Threats against both public and private enterprise are increasing in number, frequency and sophistication. To prevent this, enterprises are faced with overwhelming and different data coming from both internal and external sources.

They struggle to ingest, fuse and analyse this data at speed and scale to keep pace with rising threats. With this in mind, a spokesperson from PTL Limited, a Malta-based technology company offering tailored solutions to businesses, shares how IBM® i2® arms analysts with the advanced analytics and intelligence analysis capabilities they need to detect, disrupt and defeat advanced physical and cyber threats.

“IBM Security i2 Enterprise Insight Analysis helps your organization turn such data into actionable insight and intelligence, in near real-time.

“From national security and defence, to cyber and enterprise-wide threats, the solution helps you develop a comprehensive understanding of your threat landscape to identify vulnerabilities and disrupt threats. The combination of machine-led analytics and human-led analysis capabilities helps you quickly find hidden connections and critical patterns buried in internal, external and open-source data.”


Key Features

  • Simple data connection

Connect quickly and easily to multiple internal, external, or commercial data sources. Provides analysts with the ability to enrich their intelligence analysis by connecting to external data feeds such as OSINT (open-source intelligence), dark web, and cyber threat intelligence.

  • Advanced link analytics

Arms analysts with multidimensional visual analysis capabilities so they can quickly uncover hidden connections and patterns across multiple data sets. Enhance investigations by looking at evidence in a timeline view, enabling you to quickly identify the "when and where" events took place.

  • Visual query

Sophisticated visual query facilities allow analysts to construct queries as simple or as complicated as they need to reveal the information in your backend database.

  • Social network analysis

Help your analysts examine and analyze group structures and communication flows within networks. This enables users to better understand relationships between entities on their charts.

  • Geospatial investigation

Easily integrate with third-party mapping capabilities to be able to visualize intelligence on a map, conduct pattern of life (POL) analysis, and much more.

  • Investigate "360-view"

Allow your investigators and other operational users to conduct fast target investigation and simple search and discovery via a web browser to answer common questions quickly and easily.


The solution integrates with third-party software and offers seamless data connector capability to leverage existing data and systems, collect new data and securely share your intelligence. Designed to be scalable and interoperable, the software can be extended with add-on capabilities. Benefit from a cost-effective solution that reduces training, maintenance and deployment costs.

Main Image:

Read Next: Placeholder