IBM i2 EIA unravels hidden threats from disparate data

IBM has unveiled its new high-speed analysis and criminal investigation software that helps fight cybercrime at high speeds and massive scale.

The new IBM i2 Enterprise Insight Analysis (EIA) can uncover criminal threats buried deep inside massive volumes of disparate corporate data, and find non-obvious relationships masked within hundreds of terabytes of data and trillions of objects in just seconds.

The software accelerates the data-to-decision process by uncovering new insights into criminal threats against the enterprise that intelligence and security analysts might otherwise not have realized for days, weeks or months later, IBM said.

EIA analyzes huge amounts of disparate data to discover weak-signal relationships that reveal the true nature and source of an attack.

IBM  claims that EIA can unravel the hidden connections that can be divided by as many as six degrees of separation between disparate sources – from corporate records and social media chatter to data accessed by remote sensors and third-party applications.

Maria Vello, president and CEO of The National Cyber-Forensics & Training Alliance (NCFTA) acknowledges that the new IBM i2 offering is an impressive tool in its ability to quickly analyze the massive data sets in near real time to paint a complete picture of the threat.

Built on IBM Power Systems, IBM i2 Enterprise Insight Analysis can complement existing security or fraud solutions with additional features such as multi-dimensional visual analytics, open and modular architecture, interoperability inside and outside the organization, and out-of-box functionality that reduces the training, maintenance and deployment costs while allowing organizations to quickly begin protecting their infrastructure.

Read other development from IBM: IBM provides technology to help contain Ebola outbreak

Bob Griffin, general manager, i2, Threat and Counter Fraud, IBM, said, “With IBM i2 Enterprise Insight Analysis, we’ve changed the ability of investigators to find that illusive needle in a haystack that helps them detect a cyber attack. This provides any organization with always-on analytics that turns massive amounts of data into real-time insights in a way that simply wasn’t possible before.”

[email protected]