Skip to Main Content
IBM Security Ideas Portal

Shape the future of IBM Security

We invite you to shape the future of IBM, including the product roadmap, by submitting enhancement ideas that matter to you the most.

Here's how it works:

Post your ideas

Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and vote for them if they matter to you,

  1. Post an idea

  2. Vote for ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea


Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.


Receive notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.


Post an Idea

To post a new idea - click on the "Add a new idea" button and where asked select the appropriate category this idea relates to. Provide requested information to allow us to get a better understanding of your request.


"Missing" Security Products?

If you cannot find the IBM Security product you are looking for then it is probably located in the IBM Security Private Ideas Portal. Check that site to open an idea.


Idea visibility

All ideas submitted via this portal are visible to all other portal users, though personal information fields remain hidden. If you would rather have your idea visible to only you and IBM then use the IBM Security Private Ideas Portal instead.


Please note: The purpose of the Ideas Portal is to tap the creativity of the IBM Security community so that we can enhance our products for everyone! If you need to report a defect or get help, please use our normal support channel. Click here to open a support ticket.


Want to see all of your IBM ideas in one place? Find them at ideas.ibm.com

ADD A NEW IDEA

FILTER BY CATEGORY

All ideas

Showing 3465 of 3465

"clas" process needs to be activated the same way as "snif" process

"clas" process needs to be activated the same way as "snif" process when you need to start sniffer by issuing "start inspection-core" command
about 8 years ago in Guardium Data Protection 0 Not under consideration

Make hidden attribute fields available to non-admin users

These fields (mostly internal id's) are actually hidden. The main reason is that have no meaning to the end user. At some point we had some specific requests/needs (don't really remember the details) and we decided to make visible all hidden attri...
about 8 years ago in Guardium Data Protection 0 Not under consideration

Encryption of Guardium internal repository

More and More customers are looking to ensure that internal Guardium repository in encrypted. While we communicate, that guardium appliance is a black box, you have policy flexibility not to log sensitive data (or mask it), we run out explanations...
about 8 years ago in Guardium Data Protection 0 Not under consideration

SPAN port mirroring configuration is not possible with load balancing

"...it turned out that correct SPAN port mirroring configuration isn't possible due to the implemented load balancing. s-tap installation needs to be re-assembled."
about 8 years ago in Guardium Data Protection 0 Not under consideration

VA - Oracle Datasource Password change capability

Large organizations on our user group meetings with IBM have expressed pain points with having to staff people to just handle password changes for Guardium VA accounts. Oracle systems in particular tend not to have a centralized account authentica...
over 8 years ago in Guardium Data Protection 0 Not under consideration

VA alternate method for VA scanning of RACF than zSecure

We use a different product than zSecure to manage and report RACF security. The cost to implement zSecure (just software and licensing) is just under a million dollars. This does not include all other project costs to get a new product approved an...
over 8 years ago in Guardium Data Protection 0 Not under consideration

Guardium Classifier to use with NOLOCK for MySQL and MSSQL and MySQL with ur

Guardium Classifier to use with NOLOCK for MySQL and MSSQL, and MySQL with ur. The 'with ur' for MySQL could be accomplished with changing the client side (on appliance) my.cnf to include the uncommitted read call.
over 8 years ago in Guardium Data Protection 0 Functionality already exists

Authentication for Data Source Account (SQLGUARD)

Enable the ability to have Data Source passwords managed by an external authentication solution such as MS Active Directory.
over 8 years ago in Guardium Data Protection 0 Not under consideration

Extrusion rules improvement, add object condition

Current capabilities of extrusion rules in Guardium allows to check data only bases on its content. And if we have a task to redact all credit card data, we set regular expression, but in production environment it gives a lot of false positives - ...
over 8 years ago in Guardium Data Protection 0 Not under consideration

VA "Ext. Reference" messages provide more concrete link to the document referenced.

Please refer to the attached screenshot (for example). Those "Ext. Reference" messages are put there by developers when they developed these tests. These are usually public references. Typically if you google for it, you should find these referenc...
over 8 years ago in Guardium Data Protection 0 Not under consideration