Skip to Main Content
IBM Cloud - Structured Ideas


This portal is to open public enhancement requests against IBM Cloud and its products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

IBM Cloud Support Center (https://cloud.ibm.com/unifiedsupport/cases/form) – Use this site for any IBM Cloud defect or support need.

Stack Overflow (https://stackoverflow.com/questions/tagged/ibm-cloud) – Use this site for IBM Cloud technical Q&A using the tag "ibm-cloud".

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

My ideas: Security

Showing 19

Bisam consulting

At Bisam Consulting, we offer a comprehensive range of IT services to meet the needs of our clients. Our services include: IT consulting: We provide expert IT consulting services to help businesses streamline their operations and improve their bot...
over 1 year ago in Identity and Access Management 0 Not under consideration

Low-Level Security Separation via hashcoding of all executables/scripts via cached/validated Hashcodes

Why do we still have malware, spyware, ransomware, or backdoors? Is it because our firewalls or Anti-virus solutions are only reactive and not proactive? Or is it because we don’t have walled/secured gardens or has security a too high price we wou...
over 1 year ago in Security 1 Not under consideration

IBM Cloud 2FA Prompt Less Frequently

The current implementation of 2FA prompting is inconsistent and regularly prompts too frequently (sometimes as little as < ten minutes). Requesting a prompt after an hour seems more appropriate.
about 2 years ago in Identity and Access Management 4 Not under consideration

About changing the EMAIL address of the SoftlayerID user

There are still many users using SoftlayerID on the IBM Cloud portal. However, recently, IBM Cloud made it impossible to change their email address on their SoftlayerID user profile. Please revert this specification, and restore the ability for So...
almost 3 years ago in Identity and Access Management 0 Not under consideration

Security Insights Key scanning

AWS uses their “AWS Trusted Advisor” to scan for AWS credentials and security keys within software repositories. We need to have the same capability for Security Insights (SCC) to scan repositories for IBM Cloud API keys
almost 3 years ago in Security 0 Not under consideration

Security questions' answers are shown as plain text

When we login into IBM Cloud, there is Security questions (If Configured) for 2FA. In the security questions, if we type the answer it is not hidden as secret instead it reflect as plain text.
over 3 years ago in Identity and Access Management 0 Not under consideration

AI in security systems

We can use AI as following Let the system has all the data what is going on on borders.. Air space etc etc.. And every conditions that what had happened before in every war or small cross border fire... Strategies and their results... And let the ...
over 4 years ago in Security 0 Not under consideration

AI in security systems

No description provided
over 4 years ago in Security 1 Not under consideration

A password policy in place for IBMCloud /SL VPN

IBMCloud /SL VPN - A password policy in place for minimum password length (15), maximum password length, using password complexity requirements, enforcing password history and maximum password age
over 4 years ago in Security 0 Not under consideration

Flexi Cryptography

I have made a encryption and decryption algorithm which is really very hard to crack .Features :* Same number can represent multiple or different alphabet in the encrypted message .* Different number can represent same or multiple alphabet in the ...
almost 5 years ago in Security 0 Not under consideration