Skip to Main Content
IBM Security Ideas Portal

Shape the future of IBM Security

We invite you to shape the future of IBM, including the product roadmap, by submitting enhancement ideas that matter to you the most.

Here's how it works:

Post your ideas

Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and vote for them if they matter to you,

  1. Post an idea

  2. Vote for ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea

Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.

Receive notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.

Post an Idea

To post a new idea - click on the "Add a new idea" button and where asked select the appropriate category this idea relates to. Provide requested information to allow us to get a better understanding of your request.

"Missing" Security Products?

If you cannot find the IBM Security product you are looking for then it is probably located in the IBM Security Private Ideas Portal. Check that site to open an idea.

Idea visibility

All ideas submitted via this portal are visible to all other portal users, though personal information fields remain hidden. If you would rather have your idea visible to only you and IBM then use the IBM Security Private Ideas Portal instead.

Please note: The purpose of the Ideas Portal is to tap the creativity of the IBM Security community so that we can enhance our products for everyone! If you need to report a defect or get help, please use our normal support channel. Click here to open a support ticket.

Want to see all of your IBM ideas in one place? Find them at



All ideas

Showing 3464 of 3464

The customer requires Admin Roles (tabs) order should be adjustable in Request center .

The customer requires Admin Roles (tabs) order should be adjustable in Request center . This is extremely important for customer's end users to have tabs presented in specific order in Request Center. It means that when user has 3 Admin Role...
4 days ago in Verify Governance 0 Submitted

Normal enroll device could restrict or block specific apps

We create a case for iOS MDM policy to restrict or block a app. But it seems have to use DEP enroll for it now. So we want it possible to control the specific apps on the normal enroll device.
about 4 hours ago in MaaS360 Mobile Device Management (Policy & Actions) 0 Submitted

Add JDBC Support For Microsoft SQL Server 2019

Since all MSSQL server in my organization are upgraded to 2019, we need to integrate integrate with QRadar SIEM to get audit logs.
about 6 hours ago in QRadar Integration (DSM, Scanners, Rules, Reports) 0 Submitted

Guardium User Activity Audit Log should include a success/fail flag so failed attempts are logged

Failed attempts need to be logged and reviewed for potential attack.

Add Azure VM Events to Microsoft Defender DSM

A common attack vector for customers is to utilize VM creation for a command and control structure within a cloud environment. Currently you can use the the Azure platform logs to monitor what happens on a VM but not the creation or a manipulation...
1 day ago in QRadar on Cloud 0 Submitted

#cpfield Additional GI/PrivilegedVault integration use case -- add user checkout/checkin activities in regular reports

This is the more common use case for Guardium/PrivilegedVault integration. Current GI / Privileged Vault integration adds additional data in Risk Engine pages. But the more common scenario would be to be able to correlate the end user names from P...
1 day ago in Guardium Insights 0 Submitted

Post office - getPersonByuid()

We currently use Postoffice group email notifications with. getPersonByEmailAddress() / if(PostOffice.getTopic()=="Requestor_Submission_Notification" || PostOffice.getTopic()=...
2 days ago in Identity Manager 0 Submitted

Imperva SecureSphere support version 14

QRadar currently does not support Imperva SecureShpere WAF v14 or above version, and some of the customer have upgraded their WAF to v14, which cause compatibility issue.

Endpoints with Windows 11 OS registers as Windows 10 in ReaQta Hive brain

Endpoints with Windows 11 OS registers as Windows 10 in ReaQta Hive brain as the Windows 11 OS version starts as and kernel of windows 11 is seen as of a windows 10. Is it possible to include a regex/filter, so that when the OS vers...
8 days ago in Endpoint Detection and Response, ReaQta 0 Submitted

Wrong parser for IBM Informix Audit source

On the IBM website you can download a parser for the IBM Informix Audit source version DSM-IbmInformixAudit-7.4-20191111023154.noarch. This parser does not properly parse events related to IBM Informix Audit sources from version greater than 11. A...
9 days ago in QRadar Integration (DSM, Scanners, Rules, Reports) 1 Future consideration