i2

Products:

  • IBM i2 Enterprise Insight Analysis
  • IBM i2 Analyst's Notebook
  • IBM i2 iBase

IBM i2 Enterprise Insight Analysis helps your organization turn overwhelming and disparate data into actionable insight and intelligence, in near real time. From national security and defense, to cyber and enterprise-wide threats, the solution helps you develop a comprehensive understanding of your threat landscape to identify vulnerabilities and disrupt threats. The combination of machine-led analytics and human-led analysis capabilities helps you quickly find hidden connections and critical patterns buried in internal, external and open-source data.  

IBM i2 Analyst's Notebook is a visual analysis tool that helps you turn data into intelligence. The solution provides innovative features such as connected network visualizations, social network analysis, and geospatial or temporal views to help you uncover hidden connections and patterns in data. This insight can help you better identify and disrupt criminal, cyber and fraudulent threats.

IBM i2 iBase is an intuitive intelligence data management application that enables collaborative teams of analysts to capture, control and analyze multi-source data in security-rich workgroup environments. It addresses the analyst’s daily challenge of discovering and uncovering networks, patterns and trends in today’s increasing volumes of complex structured and unstructured data. i2 iBase provides a multi-user data sharing environment that combines rich analysis and visualization capabilities with dissemination tools.

i2 Courses:

i2 Request for (Product) Enhancement (RFE) Process

This video walks you through how to make a request through IBM's website  for a product enhancement.

IMPORTANT: You must have an IBM user id before you use this RFE process. A link is provided to the sign-up page for a user id.

i2 Product Access Management (PAM) Guide

This video provides an overview, configuration and installation information for using the Product Access Management (PAM)  system with your i2 applications.

PAM is an optional method for controlling the number of users that can currently run on an IBM i2 application. It ensures that you do not exceed the number of licenses you have purchased for the i2 applications.

PAM is an optional method for controlling the number of users that can currently run on an IBM i2 application. It ensures that you do not exceed the number of licenses you have purchased for the i2 applications.

In this series you will learn:

  • What is the PAM all about?
  • how to install PAM
  • how to generate the lock code to use with PAM
  • how to install the PAM server components
  • how to install i2 applications with PAM enabled

Duration: 33 minutes


Product Access Management (PAM): Overview

This video provides you with an overview of using the IBM Product Access Management (PAM) system for your i2 products.

PAM is an optional method for controlling the number of users that can currently run on an IBM i2 application. It ensures that you do not exceed the number of licenses you have purchased for the i2 applications.

Duration: 3 minutes

i2 Subjects:

IBM i2 Enterprise Insight Analysis

IBM i2 Analyst's Notebook

IBM i2 Base

i2 Videos: How do I...

i2 Latest

System Integrations

i2 Course Translations