Skip to Main Content
IBM Security Ideas Portal

Shape the future of IBM Security

We invite you to shape the future of IBM, including the product roadmap, by submitting enhancement ideas that matter to you the most.

Here's how it works:

Post your ideas

Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and vote for them if they matter to you,

  1. Post an idea

  2. Vote for ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea


Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.


Receive notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.


Post an Idea

To post a new idea - click on the "Add a new idea" button and where asked select the appropriate category this idea relates to. Provide requested information to allow us to get a better understanding of your request.


"Missing" Security Products?

If you cannot find the IBM Security product you are looking for then it is probably located in the IBM Security Private Ideas Portal. Check that site to open an idea.


Idea visibility

All ideas submitted via this portal are visible to all other portal users, though personal information fields remain hidden. If you would rather have your idea visible to only you and IBM then use the IBM Security Private Ideas Portal instead.


Please note: The purpose of the Ideas Portal is to tap the creativity of the IBM Security community so that we can enhance our products for everyone! If you need to report a defect or get help, please use our normal support channel. Click here to open a support ticket.


Want to see all of your IBM ideas in one place? Find them at ideas.ibm.com

ADD A NEW IDEA

FILTER BY CATEGORY

Pinned ideas

View all
PINNED Suspicious Activity Report (SAR) Web Page
Users accessing this page are not SOAR / CP4S users, and feeling a form entry will trigger a case opening in the SOAR, if they have a cyber Suspicious Activity Report (SAR) to make. They would need to log on to a SAR website, update what they have...
PINNED Get the possibility to have a floating Note, autosaved, used to fill a Summary incident report by analyst at any time, on any view of the incident
When Analyst usually works on SOAR they are using Notes to fill their finding. They are facing multiple problems: - the note is not autosave and they lose the data during tab change, timeout, or other operation - the note is not accessible on all ...

All ideas

Showing 2999 of 2999

DSM for HAProxy device

There is currently no DSM for HAProxy. We have around 5 clients using HAProxy and would need it to be supported. Can you please create the DSM to parse logs from this technology ? This reverse proxy uses syslog so only a DSM should be necessary.

Encrypt secrets in AppHost

The current functionality to store secrets on the AppHost apps to uses Kubernetes in a way that expose the secret on the shell environment as plain text. We would like to have an in memory checkout process for secrets during on execution time as i...
13 days ago in QRadar SOAR / Integrations 9 Under review

QRadar Community Edition (CE) version 7.5.0 or later

Several users have created support forum requests for an update to QRadar Community Edition (CE) to bring the release up to a newer QRadar version. I discussed this issue with Product Management (PM) and the goal of this Idea is for users to vote ...
4 days ago in QRadar Security Info and Event Management 3 Submitted

API access to query datatable across incidents

Using the REST API... I can get the list of data table rows for an incident I can search the list of data table rows across all incidents I cannot (today) query the data table rows across incidents I can try to artificially use search to do a quer...
4 days ago in QRadar SOAR / Integrations 0 Submitted

Support of the AES-GCM algorithms by the ISVA KESS

By researching the IBM Docs, the https://www.ibm.com/docs/en/sva/10.0.3?topic=properties-saml-20-module section mentions follwowing supported encryption algo's: Specifies the block encryption algorithm. TRIPLEDES, set to http://www.w3.org/2001...
5 days ago in Verify Access 0 Submitted

Allow CloudFlare integration on QRoC Console using HTTP Receiver protocol

Nowadays is not allowed by IBM to integrate a CloudFlare log source using the HTTP Receiver protocol published on QRoC Console (is only allowed on Managed Hosts). The purposes of this idea are: to avoid publishing ports from on-premise managed hos...
101 VOTE

Add the feature that also supports older operating systems and DBMS.

//* the present behavior *// The current Guardium S-TAP for Db2 on z/OS V10.1.3 does not support older OS (like z/OS V2.1) and Db2 that became to be EOS. And the same as V11. Here are the description in the two documents. (1) S-TAP for z/OS V10.1....
8 months ago in Guardium Data Protection / IBM Guardium for System Z 2 Not under consideration

SAP Session Recording on IBM Verify Vault

SAP is a widely used by our customers. Also, they want to integrate SAP with the IBM Verify Vault, because they want to audit SAP sessions. We prepared custom launcher for SAP with different ways (powershell command and autoit script). However, we...
3 days ago in Verify on Cloud 0 Submitted

Support Response_length for zOS DB2 traffic

In guardium version 11.4 response_length was announced as officially supported (please check release notes: .https://www.ibm.com/support/pages/system/files/inline-files/Release%20Notes%2011.4.pdf). Seems like this feature it was missed for zOS DB2...
3 days ago in Guardium Data Protection / IBM Guardium for System Z 1 Under review

Populate source and Destination Information from Payload for Windows Logs

We have an issue whereby we send our windows logs via Windows Event Forwarding (WEF) to a centralized Windows Event Collector. We then forward them to a syslog forwarder using Rsylog agent for Windows, which in turn, forwards them onto Qradar. Win...
26 days ago in QRadar on Cloud 0 Submitted