IBM Security i2 Enterprise Insights Analysis
Turn overwhelming and disparate data into actionable insight and intelligence, in near real time. From national security and defense, to cyber and enterprise-wide threats, the solution helps you develop a comprehensive understanding of your threat landscape to identify vulnerabilities and disrupt threats.
Advanced visual analysis and analytics
External data source integration, interoperability with third-party software,
Easily scalable modular design with add-on abilities
IBM Security i2 Analyst's Notebook
A visual analysis tool that helps you turn data into intelligence. The solution provides innovative features such as connected network visualizations, social network analysis, and geospatial or temporal views to help you uncover hidden connections and patterns in data.
IBM Security i2 iBase
An intuitive intelligence data management application that enables collaborative teams of analysts to capture, control, and analyze multi-source data insecurity-rich workgroup environments.
Automated analysis, internal and external data source import and export
Search functionality for stored records, documents, and charts
Flexible data gathering and management
Enterprise Insight Analysis
A centralized resource and incident management system aimed at ensuring the functioning of the organization’s management and operational processes.
The system's management module ensures that all types of technical resources and materials are accounted for and managed, while scheduling is carried out by ensuring the maintenance of shift schedules and the control of the working time planned by employees.
Operational processes include incident management, provision of e-services. Incident management functionality ensures that all incidents are recorded and maintained. The system also maintains information on all types of assignments for users to perform their duties. The maintenance of information on e-services, i.e. the processing of applications and applications registered in the system and received from the external systems.
Monitoring and Risk Profiling System
An information system that provides online tracking of the procedures for entry and departure of foreign nationals crossing the State border. The system provides an on-line verification of personal and vehicle data using national internal and external databases.
The verification of one natural or legal person in the various registers connected with the system is carried out in less than 10 seconds. This is supported by a built-in workflow mechanism, 24/7 accessibility, centralized notification functionality and extensive data processing capabilities.