Skip to Main Content
IBM Security Ideas Portal

Shape the future of IBM Security

We invite you to shape the future of IBM, including the product roadmap, by submitting enhancement ideas that matter to you the most.

Here's how it works:

Post your ideas

Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and vote for them if they matter to you,

  1. Post an idea

  2. Vote for ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea

Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.

Receive notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.

Post an Idea

To post a new idea - click on the "Add a new idea" button and where asked select the appropriate category this idea relates to. Provide requested information to allow us to get a better understanding of your request.

"Missing" Security Products?

If you cannot find the IBM Security product you are looking for then it is probably located in the IBM Security Private Ideas Portal. Check that site to open an idea.

Idea visibility

All ideas submitted via this portal are visible to all other portal users, though personal information fields remain hidden. If you would rather have your idea visible to only you and IBM then use the IBM Security Private Ideas Portal instead.

Please note: The purpose of the Ideas Portal is to tap the creativity of the IBM Security community so that we can enhance our products for everyone! If you need to report a defect or get help, please use our normal support channel. Click here to open a support ticket.

Want to see all of your IBM ideas in one place? Find them at



Guardium Data Protection

Showing 886 of 3465

Guardium User Activity Audit Log should include a success/fail flag so failed attempts are logged

Failed attempts need to be logged and reviewed for potential attack.

Universal Connector for Hadoop in the Cloud

I currently monitor Hadoop on-prem with Guardium, but this environment is in the process of being migrated to AWS, where EC2 will not be deployed so that I can install the agent and monitor it. I opened a ticket with IBM to check compatibility and...
8 days ago in Guardium Data Protection / IBM Guardium Other 0 Submitted
101 VOTE

Add the feature that also supports older operating systems and DBMS.

//* the present behavior *// The current Guardium S-TAP for Db2 on z/OS V10.1.3 does not support older OS (like z/OS V2.1) and Db2 that became to be EOS. And the same as V11. Here are the description in the two documents. (1) S-TAP for z/OS V10.1....
about 1 year ago in Guardium Data Protection / IBM Guardium for System Z 2 Not under consideration

Datasource for AWS Snowflake database

Create dynamically Group (external) from Snowflake DB.

Capture client mac attribute in STAP and External STAP

A customer prefers to use 'client mac' to track end user instead of 'client ip' because DHCP is used for their laptops. But currently 'client mac' attribute is not available when using STAP or External STAP.
11 days ago in Guardium Data Protection / IBM Guardium Data Protection 1 Under review

Reporting visibility holistically into OLD PARTITIONS

Old partions can only be found currently with must gathers or custom patch. Want visibility into the status of OLD PARTITIONS across the deployment via reporting. This can be then be used to develop threshold alerting to notify support teams when ...
12 days ago in Guardium Data Protection / IBM Guardium Data Protection 1 Under review

Syslog message template needs to be enhanced to accept fields like "Table Name", "Column Name", "Shema Name" etc which are part of Sensitive data scanning report.

Since the scan result is so important and to reduce the false positive we need those to be integrate with Splunk or chronicle kind of data analysis solution.
4 months ago in Guardium Data Protection / IBM Guardium Activity Monitor 1 Under review

Custom K-TAP module copy from GIM to GIM

Question: Can I copy a brand-new K-TAP module example bellow (Custom Bundle) to standalone GIM (NOT managed by any CM's). i.e - guard-BUNDLE-STAP- Assuming it would be an automation task...f...
28 days ago in Guardium Data Protection / IBM Guardium Data Protection 1 Under review

Support for Namespaces in integration with Hashicorp Vault

Please add a functionality for Guardium configuration form in Hashicorp Vault integration to include a dialog box to choose Namespace. As the default when configured it uses the root namespace which client does not have access to.
5 months ago in Guardium Data Protection / IBM Guardium Other 2 Under review

Set Index for other Fields on Guardium tables to increase the performance

As mentioned in our ticket TS007875038 We are having difficulties in generating audit reports that are taking a long time to run, and we would like to check the possibility of creating indexes for certain fields in order to speed up the extraction...
10 months ago in Guardium Data Protection / IBM Guardium Data Protection 1 Under review