IBM Security zSecure V2.2 suite and solutions deliver enhanced identity governance for the mainframe, automated compliance testing, and IBM security software integration

IBM United States Software Announcement 215-392
October 1, 2015

Table of contents
OverviewOverviewPublicationsPublications
Key prerequisitesKey prerequisitesTechnical informationTechnical information
Planned availability datePlanned availability dateOrdering informationOrdering information
DescriptionDescriptionTerms and conditionsTerms and conditions
Statement of general directionStatement of general directionPricesPrices
Program numberProgram number 


Top rule
At a glance
Bottom rule

IBM® Security zSecure™ allows you to:

  • Enhance your mainframe security position to better demonstrate compliance with regulations
  • Enhance security intelligence
  • Enhance identity governance for the mainframe to help organizations understand, control, and make business decisions related to user access and access risks
  • Secure cloud and mobile applications
  • Utilize the inherent security advantages offered by mainframes

zSecure helps you to automate your security processes to reduce costs, simplify administration for management efficiency, enforce security best practice policies to reduce risk, analyze audit reporting for compliance monitoring, improve identity governance, and utilize security analytics to enhance vulnerability and threat detection.



Back to topBack to top

Top rule
Overview
Bottom rule

IBM Security zSecure allows you to enhance your mainframe security position to better demonstrate compliance with regulations, enhance security intelligence and identity governance, support big data processing, secure cloud and mobile applications, and utilize the inherent security advantages offered by mainframes. zSecure helps you to automate your security processes to reduce costs, simplify administration for management efficiency, enforce security best practice policies to reduce risk, analyze audit reporting for compliance monitoring, improve identity governance, and utilize security analytics to enhance vulnerability and threat detection.



Back to topBack to top

Top rule
Key prerequisites
Bottom rule

A supported IBM z Systems™ server capable of supporting IBM z/OS® V2.1, or later, or V1.13.



Back to topBack to top

Top rule
Planned availability date
Bottom rule

November 6, 2015



Back to topBack to top

Top rule
Description
Bottom rule

IBM Security zSecure suite V2.2 delivers:

  • Integration with IBM Security Identity Governance:
    • Analyze, define, and control user access, and report on separation of duties conflicts and access risks for RACF® and mainframe-based applications
  • Currency with z/OS V2.2, including:
    • RACF V2.2 integration, which includes support for the new ROAUDITOR attribute.
    • Support for the new TSO PASSWORDPREPROMPT option for LOGON.
    • Support for z/OS UNIX™ V2R2 enhancements, including those that enable giving out more limited access to auditors through use of the new FSEXEC class (controlling file execute permissions) and the SUPERUSER.FILESYS.DIRSRCH resource in the UNIXPRIV class (allows reading all directories without providing exemption from controls in the FSACCESS class).
    • Support for new SMF records, including more extensive support for the following types: SMF 42-27 (VTOC update records), SMF 90-37 (changes to the APF list), and SMF 82 (ICSF). Basic support is provided for the following: SMF 121 (Java™ statistics), SMF 106 (Base Control Program internal interface (BCPii) activity), SMF 87 (GRS Monitoring), and SMF 29 (IMS™ ODBM accounting).
  • Enhanced compliance, auditing, and monitoring:
    • Extended rule-based compliance evaluation framework to include additional automation and coverage for compliance verification
    • Extended support for the Security Technical Implementation Guide (STIG) from the Defense Information Systems Agency (DISA)
    • Enhanced automated compliance framework workflow
    • Additional SMF records sent to QRadar® SIEM, including record types 42-27 (VTOC update records), SMF 90-37 (changes to the APF list), and SMF 82 (ICSF)
  • Support for enhanced RACF password security
  • Usability enhancements, including:
    • Enhanced data that is sent to QRadar SIEM, including record types 42-27 (VTOC update records), SMF 90-37 (changes to the APF list), and SMF 82 (ICSF)
    • Updates to the Access Monitor User Interface
  • Performance improvements

For additional information, refer to IBM Software Announcement 214-274, dated July 15, 2014.



Back to topBack to top

Top rule
Business Partner information
Bottom rule

If you are a Direct Reseller - System Reseller acquiring products from IBM, you may link directly to Business Partner information for this announcement. A PartnerWorld® ID and password are required (use IBM ID).

