Published on 27-Mar-2013
"Data visualization and flexible structures enabled us to develop analytical environments that fit exactly to the customer’s needs." - Jörn Weber, CEO, corma GmbH
Big Data & Analytics, Big Data & Analytics: Operations/Fraud/Threats, Data Warehouse, Digital Workflow Transformation
corma GmbH provides customers with innovative solutions designed to help them conduct analytical investigations and fight against various types of fraud and counterfeit crimes. corma applies state-of-the-art technological solutions for effective fraud analysis and in-depth investigations, combining innovative analysis technologies with traditional, proven investigative methods such as surveillance and background research.
A long-term valued customer of a major global company had very specific needs for an analysis solution. The customer required an intelligence anti-counterfeit database that needed to not only to be centrally managed, but also shared with a larger audience
Incorporating customer, user and other external feedback, corma proposed a unique customization of IBM i2 solutions, creating a strong intelligence database structure that could easily import and correlate data from various databases
Since the deployment, there has been a marked jump in the number of leads generated, effectively helping their customers to detect, prevent and stop more counterfeit measures
corma GmbH provides customers with innovative solutions designed to help them conduct analytical investigations and fight against various types of fraud and counterfeit crimes. corma applies state-of-the-art technological solutions for effective fraud analysis and in-depth investigations, combining innovative analysis technologies with traditional, proven investigative methods such as surveillance and background research. Recently, corma took up the challenge to create a global intelligence database for a long-standing customer, combining state-of-the-art IBM® i2® analytical software tools and the expertise of professional analytical investigators.
Specific needs call for a unique solution
Typically, corma specializes in helping their customers perform intricate investigations involving fraud and counterfeit activities. Sometimes this involves taking large quantities of customer data and applying their expert analysts and analytical tools. While this allows them to provide a valuable external service for the customers, it is not the only solution they offer. Another aspect of their organization is creating customizable software solutions built directly into the customer’s organization to allow them to conduct their own analysis. For more than eight years, corma has been using IBM i2 for both sides of their services. IBM® i2® iBase has assisted them with correlating large amounts of data that could overwhelm other systems. corma also routinely creates and deploys custom solutions for their customers using IBM i2 products.
In one case in particular, a long-term valued customer of a major global company had very specific needs for an analysis solution. The customer required an intelligence anti-counterfeit database that needed not only to be centrally managed, but also shared with a larger audience. It had to combine multiple sources of data to create actionable intelligence and, most importantly, it needed to be simple to use. To determine the scope of the project, corma’s Jörn Weber spoke to the primary future users to ensure the proposed solution would address their needs.
What he discovered was a desire for Google-like search options; a solution that works in and searches multiple languages at once; and, even more so, the customer wanted something that could painlessly connect to existing IBM i2 software, particularly IBM® i2® Analyst’s Notebook®. With this information, Jörn proposed a solution that consisted of a unique combination of IBM i2 products that met the customer’s specifications.
Building a custom solution with IBM i2 products
Jörn’s solution included attaining licenses for the customer for, iBase, Analyst’s Notebook, IBM® i2® iBase IntelliShare, IBM® i2® Text Chart and IBM® i2® Chart Reader. All products were attached to powerful hardware and, with iBase IntelliShare, both analysts and investigators could access the data from various locations. This inclusion of iBase IntelliShare was the first time the software would be deployed in Germany which, was an exciting first for both corma and IBM.
By engaging the customer, users and other external feedback, corma determined that a unique customization of IBM i2 solutions would create a strong intelligence database structure that specifically addressed the customer’s needs. corma then moved on to importing and correlating the data from the customer’s existing databases, all of which were structured differently.
With more than 7,000 cases and gigabytes of data that needed to be imported, it was pivotal to create data definitions in iBase that allowed them to do an initial import of the disparate data; whether it be OSINT, older case management solutions or various other types of documents. Once the data was in the repository, corma then set predefined queries for analysts to work with the data, check for duplicates, merge entities and set data cleansing rules.
Optimizing product investments
Once corma deployed the IBM i2 solution, they needed to train the users on the software so that they could maximize their investment in the products. Since they had users at different skill levels, corma decided to conduct one-on-one training sessions for dedicated users. This enabled the customer’s team to take full advantage of the project’s setup. In addition, corma set up defined reporting techniques and monthly user forums to discuss project-related questions, current investigations and feedback on database enhancements. They determined that frequent communications optimized the project’s successful outcome.
In the first year alone, there has been a marked jump in the number of leads generated, effectively helping their customers to detect, prevent and stop more counterfeit cases.
For more information
To learn more about IBM i2, please contact your IBM representative, or visit: ibm.com/i2software
To learn more about all of the IBM Smarter Cities solutions, visit: ibm.com/smartercities
Products and services used
© Copyright IBM Corporation 2012 IBM CorporationSoftware GroupRoute 100Somers, NY 10589U.S.A. Produced in the United States of America November 2012 i2, Analyst’s Notebook, COPLINK, IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corporation in the United States, other countries or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or TM), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. Other product, company or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” at: ibm.com/legal/copytrade.shtml The content in this document (including currency OR pricing references which exclude applicable taxes) is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The performance data discussed herein is presented as derived under specific operating conditions. Actual results may vary. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NONINFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided.