IBM i2 Analyst’s Workstation is an integrated analytical solution that unlocks the value of volume incident data. A comprehensive system designed to meet all your analytical needs, it supports a variety of users performing strategic, tactical and administrative analysis.
With Analyst’s Workstation, you can quickly gain insights into patterns and trends, effectively allocate resources and evaluate operational results. Map events and entities to pinpoint locations or reveal “hotspots”, then drill-down on statistics to explore patterns and trends and to identify areas of concern for short- and long-term action. Your results can be easily communicated using intuitive charts, graphs, maps and reports.
Designed specifically for strategic and tactical analysis of volume data in the law-enforcement, national security and commercial environments the product ensures:
Industry terminology and analytical methods can be used
Reduced application complexity
Reduced training costs
Data is modelled in the way analysts think and represented as links and entities to:
Encourages lateral thought
Increases analyst creativity
Facilitates identification of hidden data relationships
A single analytical environment providing multiple analysis techniques means:
Intelligence products can be created using any combination of analytical techniques
Simplified security administration and auditing
Save training time and improve efficiency by using one solution for all your analytical and reporting needs:
Crime Pattern Analysis - Identify patterns by exploring your data by geographical area, time, frequency, intensity or associated links.
Operational Intelligence Assessment - Maintain an operation’s focus on its agreed objectives.
Market Profiling - Profile different illegal activities. Understand commodity flows, assets, key players and demand.
Demographic Analysis - Identify underlying social trends and behaviour surrounding illegal activities.
Criminal Business Profiling - look at who or what criminal organizations are targeting; how targets are selected; where their targets are located and when and how they execute their operations.
Network Analysis - Visually link individuals or organizations to quickly see the structure of the criminal network and reveal previously hidden relationships.
Risk Analysis - Examine and understand the nature and scope of illegal activities and assess the risks that criminals pose.