IBM buying British security data company i2

August 31, 2011
Visitors crowd the IBM stand at the CeBIT IT fair in Hanover, central Germany, in March 2011. US computer giant IBM said Wednesday it is buying i2, a British firm that makes software for crime and fraud prevention.

US computer giant IBM said Wednesday it is buying i2, a British firm that makes software for crime and fraud prevention.

Financial terms of the transaction were not disclosed.

The Cambridge, England-based i2 has 350 employees and more than 4,500 customers in 150 countries in sectors such as banking, defense, health care, insurance, law enforcement, and retail.

IBM said i2 will help its clients deal with the exponential increase in data as they seek to combat fraud and threats.

"IBM's goal is to better equip public safety officials and businesses with the information and tools they need to ensure safer cities," Craig Hayman, general manager of industry solutions at IBM, said in a statement.

"The combined capabilities of and i2 will help customers uncover patterns and trends that will allow them to more effectively protect the privacy and safety of citizens, businesses and governments," Hayman said.

Robert Griffin, i2's , said the combination of i2 and his company "will be compelling for clients seeking to enhance situational awareness and make connections between seemingly unrelated information from oceans of data."

Explore further: IBM security suite sniffs out scammers

Related Stories

IBM security suite sniffs out scammers

May 25, 2006

IBM has enhanced its analytical software to help banks, insurers and other commercial customers foil fraud and money-laundering schemes.

IBM buys Blade Network Technologies

September 27, 2010

US computer giant IBM said Monday it has acquired Blade Network Technologies, a California company that makes data switches for computer servers.

Recommended for you

Cellphones can steal data from 'air-gapped computers'

July 28, 2015

Researchers at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies to steal critical information ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.