BP Attachment for Announcement Letter 215-392


Back to topBack to top

Top rule
Statement of general direction
Bottom rule

Support for 64-bit addressing: In the future, zSecure support for 64-bit addressing is planned. This support is intended to provide enhanced scalability and performance, enabling larger volumes of data to be processed centrally for consolidated security intelligence and compliance reporting. For flexibility, customers will have the choice of whether they use 31-bit or 64-bit addressing.

IBM's statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM's sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remain at our sole discretion.



Back to topBack to top

Top rule
Program number
Bottom rule
Program name VRM Program number
IBM Security zSecure Admin 2.2.0 5655-N16
IBM Security zSecure Audit 2.2.0 5655-N17
IBM Security zSecure CICS® Toolkit 2.2.0 5655-N18
IBM Security zSecure Command Verifier 2.2.0 5655-N19
IBM Security zSecure Visual 2.2.0 5655-N20
IBM Security zSecure Alert 2.2.0 5655-N21
IBM Security zSecure Adapters for QRadar SIEM 2.2.0 5655-AD8
IBM Security zSecure Administration 2.2.0 5655-N23
IBM Security zSecure Compliance and Auditing 2.2.0 5655-N24
IBM Security zSecure Compliance and Administration 2.2.0 5655-N25

Product identification number

IBM Security zSecure suite

Program PID number Subscription and Support PID number
5655-N16 5655-T03
5655-N17 5655-T04
5655-N18 5655-T06
5655-N19 5655-T08
5655-N20 5655-T10
5655-N21 5655-T12
5655-AD8 5655-AD9

IBM Security zSecure Compliance, Auditing, and Administration solutions

Program PID number Subscription and Support PID number
5655-N23 5655-SE4
5655-N24 5655-SE5
5655-N25 5655-SE6


Back to topBack to top

Top rule
Publications
Bottom rule

All unlicensed and licensed publications, with the exception of the Program Directories, are included on the IBM Security zSecure Documentation CD. This CD is available as a zipped CD disk image (.iso) file to licensed clients only. The product materials include instructions for downloading the documentation.

Unlicensed publications are also available at IBM Knowledge Center for IBM Security zSecure Suite on

http://www.ibm.com/support/knowledgecenter/SS2RWS/welcome
IBM Knowledge Center is the home for all unlicensed IBM product documentation. You can customize IBM Knowledge Center and create your own collection of documents to design the experience that you want with the technology, products, and versions that you use. You can also interact with IBM and with your colleagues by adding comments to topics and by sharing them through email, LinkedIn, or Twitter.

On the zSecure general availability date, the publications will be available in English. Following translation, a new version of the zSecure Documentation CD will be available and the national language publications will be added to the IBM Knowledge Center for IBM Security zSecure Suite.

Notes:

IBM Security zSecure Suite

Form number IBM Security zSecure Suite UNLICENSED publications
SC27-5638-02 zSecure CARLa-Driven Components Installation and Deployment Guide
GI13-2324-02 zSecure Admin and Audit for RACF Getting Started
GI13-2325-02 zSecure Audit for ACF2 Getting Started
SC27-6581-00 zSecure Admin and Audit for RACF line commands and primary commands summary
SC27-5642-02 zSecure Alert User Reference Manual
SC27-5648-02 zSecure Command Verifier User Guide
SC27-5649-02 zSecure CICS® Toolkit User Guide
SC27-5647-02 zSecure Visual Client Manual
SC27-5643-02 zSecure Messages Guide

Form number IBM Security zSecure Suite LICENSED publications
LC27-6582-00 zSecure Downloading documentation
LCD7-5373-04 zSecure Documentation CD
LC27-5639-02 zSecure Admin and Audit for RACF User Reference Manual
LC27-5640-02 zSecure Audit for ACF2 User Reference Manual
LC27-5641-02 zSecure Audit for Top Secret User Reference Manual
LC27-5633-01 zSecure CARLa Command Reference

IBM Security zSecure Compliance and Administration (5655-N23)

Form number IBM Security zSecure Compliance and Administration (5655-N23) UNLICENSED publications
SC27-5638-02 zSecure CARLa-Driven Components Installation and Deployment Guide
GI13-2324-02 zSecure Admin and Audit for RACF Getting Started
SC27-6581-00 zSecure Admin and Audit for RACF line commands and primary commands summary
SC27-5647-02 zSecure Visual Client Manual
SC27-5643-02 zSecure Messages Guide

Form number IBM Security zSecure Compliance and Administration (5655-N23) LICENSED publications
LC27-6582-00 zSecure Downloading documentation
LCD7-5373-04 zSecure Documentation CD
LC27-5639-02 zSecure Admin and Audit for RACF User Reference Manual
LC27-5633-01 zSecure CARLa Command Reference

