SOLUTIONS
The product presented is a solution from i2 Group for military and Law forces, as well as investigative or anti-fraud department.
The global threat of terrorism and insurgency is ever present and being fought daily by military forces around the world. The enemy is resilient and adaptive, and demonstrates increasing agility. This makes it more difficult for military and security forces to predict where – or even when – the next threat may come.
IBM i2 solutions are analytical tools chosen by the military intelligence personnel both at home and in the field to combat those threats. They help intelligence teams maximize the value of gathered information in the following areas:
- CI, COIN and CT operations
- Force protection
- Peacekeeping and international civilian missions
- Pattern of life analysis
- Human terrain mapping
- Target analysys and defense
i2 Group has more than 40 years of experience working with over 1,200 military organizations in 130 countries, as in Afghanistan (35 out of 50 countries involved in the International Security Assistance Force (ISAF)1 leverage).
IBM i2 solutions help maximize their intelligence collection, analysis and dissemination capabilities. They have been used across the world to analyze, process, fuse and disseminate all-source data, including HUMINT, SIGINT, COMINT and OSINT, generally found in vast quantities of disparate information in different formats, duplicate, inaccurate or incomplete data, inhibiting analysis.
Today, i2 Group solutions are an industry-leading choice for the exchange of intelligence between military forces and organizations involved in combating insurgency and terrorism and maintaining security.
Providing a clear intelligence picture across organizations, IBM i2 solutions help support multinational intelligence sharing and collaboration between rotating units and among coalition partners across theaters.
They can also enable the exchange of information with non-military organizations involved in countering insurgency and terrorism including local, national and international law enforcement agencies as well as other governmental and trans-national organizations.
In the United States, the intelligence community, Unified Combatant Commands, force protection and military law enforcement personnel use i2 Group technology daily to accomplish their missions.
Within NATO, 25 of the 28 member countries2 including the United States, United Kingdom, France and Germany use IBM i2 solutions to help equip front-line troops with the right information, at the right time, in the right format
IBM i2 Defense solutions capabilities:
- Flexible data acquisition and management
- Web-enabled data access and visualization
- Advanced multi-dimensional data analysis
- Integrated social network analysis functionality
- Interoperability with geospatial analysis and mapping tools


