Use Cases
Collect data, analyse information, manage expertise: our tailored solutions provide your work processes with a logical structure and clear framework – for every challenge and for maximum security. Read our Use Cases to find out more about the many ways in which our software is used by the police, the military, intelligence agencies, financial authorities, cyberdefence and other security authorities.
Cyber Threat Investigation
Object and person recognition
Intelligent case management for complex investigations
Efficient situation assessments
Smart data analysis for tax fraud investigation

Cyber Threat Investigation
Analysis and evaluation of cyberattacks
Analysing cyberattacks, exposing those involved
In this digital era, state organisations and private companies are increasingly finding themselves at risk of cyberattacks. In 2023, the number of attacks from abroad increased by 28 percent according to official sources, with the real figure likely to be far higher. Cybercriminals are using state-of-the-art technologies, which include artificial intelligence, and always finding ways to refine their methods of attack. In the meantime, the economic damage from cybercriminality has reached immense proportions. Furthermore, geopolitical tensions are increasingly being played out in cyberspace, with cases such as vote rigging, for example.
Strategic Cyberthreat Investigation
rola Security Solutions is ready to meet these challenges with its innovative software rsShadow. This software collects, links and analyses information from a variety of sources, in order to provide analysis teams with a better understanding of the dynamic threat situation in cyberspace and be able to react appropriately. The platform seamlessly combines task management, search, analysis and reporting in one overall tool, designed to strategically combat cyberthreats.

Innovative data analysis of digital threats
In the fast-developing world of cybersecurity, analysis teams are faced with enormous challenges. They need to efficiently process large amounts of data from various sources, quickly extracting and classifying the relevant information. The work involves attributing patterns of attack, indicators of compromise and malware signatures of specific people or campaigns. In order to be able to carry out these tasks, innovative approaches in data analysis are essential.

Object and person recognition
From floods of data to actual findings
Quickly recognising details, introducing specific measures
The early detection of major threats requires a precise and immediate assessment of all available information. This is the only way in which relevant people, symbols or objects can be identified early on and incorporated into the investigation. Vast amounts of video and image material from public sources, situation reports and existing data pools must be combed through and analysed in the shortest amount of time. Particularly in crisis situations, the manual inspection and evaluation of these enormous volumes of data is simply not possible in terms of time or manpower.
Data-driven threat prevention
rola has innovative solutions for the effective early detection of dangerous situations. rsNetMAn automatically and systematically searches extensive volumes of data from its own data pools, as well as federated and public sources such as news, blogs, postings or forums. All defined search parameters are picked up and analysed. An alarm system immediately informs the investigation teams of any critical hits or objects posing a security risk. Important information can be saved for use in other investigations. With the targeted person and face search, even with relatively well disguised people, rsObIn provides key support with AI-supported and secure image and video analysis. Thus securing additional findings from the data saved for the investigation teams.

Recognition and analysis of major threats
Today’s closely connected world presents security authorities with a particularly challenging task, particularly at large events or those with greater potential for danger. Whether planned demonstrations or expected riots, potential terrorist attacks or cross-border conflicts – the planning and organisation of such activities is increasingly shifting to social media and various online platforms. It is crucial that the potential danger this presents is identified early on and precisely analysed.

Intelligent case management for complex investigations
Turning data into facts
Compiling information, identifying connections
Analysts trawl through large volumes of data from various sources as part of complex investigations, analysing the findings under enormous time pressures. They link information from internal and external databases in order to identify connections and relationships between the perpetrators, the offences and other relevant findings. Communication takes place across the various national and international authorities, whereby extremely strict data protection regulations must be observed.
Efficient case management in a networked world
rola enhances modern police work with innovative case management. Our software simplifies casework, through the intelligent linking of data from a variety of sources. The case analysis function supports the reconstruction of events and the creation of suspect profiles. Thanks to its modular structure, this software solution can be flexibly suited to all criminal offences. It reliably protects sensitive data, while also facilitating a secure collaboration between authorities – even beyond state and national borders.

Criminal case management
Investigative teams from the criminal investigation department certainly have their work cut out for them. Crimes are becoming more complex, criminal activities increasingly surpassing state and country borders, while the sheer amount of information continues to grow. In order to respond effectively to these challenges, they need innovative software solutions that facilitate an efficient case management, and are specially tailored to the requirements of complex police investigations.