IBM Security zSecure Suite Compliance and Auditing (5655-N24)

Form number IBM Security zSecure Compliance and Auditing (5655-N24) UNLICENSED publications
SC27-5638-02 zSecure CARLa-Driven Components Installation and Deployment Guide
GI13-2324-02 zSecure Admin and Audit for RACF Getting Started
GI13-2325-02 zSecure Audit for ACF2 Getting Started
SC27-6581-00 zSecure Admin and Audit for RACF line commands and primary commands summary
SC27-5642-02 zSecure Alert User Reference Manual
SC27-5648-02 zSecure Command Verifier User Guide
SC27-5643-02 zSecure Messages Guide

Form number IBM Security zSecure Compliance and Auditing (5655-N24) LICENSED publications
LC27-6582-00 zSecure Downloading documentation
LCD7-5373-04 zSecure Documentation CD
LC27-5639-02 zSecure Admin and Audit for RACF User Reference Manual
LC27-5640-02 zSecure Audit for ACF2 User Reference Manual
LC27-5641-02 zSecure Audit for Top Secret User Reference Manual
LC27-5633-01 zSecure CARLa Command Reference

IBM Security zSecure Suite Compliance and Administration (5655-N25)

Form number IBM Security zSecure Compliance and Administration (5655-N25) UNLICENSED publications
SC27-5638-02 zSecure CARLa-Driven Components Installation and Deployment Guide
GI13-2324-02 zSecure Admin and Audit for RACF Getting Started
GI13-2325-02 zSecure Audit for ACF2 Getting Started
SC27-6581-00 zSecure Admin and Audit for RACF line commands and primary commands summary
SC27-5642-02 zSecure Alert User Reference Manual
SC27-5648-02 zSecure Command Verifier User Guide
SC27-5647-02 zSecure Visual Client Manual
SC27-5643-02 zSecure Messages Guide

Form number IBM Security zSecure Compliance and Administration (5655-N25) LICENSED publications
LC27-6582-00 zSecure Downloading documentation
LCD7-5373-04 zSecure Documentation CD
LC27-5639-02 zSecure Admin and Audit for RACF User Reference Manual
LC27-5640-02 zSecure Audit for ACF2 User Reference Manual
LC27-5641-02 zSecure Audit for Top Secret User Reference Manual
LC27-5633-01 zSecure CARLa Command Reference


Back to topBack to top

Top rule
Services
Bottom rule

Software Services

IBM Software Services has the breadth, depth, and reach to manage your services needs. You can leverage the deep technical skills of our lab-based Software Services team and the business consulting, project management, and infrastructure expertise of our IBM Global Services team. Also, we extend our IBM Software Services reach through IBM Business Partners to provide an extensive portfolio of capabilities. Together, we provide the global reach, intellectual capital, industry insight, and technology leadership to support a wide range of critical business needs.

To learn more about IBM Software Services or to contact a Software Services sales specialist, go to

http://www.ibm.com/software/sw-services/



Back to topBack to top

Top rule
Technical information
Bottom rule

Specified operating environment

Hardware requirements

A supported IBM z Systems server capable of supporting IBM z/OS V2.1, or later, or V1.13.

Software requirements

IBM Security zSecure suite V2.2 and IBM Security zSecure Compliance and Administration V2.2, IBM Security zSecure Compliance and Auditing V2.2, and IBM Security zSecure Administration V2.2 solutions are supported in the following environments:

  • IBM z/OS V1.13
  • IBM z/OS V2.1
  • IBM z/OS V2.2

zSecure products that include features for CA ACF2 and CA Top Secret support CA ACF2 R14 and R15, and CA Top Secret R14 and R15.

The program's specifications and specified operating environment information may be found in documentation accompanying the program, if available, such as a readme file, or other information published by IBM, such as an announcement letter. Documentation and other program content may be supplied only in the English language.

Planning information

Packaging

IBM Security zSecure products and solutions are distributed with:

  • International Program License Agreement (Z125-3301)
  • License Information document
  • Tape


Back to topBack to top

Top rule
Ordering information
Bottom rule

IBM Security zSecure V2.2 ordering information for license and Software Subscription and Support remains unchanged from the previous IBM Software Announcement 214-274, dated July 15, 2014.

The programs in this announcement all have Value Unit-Based pricing.

