction # of shortest paths to blacklisted users/IP # of blacklisted user/IP in 1/2/3...k hops K Nearest Neighbor Having similar sequence of user behavior with blacklisted users 17
  • 18. © 2019 TigerGraph. All Rights Reserved DEMO 18
  • 19. Q&A Please submit your questions via the Q&A tab in Zoom
  • 20. © 2019 TigerGraph. All Rights Reserved Additional Resources 20 Start Free at TigerGraph Cloud Today! https://www.tigergraph.com/cloud/ Test Drive Online Demo https://www.tigergraph.com/demo Download the Developer Edition https://www.tigergraph.com/download/ Guru Scripts https://github.com/tigergraph/ecosys/tree/master/guru_scripts Join our Developer Forum https://groups.google.com/a/opengsql.org/forum/#!forum/gsql-users
  • 21. © 2019 TigerGraph. All Rights Reserved Coming To A City Near You 21 Let us know if you would like to help organize a Graph Gurus Comes To You workshop in your city https://info.tigergraph.com/graph-gurus-request