Frequently asked questions

Get answers to the most commonly asked questions about this product.


Getting started with this product

What data sources can I connect to?

With IBM Security i2 Connect, you can create connectors and easily search any data source that you have access to.

How is IBM Security i2 Connect deployed?

It is an on-premises software that has a rich client and server component.

Can I upgrade if I'm an existing IBM Security i2 Analyst's Notebook customer?

Yes! Please reach out to us to learn how you can upgrade from IBM Security i2 Analyst's Notebook.


How is IBM Security i2 Connect licensed?

This software is licensed by IBM's concurrent user license metric on a perpetual or monthly basis.


Where can I find support for IBM Security i2 Connect?

IBM Security i2 Connect utilizes the IBM support team to help you through any issues or questions.

Is there an IBM Security i2 community group?

Users of IBM Security i2 solutions including Analyst's Notebook have a dedicated community group within the IBM Security community. They are able to share workflows, investigative techniques and tips & tricks amongst each other.

Other common questions

What industries can benefit from IBM Security i2 solutions?

Organizations in any industry, public or private sector, can use IBM Security i2 to investigate cyber and physical threats. Most commonly analysts in law enforcement, national security, cyber, and fraud use IBM Security i2 solutions.

How does IBM Security i2 Connect differ from IBM Security i2 Analyst's Notebook?

IBM Security i2 Connect is comprised of the power of IBM Security i2 Analyst's Notebook and includes the ability to easily connect to both internal and external data sources

What is link analysis?

It is a data analysis technique that identifies and establishes connections between entities, links, and properties such as people, places, and things. It has been used for many years in the public and private sectors for law enforcement analysis, threat hunting, and fraud investigations.

Where does IBM Security i2 fit within my security framework?

In addition to detect and respond solutions, such as a SIEM, SOAR platform, or case management systems, IBM i2 provides the ability to conduct deep analysis and investigations.

Where do I find documentation on IBM Security i2 Connect?

Information on IBM Security i2 Connect is posted on the IBM Knowledge Center as well as the IBM Security Community.