Frequently asked questions

Get answers to the most commonly asked questions about this product.


Getting started with this product

What data sources can I connect to?

With IBM i2 Enterprise Insight Analysis, you can create connectors and easily and search any data source that you have access to.

How is IBM Security i2 Analyst's Notebook deployed?

It is an on-premesis software that has has a rich client and server component.

Can I upgrade if I'm an existing IBM i2 Analyst's Notebook customer?

Yes! Please reach out to us to learn how you can upgrade from IBM i2 Analyst's Notebook.


How is IBM Security i2 Analyst's Notebook licensed?

This software is licensed by IBM's concurrent user license metric on a perpetual or monthly basis.


Where can I find support for IBM Security i2 Analyst's Notebook?

IBM Security i2 Analyst's Notebook utilizes the IBM support team to help you through any issues or questions.

Is there an IBM Security i2 community group?

Users of IBM Security i2 solutions including Analyst's Notebook have a dedicated community group within the IBM Security community. They are able to share workflows, investigative techniques and tips & tricks amongst eachother.

Other common questions

What industries can benefit from IBM Security i2 solutions?

Organizations in any industry, public or private sector, can use IBM Security i2 to investigate cyber and physical threats. Most commonly analysts in law enforcement, national security, cyber, and fraud use IBM Security i2 solutions.

How does IBM i2 Connect differ from IBM i2 Analyst's Notebook?

IBM i2 Connect is comprised of the power of IBM i2 Analyst's Notebook and includes the abilitity to easily connect to both internal and external data sources.

What is link analysis?

It is a data analysis technique that identifies entities, links, and properties such as people, places, and things, and establishes connections between them. This technique has been used for many years throughout the public and private sectors for law enforcement.

Where does IBM i2 fit within my security framework?

In addition to detect and respond solutions, such as a SIEM, SOAR platform, or case management systems, IBM i2 provides the ability to conduct deep analysis and investigations.

Where do I find documentation on IBM Security i2 Analyst's Notebook?

Information on IBM Security i2 Analyst's Notebook is posted on the IBM Knowledge Center as well as the IBM Security Community.