Frequently asked questions

Get answers to the most commonly asked questions about this product.

FAQ

Getting started with this product

How do I get data into IBM Security i2 Analyst's Notebook?

Data in electronic form, for example in a text file or spreadsheet, can be import into the IBM Security i2 Analyst's Notebook chart by the user, or can be manually added by the user.

How is IBM Security i2 Analyst's Notebook deployed?

It is an on-premise, rich desktop software offering.

Can I upgrade if I'm an existing IBM Security i2 Analyst's Notebook customer?

Yes! Please reach out to us to learn how you can upgrade from IBM Security i2 Analyst's Notebook.

Pricing

How is IBM Security i2 Analyst's Notebook licensed?

This software is licensed by IBM's concurrent user license metric on a perpetual or monthly basis.

Support

Where can I find support for IBM Security i2 Analyst's Notebook?

IBM Security i2 Analyst's Notebook utilizes the IBM support team to help you through any issues or questions.

Is there an IBM Security i2 community group?

Users of IBM Security i2 solutions including IBM Security i2 Analyst's Notebook have a dedicated community group within the IBM Security community. They are able to share workflows, investigative techniques and tips & tricks amongst eachother.

Other common questions

What industries can benefit from IBM Security i2 solutions?

Organizations in any industry, public or private sector, can use IBM Security i2 to investigate cyber and physical threats. Analysts in law enforcement, national security, cyber, and fraud most commonly use IBM Security i2 solutions.

How does IBM Security i2 Analyst's Notebook differ from IBM Security i2 Connect?

IBM Security i2 Connect is comprised of the power of IBM Security i2 Analyst's Notebook and includes the ability to easily connect to both internal and external data sources.

What is link analysis?

It is a data analysis technique that identifies entities, links, and properties such as people, places, and things, and establishes connections between them. This technique has been used for many years throughout the public and private sectors for law enforcement.

Where does IBM Security i2 fit within my security framework?

In addition to detect and respond solutions, such as a SIEM, SOAR platform, or case management systems, IBM Security i2 provides the ability to conduct deep analysis and investigations.

Where do I find documentation on IBM Security i2 Analyst's Notebook?

Information on IBM Security i2 Analyst's Notebook is posted on the IBM Knowledge Center as well as the IBM Security Community.