We invite you to shape the future of IBM, including the product roadmap, by submitting enhancement ideas that matter to you the most.
Here's how it works:
Post your ideas
Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and vote for them if they matter to you,
Post an idea
Vote for ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Post an Idea
To post a new idea - click on the "Add a new idea" button and where asked select the appropriate category this idea relates to. Provide requested information to allow us to get a better understanding of your request.
All ideas submitted via this portal are visible to all other portal users, though personal information fields remain hidden. If you would rather have your idea visible to only you and IBM then use the IBM Security Private Ideas Portal instead.
Please note: The purpose of the Ideas Portal is to tap the creativity of the IBM Security community so that we can enhance our products for everyone! If you need to report a defect or get help, please use our normal support channel. Click here to open a support ticket.
Want to see all of your IBM ideas in one place? Find them at ideas.ibm.com
When a report is empty (there wasnt anything to be reported on) we do not want to send an e-mail to reports recipients (or generate it at all). When people gets many e-mails with empty reports, they, after a time, stops opening those e-mails at all.
Currently, it is possible to assign offenses to USERS. However, our customers exspecially in the public safety and defense sector have the requirement to assign offenses to GROUPS. E.g. the SOC shift manager can assign a new offense to the group "...
Compliance Requirements at QRadar customers need to document the compatibilty to MITRE Attack Framework. Suggestion is to extend the Rule Description with a hint which MITRE Attack Technique or APT will be covered by the selected rule.
By default, QRadar uses the Start Time to process logs and generate Offences. I would like to change this to generate Offence based on the Log Source Time (the time in which logs were generated on the local system).
Our customers are looking for a flexible way to extend the disk space by adding more virtual disks and extend them with LVM to the /store mount to have more disk space for events and flows at installation and for future growth. At the moment it is...
Chained Offense should contain all contributing events
There are rules that use other rules or building blocks in order to start escalating activity. The out of the box "Chained Exploit Followed by Suspicious Events" is a good example, where we first find an exploit using BB:CategoryDefintion: Exploit...
QRadar Community Edition (CE) version 7.5.0 or later
Several users have created support forum requests for an update to QRadar Community Edition (CE) to bring the release up to a newer QRadar version. I discussed this issue with Product Management (PM) and the goal of this Idea is for users to vote ...