North America User Conference

Military and Defense

Supporting the Department of Defense, UK MOD, and other NATO partner forces for over 25 years.

Man in uniform at desk looking at multiple monitors

Full-spectrum intelligence analysis for a wide range of military use cases 

Deriving intelligence across multiple information feeds can be challenging. This is often compounded with the need to synchronise headquarter operations to those working on operations.

i2 delivers a scalable environment to collate information from SIGINT, HUMINT, OSINT, SOCINT, GEOINT, and sensor data with the capabilities to perform all-source multi-dimensional analysis and reporting. With a modular and interoperable approach, i2 provides the agility and self-service requirements to combat today’s complex and changing landscape.

Counter-terrorism unit being briefed

Counter-Terrorism

Prevent, mitigate, and respond to terrorist threats

Data structure

Counter-Insurgency

Defeating irregular forces such has guerrillas and revolutionaries

Grid-small-bg

Counter-Intelligence

Respond to espionage and intelligence activities by foreign entities

A group of soldiers on patrol walking down a gravel track

Force Protection

Safeguarding military personnel, equipment, facilities, and operations

Military man working at desk

Cyber Threat-Hunting

Proactive search and mitigation of potential cyberattacks and vulnerabilities

Grid-small-bg

Conventional Order-of-Battle Analytics

Assessment of a military forces' capabilities in conventional operations

Grid-small-bg

Military Law Enforcement

Enforcing military laws and regulations

Humvees in desert camouflage at an army base.

Supply Chain Analysis

Assessment of the logistics and distribution network

i2 is a key component of military intelligence

  • i2 Analyst’s Notebook’s rich functionality has been successfully deployed in numerous military use cases. From detailed of pattern-of-life to precise temporal analysis it has enabled both the protection of allied forces and the identification of hostile actors.

    More advanced solutions such as Analysis Hub and Analysis Studio have enhanced the stand-alone capability into a fully integrated solution with a shared data repository, connectors to numerous data streams, as well as tight integration with ESRI Arc-GIS, and other partner platforms, making i2 a powerhouse for data analysis.

  • And with i2 TextChart we are vastly reducing the analyst’s workload. It is pioneering the automation of extracting entities, links and properties from unstructured text from OSINT as well as traditional intelligence reports.

    As the military shifts from mainly counter-insurgency and counter-terrorism to confront more conventional near-peer adversary threats, we have made the requisite changes to our use case model to enable customers to fuse data from disparate sources, locate and visualize enemy troop movements, and help predict outcomes. No longer merely a law-enforcement style tool for link analysis but an open-architecture, customizable solution for full-spectrum intelligence analysis.

Data analytics
  • Analysis Hub for National Security

    Do you have large and overwhelming data sets to analyze? With its scalable, extensible design, Analysis Hub helps organizations overcome information overload and perform intelligence analysis and analytics — at scale and at speed.

Discover how data analysis with i2 can enhance your military operations