shopify stats

IBM i2 Analyst’s Notebook

Turn Data Into Intelligence

Companies are facing a constant battle against criminals who are using ever more sophisticated techniques and technologies to commit their crimes.  As the criminals get smarter, companies need to innovate. Increasingly, forward-thinking organizations are turning to technology to help detect fraud attempts, minimize losses, prevent further exposure, identify culprits, and gather evidence to help law enforcement catch and prosecute criminals.

IBM i2 Analyst’s Notebook delivers data storage, analysis, visualization and dissemination capabilities that enable government agencies and private sector businesses to increase the value of the massive amounts of information that they collect. These tools give organizations the ability to discover hidden connections and patterns in data. This insight helps identify, predict, prevent and disrupt criminal, terrorist and fraudulent activities.


Gain a full intelligence view
Perform analysis of a wide range of data types with a flexible data modeling and visualization environment.

Identify key people and events
Gain insight into and deeper understanding of data using multiple analysis views including association, temporal, spatial and statistical views.

See relationships in networks
Use integrated social network analysis capabilities to increase understanding of the structure, hierarchy and method of operation of criminal, terrorist and fraudulent networks.

Analyst’s Notebook helps organizations to:


Rapidly piece together disparate data into a single cohesive intelligence picture.

  • Piece together structured and unstructured data from a variety of sources into a single cohesive intelligence picture.
  • Import a wide range of data types, including telephone call records, financial transactions, computer IP logs and mobile forensics data.
  • Quickly turn data into clear visualizations to aid the analysis of complex scenarios.
  • Perform effective analysis of a wide range of data types with a flexible data modeling and visualization environment.

Identify key people events, connections and patterns with innovative features like social network analysis, “list most connected” and “find connected networks”.

  • Gain insight into and deeper understanding of data using multiple analysis views, including association, temporal, spatial and statistical views.
  • Quickly highlight key individuals and relationships and their connections to key events with core link analysis capabilities.
  • Understand the critical timeline of events or patterns within criminal activities using powerful temporal analysis tools.
  • Identify potential important intermediaries between seemingly unconnected entities in a network.
  • Instantly highlight potentially key information in communications and transactional data.

Increase understanding of the structure, hierarchy and method of operation of criminal, terrorist and fraudulent networks.

  • Use integrated social network analysis capabilities to help identify key individuals and relationships within networks.
  • Aid the decision-making process and optimize resource utilization for operational activities in network disruption, surveillance or influencing.

Simplify the communication of complex data to enable timely and accurate operational decision making.

  • Create intuitive visual briefing charts that capture and organize supporting data for briefing and presentation purposes.
  • Integrate information and visualizations into intelligence reports with i2 Analyst’s Notebook.
  • Share charts with people who do not use i2 Analyst’s Notebook through the no-charge IBM i2 Chart Reader software.

Capitalize on rapid deployment that delivers productivity gains quickly using a well-established visual analysis solution.

  • Use a wizard-driven installer to eliminate the need for expensive professional services and deployment costs.
  • Perform analysis and generate intelligence product activities more quickly with rapid deployment of powerful visual analysis capabilities.
  • Intuitive, modern user experience shortens user ramp-up times.
  • Harness the experiences of more than 2,500 organizations worldwide that have used i2 Analyst’s Notebook analysis solutions in real operational environments.
  • Take advantage of a global support infrastructure, which includes versions available in 19 languages.
  • Customize i2 Analyst’s Notebook analysis and visualization features to meet specific analytical needs.

Feature Spotlights

See connections and patterns

IBM i2 Analyst’s Notebook Connector for Esri delivers association, temporal and geospatial analysis by integrating with Esri’s ArcGIS Server geospatial functions.

Connect directly to data

i2 iBridge connects to select enterprise databases with search/query capabilities to return analysis-ready data. i2 Information Exchange for Analysis Search for Analyst’s Notebook connects to/searches multiple sources at once to retrieve analysis-ready data.

Extract text

i2 Text Chart: Intuitive, user-controlled text extraction and visualization to help with unstructured data assimilation. i2 Text Chart Auto Mark: Desktop app that automatically discovers and highlights entities of interest within a wide variety of documents.

Analyze call records

i2 Pattern Tracer rapidly analyzes large volumes of call detail records to identify call clusters and uncover key participants. It can quickly identify potential call targets and help prevent future call incidents.

IBM i2 Chart Reader

Successful investigations often depend on the ability to disseminate. i2 Chart Reader allows analysts to share intelligence with those who don’t have access to i2 Analyst’s Notebook. Download it for free in the Resources section.Contact i3solutions today to learn more about IBM i2 Analyst’s Notebook and how to protect your organization from criminal, terrorist and fraudulent activities.