top of page
IBM ANALYST'S NOTEBOOK

i2 ANALYST'S NOTEBOOK

Detect hidden links and trends in the data

 

 

 

i2 Analyst's Notebook is a visual analysis tool that turns data into intelligence. The solution offers innovative features: visualizations of connected networks, social network analysis, geospatial or temporal views that highlight connections and trends hidden in the data. This knowledge makes it easier for you to identify and stop criminal activity, cyber threats, and fraud.

Characteristics

​

  • See connections and trends

  • Direct data connection

  • Text extraction

  • Analysis of call recordings

  • i2 Chart Reader

IBASE

i2 IBASE

What this solution can do for your business

​

i2® iBase is an intuitive intelligence data management application that enables analyst teams to collect, monitor and analyze multiple data sources in secure workgroup environments. It responds to a challenge that analysts face daily: discovering the networks, patterns and trends hidden in the growing volumes of structured and unstructured data. i2 iBase provides a multi-user data-sharing environment that combines enriched analysis and visualization capabilities with dissemination tools.

Characteristics
 

  • Flexible data acquisition and management

  • Automated task analysis

  • Perform complete searches

  • Import and export

I2 EIA

i2 EIA

Detect, Prevent and Counter Threats

​

i2 Enterprise Insight Analysis helps your organization transform huge, disparate data sets into actionable, near real-time information and intelligence. From homeland security and defense to cyber and enterprise threats, the solution helps you develop a deep understanding of your threats and identify vulnerabilities. The combination of machine and human analysis enables rapid detection of hidden connections and critical trends hidden in internal, external, and open source data.

​

Characteristics

​

  • Data Merger & Entity Resolution

  • Simple data connection

  • Advanced analysis & analysis

  • Research & Discovery

Sintelix i2 ANB Plugin

SINTELIX i2 ANB Plugin

Bring unstructured and structured data together - See the whole picture

​

  • Seamless Integration - Built into i2 Analyst's Notebook

  • Drag and drop - Simply drag and drop to process a document

  • Multifile upload - Process multiple documents via file upload

  • Entity & Relationship Extraction - Extract entities and links from unstructured documents

  • Attribute charting - Control the features that present in the chart

  • Manual markup / edit - Correct and create entities and links within ANB

  • Data connectivity - Expand from the chart to capture additional data in Sintelix

  • Source persistence - See the source of all marked up data - all the time

  • Flow through security - Sintelix data security model persists within ANB

Sintelix i2 Database Options

SINTELIX i2 Database Options

Sintelix i2 iBase

​

  • Seamless Integration - Import direct into i2 Analyst's Notebook or via ANX export

  • Data Export / Importe - Design CSV export to match your iBase schema

​

Sintelix i2 EIA

​

  • i2 Analyst's Notebook Premium - Import direct into i2 Analyst's Notebook or via i2 Mappings export for import into the Local Analysis Repository or i2 Analyze

Rosoka

ROSOKA

Rosoka Text Analytics for i2's Analyst's Notebook

This tightly integrated application allows Analyst’s Notebook users to seamlessly analyze unstructured documents from over 200 languages within Analyst Notebook. Running on the Analyst’s Notebook user’s desktop, users can analyze unstructured documents like never before.  The added capabilities Rosoka adds, automatically identifies the important entities, relationships and locations in the Analyst’s Notebook users unstructured documents.  Users retain the power to modify, reject, or accept these machine tagged entities, all with the added ability to manually tag additional entities as they see fit.

OS

OS / MKCVI

OSINT Plugin

​

MKCVI OSINT Plugin is a product developed to extract information from several Open Source Networks into a structured format that can be easily analyzed. Reduces Analyst’s and Investigator’s time in the process of information gathering and accelerates the analysis process. Extracts profiles and their connections, tweets / posts or image files. It also provides a General Search that retrieves all posts / tweets regarding a specific search criteria. Imports information into a chart enabling the user with all i2 Analyst’s Notebook features.

SIREN

SIREN

Siren Platform provides a versatile investigative intelligence platform that merges the functionality of big data dashboards, link analysis, search engines, data relationship modeling, and operational monitoring that were previously disconnected.

Characteristics

​

  • Built on Elasticsearch, the industry benchmark for scalable, open source search technology.


  • Data visualization, link and geospatial data analysis, search engines, data modeling, monitoring and reporting in the single front-end system Siren Investigate.

  • Support for a wide range of data sources: csv files, SQL databases, virtual data warehouse, graphical databases, web services for live search, thanks to Siren Federate, an innovative Siren plugin for Elasticsearch.

​

  • Instant, interactive and investigative responses in a fluid user interface. Easy to use, both for non-technical users and experts.

​

  • Si2ren, a connector built on the basis of i2 Connect (i2 Analyze) technology, allows personalized access to (pre-processed) data in Siren directly from the user interface of i2 Analyst's Notebook Premium.

Kaseware Soft

POINTDUTY

Threat Hunter by Point Duty is new insight for every organisation, combining our expertise in data collection, connection and integration into our intelligence and analysis platform. The Threat Hunter platform is the ultimate enterprise analysis suite with automated search, collection, enrichment and monitoring of structured and unstructured data from multiple sources to derive actionable intelligence.

It also integrates multiple internal and external data sources, including SIEM, Email, OSINT or any other information repository, including the i2 EIA InfoStore and iBase.

 

Threat Hunter enables analysts and investigators to search and access these sources for relevant data via an HTML5 Web browser or from directly within the i2 Analyst's Notebook chart.

PointDuty
bottom of page