This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As a support person, I would like to have access to all the tenants of all the customers as a potential solution to access all customer tenant.
Other solution that need development.
Drop down list accessible to support to select any tenant to w...
Scenario - User tries to upload some KPI data and proceed till Map data fields. At this stage, user got to know that he has uploaded incorrect file. Once he click on Back button to upload a new file, system prompts you to save the data feed. User ...
Customer data is stored in the dedicated instance of the mongodb
Telstra Security Operations - Risk Assessment Rating Medium Solution hypervisor and storage is not dedicated to Telstra. The application and VM's and a separate instance of mongo db are dedicated to Telstra but the hypervisor and IBM cloud object ...
Customer specific encryption keys for cloud object storage (Resolution Rooms)
Telstra Security Operations - Risk Assessment Rating Medium Data at rest is encrypted using a shared encryption key. Mitigation Recommendation:IBM to provide a solution where encryption keys are unique for each customer.
Logging and Monitoring - extend the storage of Application logs to 12 months
Telstra Security Operations - Risk Assessment Rating High Audit logs are not stored for 12 months or sent to Telstra's splunk solution. Infrastructure audit logs are stored for 12 months but application audit logs only stored for 90 days. Mitigati...
A business is considered as a division or department in a corporate divisional relationship. Each business has a parent company. A company is the parent of one or more businesses, and the businesses report to the company.
Some business data is ass...
Do not place IBM confidential, company confidential, or personal information into any field.