We invite you to shape the future of IBM, including the product roadmap, by submitting enhancement ideas that matter to you the most.
Here's how it works:
Post your ideas
Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and vote for them if they matter to you,
Post an idea
Vote for ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Post an Idea
To post a new idea - click on the "Add a new idea" button and where asked select the appropriate category this idea relates to. Provide requested information to allow us to get a better understanding of your request.
All ideas submitted via this portal are visible to all other portal users, though personal information fields remain hidden. If you would rather have your idea visible to only you and IBM then use the IBM Security Private Ideas Portal instead.
Please note: The purpose of the Ideas Portal is to tap the creativity of the IBM Security community so that we can enhance our products for everyone! If you need to report a defect or get help, please use our normal support channel. Click here to open a support ticket.
Want to see all of your IBM ideas in one place? Find them at ideas.ibm.com
#cpfield Additional GI/PrivilegedVault integration use case -- add user checkout/checkin activities in regular reports
This is the more common use case for Guardium/PrivilegedVault integration. Current GI / Privileged Vault integration adds additional data in Risk Engine pages. But the more common scenario would be to be able to correlate the end user names from P...
We would like the ability to ingest GDP Data Archive files into GI so we can back load data currently stored for compliance purposes. This will allow us to not have to restore data on the GDP appliances when requests for archived data come in. It ...
Customer'd like to check: DB2 utilization (disk usage). Maybe DB top tables. POD health check. They don't wanna to open openshift console to check ICS and GI pod to check it. Some reports like our GDP reports.
Allow filtering Full SQL reports by Verb or Object
Not only for GDP compatibility - reports to cover basic use cases like showing what is being changed in a DML statement or what changes are being made to a table in the sensitive tables group can't be done in GI! One must either use the Activity d...
Both scheduled and online reports should have a PDF option. Not only is the PDF format friendlier and more acceptable than CSV in certain circles, but having PDF output is an existing feature that many GDP users would expect to have in GI, so exis...
Make relative date specification compatible with GDP options
Existing GDP users wishing to port GDP audit processes to GI are unable to do so because all relative date options available in scheduled reports are relative to the current execution time, and only LAST 3h, 24h, 7d, or 30d options are available. ...
Integration with Service Now to reconcile activity with change orders
Customers want to pull in change control records and be able to exclude reviewing session information for the relevant DBA/App user sessions. Some customers built their customizations in GDP but if we can do it in Guardium Insights, that would be ...
Client needed to go through internal ticketing/approvals when they make changes to Guardium groups. Whether it be groups being used by a Policy or by Risk event calculations, it affects how Guardium logs / alerts / calculating risk events. For exa...
#cpfield Adding custom groups to GI Risk Event calculation
Add “risky user groups” or custom groups to risk event calculation — Sample use case -- Employees who failed internal phishing tests are less “security-conscious” and they are considered ”risky user group” in the company. Perhaps their clientIPs ...
The outlier/risk analysis of the engine is currently based on OOTB attributes such as DB User, Server IP or Database Name. Tha GI administrator should be able to customize on which attributes the algorithm should run. i.e. in many deployments the ...