Name: Cyber

Text: Cyber
i2 CONNECTS THE CYBER WORLD WITH THE REAL WORLD
Accel er ati ng You r M ission .

Cyber, part of the Intelligence-Led Operations Platform, brings together thousands of real-world data sources and
millions of data points to link amorphous cyber threats with actual people and physical locations.

"We have built our future upon a capability that we have not learned how to protect."
- George Tenet, Former CIA Director
Attacks on information infrastructure pose the most
serious economic and national security threat of the
21 st century. Gone are the days of individual hac kers;
today's cyber criminals are members of organ ised
crime rings and hostile nation states.
Many "cyber solutions" provide info r mation about
activity on your network. What IP address talked to
what other IP addresses, what data may have passed
through the Internet cloud . However, none of them
can connect your analysis with the real-world the
way i2 can . Only i2 brings together thousands of
real-world data sources and millions of data points
that link amorphous cyber threats w ith actual people
and physical locations.

Cyber is used worldwide by:

Quickly ftnd the people behind the cyber threats by layering cyber
analysis with real-world data

• National Security
• Defence
• Law Enforcement
Government
• Private Sector

_.:.:-

-~

-.

·-- ..

_

..

To investigate and prevent:

" --·

.-- :.:.~-

··- :..:. :::..:. ···
:._::.·····

Computer network exploitation
• Financial crime, fraud and identity theft
• Denial of service attacks
• Spear Phishing

Robust analytics and activity timeline mapping help identify patterns ta

prevent and predict future attacks

• Online ch ild exploitation
... and other forms of Cyber Crime

Ever tried arresting a BotNet?

Quickly find the people behind the
cyber threats by layering cyber analysis
with real-world data

...... _............. ,,_ ......... ...... ,....q-;
~

.h .h l '!! J
:_ .l

... -

i

.,
~ o 1 ). ii. l.
o - o - ;a - 1 - ~ - -. -

"l ,::. .J

.6 · ~
·~
..=~

. ._._

Robust analytics and activity timeline mapping help
identify patterns to predict and prevent future
attacks
Extensi ble tools that read and digest data from
various sources help you hone in on the subject of
your investigation by connecting people and places
to cyber events
• ldentify, penetrate , and neutralise foreign operations
that use cyber means as the primary tradecraft
methodology
• Know what's happening on your network from the
inside out

= ·-

-

---

.

t

-~~~
--"'--' ...,

Geospotially map IP addresses to exacting locations even without on
internai connection

Turn large quantities of data into
actionable intelligence
Key Capabilities and Benefits

• Find information from unique sources and
relationships such as user groups, subnets, machine
and human social networks, spear phishing
operations, child exploitation networks, IP net
intrusions and embedded PDFs

The Cyber solution analysis platform provides:
• Rich extraction, analysis and visualisation
capabilities that turn high quantities of
cyber data into actionable intelligence

• Connect unlimited unique data sources to validate
your investigation, including automated number
plate recognition data

• Rapid pattern analysis quickly identifies key
characteristics to predict and prevent
future attacks

• Generate solid documentation for investigation
and prosecution purposes

• Sophisticated analytical database for
managing and analysing multi-source data

Easy to manage, deploy and maintain
• Cyber is a flexible solution that allows you to
layer an array of currently available data sets as well
as accommodate future technologies and data
sets as they become available
• Train your analysts on only one programme while
still gathering intelligence from all of your sources

• Geo lookup
• Look up geographical information of IP
addresses

• Blacklist Checker
• Check IP addresses against real-time
blacklists

• lncrease network awareness and improve best
practices

For more information on Cyber
see: www.ilgroup.com

gl
BRO _ CYBER_UK_l 905201 O_ H igh

Accelerating Your Mission.

www.i2 g roup.com
i2, the i2 logo. COPLINK and Analyst's Notebook are registered trademarks
of i2 Limited. Copyright © i2 Limited 201 O. Ali rights reserved .

Document Path: ["880-i2-brochure-cyber.pdf"]

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh