Premier i2 Service Provider …

As one of the most experienced i2 companies in the world, Blue Light provides complete services around the i2® product portfolio. The companies engineer and development team can design, install, implement, integrate, and customize your solution to meet your requirements and provides value to your organization. As an IBM Preferred Services Partner, Blue Light will provide ongoing service, support, and maintenance after the sale.

Blue Light has assisted i2 customers around the world in all aspects of i2 software support.

Two people shaking hands

i2 Software Configuration…

Ensuring that i2 is properly configured to work with existing software, hardware and within the customers IT architecture.


i2 Software Installation…

Ensuring that i2 is properly installed and tested to ingest, access and analyze targeted databases and data.

i2 Software Development…

Building the right components including data connectors and plug-ins to access the customer’s data for ingestion and analysis.

i2 Technical Support…

Providing post-delivery support and assistance to Blue Light i2 customers.

i2 Product Training…

Ensuring customer analysts and technicians are properly trained to sustain peak i2 performance.

i2 Industry Solutions

No matter the industry, Blue Light works diligently with its customers to ensure an understanding of their problem set to identify a customer-centric solution to collate and analyze their data to provide them the insights they deserve. Using its expertise in i2 solution development, Blue Light will configure and install the solution with the customized plug-ins and/or data connectors needed to bring together data from across the customer’s IT infrastructure giving many customers a first time look at their data from an enterprise perspective. From banking to healthcare and law enforcement, Blue Light has built customized data analytics solutions to bring value to their customers.

Financial Institutions

Blue Light has been on the cutting edge in the application of i2 capabilities to the banking community. It was the first to take banking cybersecurity data from Security Identification and Event Monitoring (SIEM) environments such as QRadar and SPLUNK and integrate that with other bank records to counter fraud and hacking attacks on their external and internal networks. The integration of a financial institution’s data such as financial and customer records, emails, phone records, spreadsheets, social media accounts etc., combined with Blue Light’s i2 Analyst’s Notebook training provides the financial analyst the ability to collate both structured and unstructured information into a visual analysis environment to identify trends, fraud and counter-threat financing.


Blue Light brings an understanding of healthcare related data to a company to identify patterns and anomalies as well as the ability to combat fraud. Blue Light has been key in providing IBM i2 Analyst’s Notebook training and analytical support to commercial, Federal and State Government Health Care analysts to include Medicare. By collating both structured and unstructured information from numerous data sources such as claims, billings, hospital operating costs and pharmaceutical costs, Blue Light provides the healthcare analyst with a powerful visual analysis environment and gives them the knowledge to build data models that identify the key who, what, when, where to gain better insight and understanding of the ‘modus-operandi’ of complex networks committing fraud and waste or to provide insight into healthcare business operations and processes.


With their extensive networks and highly automated services, insurance companies have enormous amounts of data that can be analyzed and visualized to provide valuable insights into trends and fraud related activities. Using the i2 portfolio, Blue Light can assess insurance claims and policy information with insurance industry specific schema to identify fraud related activity and trends. Whether the data is structured or unstructured, on-site or in the cloud, Blue Light can combine insurance data with other industry or corporate information to avoid the “silo” problem that insurance companies often have within their policy divisions and provide them the visualization of that data they deserve.

Law Enforcement

Blue Light has accomplished more work providing i2 support to Law Enforcement in the U.S. and around the world than any other IBM Partner. The company has worked with Law Enforcement departments from major cities such as Atlanta to smaller departments around the country. To facilitate the ingestion and correlation of large amounts of Law Enforcement data, Blue Light has built connectors allowing connectivity between i2 and existing Law Enforcement software and data bases significantly increasing the amount of data that LEA analysts are analyzing and allowing analysts to work together on cases simultaneously.

Business Intelligence

With ever increasing levels of technology and automation today, it is an understatement to say that businesses are drowning in data and are missing out on the insight that data could provide if it was properly analyzed. Blue Light’s experience in connecting a company’s disparate data sources and repositories allows data that was formerly segregated to be aggregated with other corporate information giving analysts the ability to query that data to provide powerful insight into business operations and processes. From cyber threat analysis to retail loss and insurance fraud, Blue Light leverages the power of the i2 portfolio to link and visualize large amounts of business data to provide business stakeholders the insight they require to gain efficiencies, understand business trends and to minimize threats.


Blue Light provides critical support to the Commercial / Private industry sector in assisting companies with preventing retail loss. Blue Light analysts work with corporate security or loss prevention personnel to identify the data sets that apply to the security problem to be resolved. Customer analysts are then trained by Blue Light personnel to ensure that the individuals attending training have the knowledge and ability to accomplish their tasks in identifying and mitigating retail loss activity. Blue Light has been instrumental in assisting several national retail chains to identify and ingest customer and corporate information from their data files to assist the companies in reducing shoplifting and employee embezzlement.


Blue Light provides critical expertise and support to i2 cybersecurity requirements. The company has enabled the ingestion of customer cybersecurity data from Security Event and Identification Monitoring (SEIM) solutions such as Splunk and Qradar providing a deeper insight into cybersecurity anomalies and patterns allowing the customer to be more acutely aware of threat vectors and cyber attacks. Blue Light will also be launching the first the cybersecurity analysis training course for i2 as well as the Enterprise Insight Analysis (EIA) platform in 4th Quarter of 2017.


With the OPTEMPO of the last 12 years many military units have increased the variety of and quantity of data being used by their analysts to support mission requirements. However, without an analysis of where the data resides and how to automate the availability of that data, analysts must depend on highly manual processes to support complex intelligence analysis. From counter-insurgency and counter threat financing, to Counter IED and cyber threat analysis, Blue Light has the proven capability to not only automate the collection and analysis of that data using the latest upgrades of i2 but also to train military analysts on the aggregation of disparate data from of numerous databases to provide the highest level of intelligence analysis possible.

Want More Information?