This category contains integration scenarios that use IBM i2 products.
System Integrations Courses:
Sintelix is the text intelligence software solution for intelligence,
law enforcement and defense analysts.
Sintelix offers fast and accurate text analytics.
Integrate with IBM i2 to analyze both structured and unstructured data with power and ease with a complete end to end text intelligence solution.
- Learn how the Sintelix integrated solution is used as a text intelligence software solution for i2 Analyst's Notebook
Sintelix Harvester is customizable solution for extracting data from multiple web sources such news, wikis, forums, blogs and social media. You can use this solution with your IBM i2 products.
You can harvest a single page at a time or many in a batch. The system extracts text and also hyperlinks. You can harvest recursively.
Harvester only identifies relevant data, ignoring navigation, side bars, footers, advertising and any other unwanted text and passes it to Sintelix to organise, create associations and build a network.
Sintelix recognizes entities, relationships and properties from the extracted data.
- Learn how to harvest data from web and social media in order to conduct investigations
The IBM Security Immune System looks at a security portfolio in an organized fashion - as an integrated framework of security capabilities that transmits and ingests vital security data to help gain visibility, understand, and prioritize threats, and coordinate multiple layers of defense. At its core, the system automates policies and block threats - just as the human immune system can assess and identify a virus and then trigger an immune response.
The MITRE ATT&CK Framework is a globally-accessible knowledge base of advisory tactics and techniques based on real-world observations.
The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and services community.
This video provides and overview of the MITRE ATT&CK Framework, followed by a discussion of how IBM Resilient and other IBM Security products use MITRE ATT&CK with a live demonstration and a Q&A.