Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

8/31/2011
07:21 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

IBM To Acquire i2 To Accelerate Big Data Analytics

i2 is a provider of intelligence analytics for crime and fraud prevention

ARMONK, N.Y., August 31, 2011: IBM (NYSE: IBM) today announced a definitive agreement to acquire i2 to accelerate its business analytics initiatives and help clients in the public and private sectors address crime, fraud and security threats. Financial terms were not disclosed.

With more than 4,500 customers in 150 countries, i2 is a leading provider of intelligence analytics for crime and fraud prevention based in Cambridge, UK with U.S. headquarters in McLean, Va. i2’s clients span multiple sectors globally such as banking, defense, health care, insurance, law enforcement, national security and retail. i2 solutions are currently used by 12 of the top 20 retail banks globally and eight of the top 10 largest companies in the world.

Organizations in both the public and private sectors today are facing an exponential increase in “big data” -- information and intelligence coming from disparate and unstructured sources including social media, biometrics and criminal databases. When it is accessible to the people who need it, this information can be used to anticipate potential problems, make better, faster decisions, and coordinate resources to deliver exceptional service to citizens and customers.

Today’s acquisition will extend IBM’s leadership in helping clients harness this data through the addition of i2’s intelligence analysis and tactical lead generation capabilities, which help cities, nations, international bodies and private enterprises combat fraud and security threats.

Fraud and security threat reduction is of strategic importance across all industries today. According to FBI statistics, in 2009 there were 1.3 million violent crimes, 9.3 million property crimes and 6.3 million larceny/thefts in the United States.* Consumer-facing fraud for retailers alone costs $100 billion a year in the United States. **

In response to these threats, businesses and government agencies are seeking to empower public safety officers, analysts, managers, detectives and investigators with industry-specific intelligence analysis and operational insight solutions. For example, government agencies today are concerned with increased threats to public safety, which are driving the need for secure information sharing.

“IBM’s goal is to better equip public safety officials and businesses with the information and tools they need to ensure safer cities,” said Craig Hayman, General Manager of Industry Solutions at IBM. “The combined capabilities of IBM and i2 will help customers uncover patterns and trends that will allow them to more effectively protect the privacy and safety of citizens, businesses and governments.”

“The combination of i2’s products and IBM’s advanced data collection and warehousing technologies will be compelling for clients seeking to enhance situational awareness and make connections between seemingly unrelated information from oceans of data,” said Robert Griffin, CEO, i2. “i2’s existing clients will be at home with IBM, a company known for its ability to help organizations make the most of their data assets.”

Using IBM real-time analytical solutions in combination with the technologies of i2, public agencies and private enterprises battling fraud will now have the capability to better collect, analyze and process all the relevant data at their disposal. In the past, data overload often led to critical information or opportunities being missed. Now local, state, and federal authorities can harness new intelligence to instantly detect and respond to security threats. Investigative leads can be identified quickly, helping government agencies solve crimes faster and keep officers and communities safer.

With IBM and i2, clients will have access to a comprehensive range of visualization and multidimensional analytics for the timely delivery of intelligence, including threat and fraud analytics. These tools will help analysts quickly identify connections, patterns and trends in complex data sets and easily model data in the way they think, in a single environment yielding faster analysis results, strategic reports and bulletins.

i2 will be integrated into IBM's Software Group, which is a key driver of growth and profitability for the company.

Headquartered in the UK, i2 has 350 employees and additional offices in McLean, Va.; Tucson, Ariz.; Ottawa, Ontario; and Canberra, Australia. The acquisition is anticipated to close in the fourth quarter of 2011, subject to the satisfaction of customary closing conditions and applicable regulatory reviews.

About i2

For more information, please visit i2 Web site. Follow i2 on Twitter @i2group and read the i2 blog iConnect.

About IBM

For more information about IBM, visit:

http://www-01.ibm.com/software/data/business-analytics-optimization/?cm_re=masthead-_-business-_-bzn-bao

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16863
PUBLISHED: 2019-11-14
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
CVE-2019-18949
PUBLISHED: 2019-11-14
SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.
CVE-2011-1930
PUBLISHED: 2019-11-14
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
CVE-2011-1145
PUBLISHED: 2019-11-14
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
CVE-2011-1488
PUBLISHED: 2019-11-14
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent withi...