Frequently asked questions

Get answers to the most commonly asked questions about this product.

Organizations in any industry, public or private sector, can use IBM Security i2 to investigate cyber and physical threats. Most commonly analysts in law enforcement, national security, cyber, and fraud use IBM Security i2 solutions.

IBM i2 Connect is comprised of the power of IBM i2 Analyst's Notebook and includes the abilitity to easily connect to both internal and external data sources.

It is a data analysis technique that identifies entities, links, and properties such as people, places, and things, and establishes connections between them. This technique has been used for many years throughout the public and private sectors for law enforcement.

In addition to detect and respond solutions, such as a SIEM, SOAR platform, or case management systems, IBM i2 provides the ability to conduct deep analysis and investigations.

With IBM i2 Enterprise Insight Analysis, you can create connectors and easily and search any data source that you have access to.

It is an on-premesis software that has has a rich client and server component.

Yes! Please reach out to us to learn how you can upgrade from IBM i2 Analyst's Notebook.

Find out more

This software is licensed by IBM's concurrent user license metric on a perpetual or monthly basis.

IBM Security i2 Analyst's Notebook utilizes the IBM support team to help you through any issues or questions.

Find out more

Users of IBM Security i2 solutions including Analyst's Notebook have a dedicated community group within the IBM Security community. They are able to share workflows, investigative techniques and tips & tricks amongst eachother.

Find out more

Information on IBM Security i2 Analyst's Notebook is posted on the IBM Knowledge Center as well as the IBM Security Community.

Find out more

See how it works

Buy now and get started