We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Currently we need to manually select and delete expired risk list entries. We would like to see an option to enable this for a lisk and have the daily maintenance job wipe the expired entries from the list.
Move User Management Privileges from Global Privileges to a Role permission. Currently, user management is permissioned via a global privilege on a user's account. When the "user accounts" privilege is set to "change," the user can view and edit a...
Restrict Access to columns/attributes based on role
Allow admins to determine which attributes a user has access to view in queries and within a case. This could be handled at the role level. Not all users need access to the same type of data; limiting which users can see each attribute helps infor...
Allow for random sampling of alerts from the case selection page. We conduct monthly QA processes that require us to pull a random selection of cases worked by each investigator. Currently we need to download all alerts worked by an investigator a...
Allow references to specific byte ranges within an attribute for comparison. For example, consider building a counter with the intent of identifying a BIN attack/Credit Master attack/enumeration attack. Generally speaking, these attacks will origi...
Separate the Intercepted by existing rules row within rule generation.
We identified in May that the “Intercepted by existing rules” row within the rule generator does not appear to be functioning correctly. Rather than providing stats surrounding transactions which were intercepted by the model revision, it actually...
Keeping the case numbering for each SP instance after restart or restore
as-is: If all cases that generated on low active SP instance was archived, and then the SP instance restarts, the case id for cases generated on this SP instance starts from 1.
Archived cases might be used for investigation and that would be help...
Export Job should allow for customization for sorting of data by attribute
When exporting the file customization on order in which the data is sorted would be useful for many purposes. Once example is sorting by oldest to newest so that loading the file into another environment allows transactions to be loaded in chronol...
Allow more customization around which users can view the values of each encrypted attribute. This is currently handled at the user account level and a user may either view all encrypted/masked values or none of them. We need additional flexibility...
Connexion/authentification to SP with SSO SAMLV2 or OIDC
In our company, user rights are managed using an IAM which allows central management of access authorizations.
The current implementation of SP doesn't allow us to use our authentication server and our IAM as it doesn't provide SSO capabi...
Do not place IBM confidential, company confidential, or personal information into any field.