For each z Systems™ IPLA program with Value Unit pricing, the quantity of that program needed to satisfy applicable IBM terms and conditions is referred to as the required license capacity. Your required license capacity is based upon the following factors:

  • The z Systems IPLA program you select
  • The applicable Value Unit Exhibit
  • The applicable terms
  • Whether your current mainframes are full capacity or sub-capacity


Value Unit exhibit VUE020

 
                         Value
Level    Minimum Maximum Units/MSU

 
Base       1       3     1
Tier A     4      45     0.15
Tier B    46     175     0.08
Tier C   176     315     0.04
Tier D   316       +     0.03


Ordering z/OS through the Internet

Shopz provides an easy way to plan and order your z/OS ServerPac or CBPDO. It will analyze your current installation, determine the correct product migration, and present your new configuration based on z/OS. Additional products can also be added to your order (including determination of whether all product requisites are satisfied). Shopz is available in the US and several countries in Europe. In countries where Shopz is not available yet, contact your IBM representative (or IBM Business Partner) to handle your order via the traditional IBM ordering process. For more details and availability, visit the Shopz website

http://www.ibm.com/software/ShopzSeries

Charge metric

The programs in this announcement all have Value Unit-Based pricing.

Basic license


On/Off CoD

IBM Security zSecure is eligible for On/Off CoD with a temporary use charge calculated based on MSUs per-day usage.


Subscription and Support

To receive voice technical support via telephone and future releases and versions at no additional charge, Subscription and Support must be ordered. The capacity of Subscription and Support (Value Units) must be the same as the capacity ordered for the product licenses.

To order, specify the Subscription and Support program number (PID) referenced above and the appropriate license or charge option.

IBM is also providing Subscription and Support for these products via a separately purchased offering under the terms of the IBM International Agreement for Acquisition of Software Maintenance. This offering:

  • Includes and extends the support services provided in the base support to include technical support via telephone.
  • Entitles you to future releases and versions, at no additional charge. Note that you are not entitled to new products.

When Subscription and Support is ordered, the charges will automatically renew annually unless cancelled by you.

The combined effect of the IPLA license and the Agreement for Acquisition of Software Maintenance gives you rights and support services comparable to those under the traditional ICA S/390® and z Systems™ license or its equivalent. To ensure that you continue to enjoy the level of support you are used to in the ICA business model, you must order both the license for the program and the support for the selected programs at the same Value Unit quantities.

Customized Offerings

Product deliverables are shipped only via CBPDO and ServerPac. These customized offerings are offered for Internet delivery in countries where Shopz product ordering is available. Internet delivery reduces software delivery time and allows you to install software without the need to handle tapes. For more details on Internet delivery, refer to the Shopz help information on

http://www.software.ibm.com/ShopzSeries

You choose the delivery method when you order the software. IBM recommends Internet delivery. In addition to Internet and DVD, the supported tape delivery options include:

  • 3590
  • 3592

Most products can be ordered in ServerPac the month following their availability in CBPDO. z/OS can be ordered via CBPDO and ServerPac at general availability. Many products will also be orderable in a Product ServerPac without also having to order the z/OS operating system or subsystem.

Shopz and CFSW will determine the eligibility based on product requisite checking. For more details on the product ServerPac, visit the Help section on the Shopz website on

http://www.software.ibm.com/ShopzSeries

For additional information on the Product ServerPac option, refer to Software Announcement 212-272, dated July 7, 2012.

Production of software product orders will begin on the planned general availability date.

  • CBPDO shipments will begin one week after general availability.
  • ServerPac shipments will begin two weeks after general availability.



Back to topBack to top

Top rule
Terms and conditions
Bottom rule

The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the IBM International Program License Agreement, IBM International Passport Advantage® Agreement, and IBM Agreement for Acquisition of Software Maintenance.

Licensing

IBM International Program License Agreement including the License Information document and Proof of Entitlement (PoE) govern your use of the program. PoEs are required for all authorized use.

Agreement for Acquisition of Software Maintenance

The following agreement applies for Software Subscription and Support (Software Maintenance) and does not require customer signatures:

  • IBM Agreement for Acquisition of Software Maintenance (Z125-6011)

These programs are licensed under the IBM Program License Agreement (IPLA) and the associated Agreement for Acquisition of Software Maintenance, which provide for support with ongoing access to releases and versions of the program. These programs have a one-time license charge for use of the program and an annual renewable charge for the enhanced support that includes telephone assistance (voice support for defects during normal business hours), as well as access to updates, releases, and versions of the program as long as support is in effect. IBM z Systems Operational Support Services - SoftwareXcel is an option if you desire added services.

