Skip to Main Content
IBM Security Ideas Portal

Shape the future of IBM Security

We invite you to shape the future of IBM, including the product roadmap, by submitting enhancement ideas that matter to you the most.

Here's how it works:

Post your ideas

Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and vote for them if they matter to you,

  1. Post an idea

  2. Vote for ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea


Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.


Receive notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.


Post an Idea

To post a new idea - click on the "Add a new idea" button and where asked select the appropriate category this idea relates to. Provide requested information to allow us to get a better understanding of your request.


"Missing" Security Products?

If you cannot find the IBM Security product you are looking for then it is probably located in the IBM Security Private Ideas Portal. Check that site to open an idea.


Idea visibility

All ideas submitted via this portal are visible to all other portal users, though personal information fields remain hidden. If you would rather have your idea visible to only you and IBM then use the IBM Security Private Ideas Portal instead.


Please note: The purpose of the Ideas Portal is to tap the creativity of the IBM Security community so that we can enhance our products for everyone! If you need to report a defect or get help, please use our normal support channel. Click here to open a support ticket.


Want to see all of your IBM ideas in one place? Find them at ideas.ibm.com

ADD A NEW IDEA

FILTER BY CATEGORY

QRadar Security Info and Event Management

Showing 635 of 3226
118 VOTE

Modifying a search without having to re-enter all values

Add the ability to modify a search or quick search without having to re-enter all values or parameters again.
about 4 years ago in QRadar Security Info and Event Management 2 Planned for future release

Support CIDR in Reference set

Allow reference set to support CIDR
almost 3 years ago in QRadar Security Info and Event Management 3 Planned for future release

Do not generate email for an empty report

When a report is empty (there wasnt anything to be reported on) we do not want to send an e-mail to reports recipients (or generate it at all). When people gets many e-mails with empty reports, they, after a time, stops opening those e-mails at all.
about 3 years ago in QRadar Security Info and Event Management 3 Future consideration

Assign offenses to a role (not to a user)

Currently, it is possible to assign offenses to USERS. However, our customers exspecially in the public safety and defense sector have the requirement to assign offenses to GROUPS. E.g. the SOC shift manager can assign a new offense to the group "...
over 2 years ago in QRadar Security Info and Event Management 2 Not under consideration

MITRE Attack Referenz for QRadar Rules

Compliance Requirements at QRadar customers need to document the compatibilty to MITRE Attack Framework. Suggestion is to extend the Rule Description with a hint which MITRE Attack Technique or APT will be covered by the selected rule.
over 3 years ago in QRadar Security Info and Event Management 2 Planned for future release

Username Case Sensitivity

QRadar is unable to recognize a single username appearing in a different case format from other log sources as the same during event correlation.
over 3 years ago in QRadar Security Info and Event Management 5 Not under consideration

Generate Offences on Log Source Time

By default, QRadar uses the Start Time to process logs and generate Offences. I would like to change this to generate Offence based on the Log Source Time (the time in which logs were generated on the local system).
almost 4 years ago in QRadar Security Info and Event Management 0 Not under consideration

Support for LVM

Our customers are looking for a flexible way to extend the disk space by adding more virtual disks and extend them with LVM to the /store mount to have more disk space for events and flows at installation and for future growth. At the moment it is...
6 months ago in QRadar Security Info and Event Management 13 Future consideration

Chained Offense should contain all contributing events

There are rules that use other rules or building blocks in order to start escalating activity. The out of the box "Chained Exploit Followed by Suspicious Events" is a good example, where we first find an exploit using BB:CategoryDefintion: Exploit...
over 3 years ago in QRadar Security Info and Event Management 0 Not under consideration

QRadar Community Edition (CE) version 7.5.0 or later

Several users have created support forum requests for an update to QRadar Community Edition (CE) to bring the release up to a newer QRadar version. I discussed this issue with Product Management (PM) and the goal of this Idea is for users to vote ...
3 months ago in QRadar Security Info and Event Management 14 Future consideration