We invite you to shape the future of IBM, including the product roadmap, by submitting enhancement ideas that matter to you the most.
Here's how it works:
Post your ideas
Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and vote for them if they matter to you,
Post an idea
Vote for ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Post an Idea
To post a new idea - click on the "Add a new idea" button and where asked select the appropriate category this idea relates to. Provide requested information to allow us to get a better understanding of your request.
All ideas submitted via this portal are visible to all other portal users, though personal information fields remain hidden. If you would rather have your idea visible to only you and IBM then use the IBM Security Private Ideas Portal instead.
Please note: The purpose of the Ideas Portal is to tap the creativity of the IBM Security community so that we can enhance our products for everyone! If you need to report a defect or get help, please use our normal support channel. Click here to open a support ticket.
Want to see all of your IBM ideas in one place? Find them at ideas.ibm.com
Users accessing this page are not SOAR / CP4S users, and feeling a form entry will trigger a case opening in the SOAR, if they have a cyber Suspicious Activity Report (SAR) to make. They would need to log on to a SAR website, update what they have...
Get the possibility to have a floating Note, autosaved, used to fill a Summary incident report by analyst at any time, on any view of the incident
When Analyst usually works on SOAR they are using Notes to fill their finding. They are facing multiple problems: - the note is not autosave and they lose the data during tab change, timeout, or other operation - the note is not accessible on all ...
There is currently no DSM for HAProxy. We have around 5 clients using HAProxy and would need it to be supported. Can you please create the DSM to parse logs from this technology ? This reverse proxy uses syslog so only a DSM should be necessary.
The current functionality to store secrets on the AppHost apps to uses Kubernetes in a way that expose the secret on the shell environment as plain text. We would like to have an in memory checkout process for secrets during on execution time as i...
QRadar Community Edition (CE) version 7.5.0 or later
Several users have created support forum requests for an update to QRadar Community Edition (CE) to bring the release up to a newer QRadar version. I discussed this issue with Product Management (PM) and the goal of this Idea is for users to vote ...
Using the REST API... I can get the list of data table rows for an incident I can search the list of data table rows across all incidents I cannot (today) query the data table rows across incidents I can try to artificially use search to do a quer...
Support of the AES-GCM algorithms by the ISVA KESS
By researching the IBM Docs, the https://www.ibm.com/docs/en/sva/10.0.3?topic=properties-saml-20-module section mentions follwowing supported encryption algo's:
Specifies the block encryption algorithm.
TRIPLEDES, set to http://www.w3.org/2001...
Allow CloudFlare integration on QRoC Console using HTTP Receiver protocol
Nowadays is not allowed by IBM to integrate a CloudFlare log source using the HTTP Receiver protocol published on QRoC Console (is only allowed on Managed Hosts). The purposes of this idea are: to avoid publishing ports from on-premise managed hos...
Add the feature that also supports older operating systems and DBMS.
//* the present behavior *// The current Guardium S-TAP for Db2 on z/OS V10.1.3 does not support older OS (like z/OS V2.1) and Db2 that became to be EOS. And the same as V11. Here are the description in the two documents. (1) S-TAP for z/OS V10.1....
SAP is a widely used by our customers. Also, they want to integrate SAP with the IBM Verify Vault, because they want to audit SAP sessions. We prepared custom launcher for SAP with different ways (powershell command and autoit script). However, we...
In guardium version 11.4 response_length was announced as officially supported (please check release notes: .https://www.ibm.com/support/pages/system/files/inline-files/Release%20Notes%2011.4.pdf). Seems like this feature it was missed for zOS DB2...
Populate source and Destination Information from Payload for Windows Logs
We have an issue whereby we send our windows logs via Windows Event Forwarding (WEF) to a centralized Windows Event Collector. We then forward them to a syslog forwarder using Rsylog agent for Windows, which in turn, forwards them onto Qradar. Win...