License Information number

Program name LI number Form number
IBM Security zSecure Admin V2.2 (5655-N16) L-RSTR-9UADJY GI13-2276-02
IBM Security zSecure Audit V2.2 (5655-N17) L-RSTR-9UADGU GI13-2279-02
IBM Security zSecure CICS Toolkit V2.2 (5655-N18) L-RSTR-9UADFQ GI13-2281-02
IBM Security zSecure Command Verifier V2.2 (5655-N19) L-RSTR-9UADEM GI13-2283-02
IBM Security zSecure Visual V2.2 (5655-N20) L-RSTR-9UADDA GI13-2285-02
IBM Security zSecure Alert V2.2 (5655-N21) L-RSTR-9UADHX GI13-2287-02
IBM Security zSecure Adapters for QRadar SIEM V2.2 (5655-AD8) L-RSTR-9UAD8P GI12-3321-01
IBM Security zSecure Administration V2.2 (5655-N23) L-RSTR-9UAD7F GI13-2291-02
IBM Security zSecure Compliance and Auditing V2.2 (5655-N24) L-RSTR-9UACZL GI13-2293-02
IBM Security zSecure Compliance and Administration V2.2 (5655-N25) L-RSTR-9UAD5H GI13-2295-02

License Information is available for review on the IBM Software License Agreement website

http://www.ibm.com/software/sla/sladb.nsf

Limited warranty applies

Yes

Limited warranty

IBM warrants that when the program is used in the specified operating environment, it will conform to its specifications. The warranty applies only to the unmodified portion of the program. IBM does not warrant uninterrupted or error-free operation of the program or that IBM will correct all program defects. You are responsible for the results obtained from the use of the program.

IBM provides you with access to IBM databases containing information on known program defects, defect corrections, restrictions, and bypasses at no additional charge. For further information, consult the IBM Software Support Handbook found on

http://www.ibm.com/support/handbook
IBM will maintain this information for at least one year after the original licensee acquires the program (warranty period).

Money-back guarantee

If for any reason you are dissatisfied with the program and you are the original licensee, you may obtain a refund of the amount you paid for it, if within 30 days of your invoice date you return the program and its PoE to the party from whom you obtained it. If you downloaded the program, you may contact the party from whom you acquired it for instructions on how to obtain the refund.

For clarification, note that for programs acquired under any of IBM's On/Off Capacity on Demand (On/Off CoD) software offerings, this term does not apply since these offerings apply to programs already acquired and in use by you.

Volume orders (IVO)

No

Passport Advantage applies

No

Software Subscription and Support applies

Yes. During the S&S period, for the unmodified portion of a Program, and to the extent problems can be recreated in the specified operating environment, IBM will provide the following:

  • Defect correction information, a restriction, or a bypass.
  • Program updates: Periodic releases of collections of code corrections, fixes, functional enhancements and new versions and releases to the Program and documentation.
  • Technical assistance: A reasonable amount of remote assistance via telephone or electronically to address suspected Program defects. Technical assistance is available from the IBM support center in the Customer's geography.

Additional details regarding Technical Assistance, including IBM contact information, are provided in the IBM Software Support Handbook on

http://www.ibm.com/support/handbook

S&S does not include assistance for:

  • The design and development of applications
  • Customer's use of Programs in other than their specified operating environment, or
  • Failures caused by products for which IBM is not responsible under the IBM Agreement for Acquisition of Software Maintenance.

S&S is provided only if the Program is within its support timeframe as specified in the Software Support Lifecycle policy for the Program.

For operating system software, the revised IBM Operational Support Services - SoftwareXcel offering will provide support for those operating systems and associated products that are not available with the Software Subscription and Support (Software Maintenance) offering.

This will ensure total support coverage for your enterprise needs, including IBM and selected non-IBM products. For complete lists of products supported under both the current and revised offering, visit

http://www.ibm.com/services/sl/products

System i Software Maintenance applies

No

Variable charges apply

No

Educational allowance available

Yes. A 15% education allowance applies to qualified education institution customers.

Sub-capacity terms and conditions

For each z Systems IPLA program with Value Unit pricing, the quantity of that program needed to satisfy applicable IBM terms and conditions is referred to as the required license capacity. Your required license capacity is based upon the following factors:

  • The z Systems IPLA program you select
  • The applicable Value Unit Exhibit
  • The applicable terms
  • Whether your current mainframes are full capacity or sub-capacity

For more information on the Value Unit Exhibit for the z Systems IPLA program you selected, refer to the Ordering information section.

