IBM’s Big Data analytics solution to uncover criminal cyber activity in seconds

IBM announced new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate corporate data. IBM i2 Enterprise Insight Analysis (EIA) can find non-obvious relationships masked within hundreds of terabytes of data and trillions of objects in just seconds.

Operating at high speeds and massive scale, it accelerates the data-to-decision process by uncovering new insights into criminal threats against the enterprise that intelligence and security analysts might otherwise not have realized for days, weeks or months later.

EIA analyzes huge amounts of disparate data to discover weak-signal relationships that reveal the true nature and source of an attack. The solution unravels these hidden connections that can be divided by as many as six degrees of separation between disparate sources – from corporate records and social media chatter to data accessed by remote sensors and third-party applications. As developments unfold, EIA provides always-on recommendations that proactively alert analysts to new related abnormalities at the speed of attack.

For example, consider a national retailer that hasn’t yet realized hundreds of its customers’ credit card account numbers have been stolen and sold on the black market. Any illegal transactions can be easily lost in the noise of typical day-to-day activity – such as a transaction denial, a billing dispute or multiple purchases at the same store. But when connected together, EIA can immediately spot commonalities that reveal the specific store branches that were breached. This insight allows the retailer to take action before millions of accounts are compromised and any significant damage is done.

Built on IBM Power Systems, IBM i2 Enterprise Insight Analysis can complement existing security or fraud solutions with additional features, such as:

  • Enhanced visualization capabilities: With multi-dimensional visual analytics, investigators can gain a better understanding of an attack by visualizing a comprehensive situational overview of all possible related elements for a more easily digestible viewpoint.
  • Open, modular architecture that scales as needs change: IBM i2 Enterprise Insight Analysis is fully customizable with fast integration with third-party applications and features, such as natural language processing and complementary analytics at the tactical, operational and strategic levels.
  • Interoperability inside and outside the organization: The open design not only integrates with existing infrastructure and other apps but also allows users to easily share critical threat information across the company and with partners, customers and other organizations.
  • Out-of-the-box functionality: Out-of-box functionality reduces the training, maintenance and deployment costs while allowing organizations to quickly begin protecting their infrastructure.

Don't miss