Available: i2 iBase 9.0 - faster, more secure, easier to use

Available: i2 iBase 9.0 - faster, more secure, easier to use Read about these enhancements now!

Frequently asked questions

Get answers to the most commonly asked questions about IBM Security i2 iBase.


Getting started with this product

What industries can benefit from IBM Security i2 solutions?

Organizations in any industry, public or private sector, can use IBM Security i2 to investigate physical and cyber threats. Most commonly, analysts in law enforcement, national security, cyber, and fraud use IBM Security i2 solutions.

What is link analysis?

It is a data analysis technique that identifies entities, links, and properties such as people, places, and things, and establishes connections between them. This technique has been used for many years throughout the public and private sectors for law enforcement analysis, threat hunting, fraud investigations, and national security missions.

When would I use i2 iBase with IBM i2 Analyst's Notebook, versus just IBM i2 Analyst's Notebook on its own?

i2 Analyst's Notebook offers a rich desktop client for individual use and when combined with i2 iBase, it offers an organization a power workgroup solution for link analysis, sharing and collaboration.

How is i2 iBase deployed?

It is an on-premise, server based software offering for secure, shared access within a workgroup environment.

Do I need to purchase both i2 iBase Designer and User licenses? What is the difference?

i2 iBase Designer license includes the User capability plus provides ability to design and maintain the iBase databases. Typically, an organization will have some (at least 1) Designer license in addition to their User licenses.

Can I import data into IBM i2 iBase?

Yes, you likely have data in electronic form, for example in another iBase database, a spreadsheet, some other database, or as a text file. You use an import specification to define how the source data is interpreted during the import.


How is i2 iBase licensed?

This software is licensed by IBM's concurrent user license metric on a perpetual or monthly basis.


Where can I find support for i2 iBase?

i2 iBase utilizes the IBM support team to help you through any issues or questions.

Is there an IBM Security i2 community group?

Users of i2 solutions including i2 iBase have a dedicated community group within the IBM Security community. They are able to share workflows, investigative techniques and tips and tricks amongst each other.

Other common questions

Where do I find documentation on i2 iBase?

Documentation and additional information on i2 Base is available in the IBM Knowledge Center.