Full-capacity mainframes

In cases where full capacity is applicable, the following terms apply.

Execution based, z/OS based, full machine based: The required capacity of a z Systems IPLA program with these terms equals the MSU-rated capacity of the machines where the z Systems IPLA program executes.

For more information on mainframe MSU-rated capacities, go to

http://www.ibm.com/systems/z/resources/swprice/reference/exhibits/

Reference based: The required license capacity of a z Systems IPLA program with these terms equals the license capacity of the applicable monthly license charge (MLC) program. This MLC program is called the parent program.

Sub-capacity mainframes

In cases where sub-capacity is applicable, the following terms apply.

Execution based: The required capacity of a z Systems IPLA sub-capacity program with these terms equals the capacity of the LPARs where the z Systems IPLA program executes.

z/OS based: The required license capacity of a z Systems IPLA program with these terms equals the license capacity of z/OS on the machines where the z Systems IPLA program executes.

Reference based: The required license capacity of a z Systems IPLA program with these terms equals the license capacity of the applicable monthly license charge (MLC) program. This MLC program is called the parent program.

Full machine based: The required license capacity of a z Systems IPLA program with full machine based terms equals the MSU-rated capacity of the machines where the z Systems IPLA program executes.

For more information on mainframe MSU-rated capacities, refer to the IBM z Systems Machines Exhibit (Z125-3901) or visit the Mainframes section of the z Systems Exhibits website

http://www.ibm.com/systems/z/resources/swprice/reference/exhibits/

For additional information for products with reference-based terms, z Systems IPLA sub-capacity programs with reference-based terms adds value to the parent program across the environment, regardless of where in the environment the z Systems IPLA program executes.

An environment is defined as either a single or stand-alone machine or a qualified Parallel Sysplex®. You may have one or more different environments across the enterprise. To determine the required license capacity for each z Systems IPLA program with referenced-based terms, each environment should be assessed separately.

When a z Systems IPLA sub-capacity program with reference-based terms is used in a qualified Parallel Sysplex environment, the required license capacity of the z Systems IPLA program must equal with the license capacity of the parent program across the Parallel Sysplex. Qualified Parallel Sysplex refers to one:

  • Where MLC pricing is aggregated across the sysplex.

Sub-capacity eligibility

To be eligible for sub-capacity charging on select z Systems IPLA programs, you must first implement and comply with all terms of either sub-capacity Workload License Charges (WLC) or sub-capacity Entry Workload License Charges (EWLC). To implement sub-capacity WLC or EWLC, a machine must be z Systems (or equivalent). On that machine:

  • All instances of the OS/390® operating system must be migrated to the z/OS operating systems.
  • Any licenses for the OS/390 operating system must be discontinued.
  • All instances of the z/OS operating systems must be running in z/Architecture® (64-bit) mode.

For that machine, you must create and submit a Sub-Capacity Report to IBM each month. Sub-Capacity Reports must be generated using the Sub-Capacity Reporting Tool (SCRT). For additional information or to obtain a copy of SCRT, go to the z Systems Software Pricing website

http://www.ibm.com/systems/z/resources/swprice/

You must comply with all of the terms of the WLC or EWLC offering, whichever is applicable:

  • The complete terms and conditions of sub-capacity WLC are defined in the IBM Customer Agreement - Attachment for z Systems Workload License Charges (Z125-6516).
  • The complete terms and conditions for sub-capacity EWLC are defined in the IBM Customer Agreement - Attachment for EWLC, TWLC, zELC, and z/OS.e License Charges (Z125-6587).

Additionally, you must sign and comply with the terms and conditions specified in the amendment to the IPLA contract - Amendment for Amendment for IBM z Systems Programs Sub-Capacity Pricing (Z125-6929). Once the amendment is signed, the terms in the amendment replace any and all previous z Systems IPLA sub-capacity terms and conditions.

Sub-capacity terms and conditions

IBM Getting Started Sub-capacity Pricing for z/OS IPLA Software applies.

Sub-capacity utilization determination

Sub-capacity utilization is determined based on the product's own execution as reported to IBM in accordance with the requirements for reporting sub-capacity utilization for products.

On/Off CoD

To be eligible for On/Off CoD pricing, you must be enabled for temporary capacity on the corresponding hardware, and the required contract, Attachment for IBM z Systems On/Off Capacity on Demand (Z125-7883), must be signed prior to use.



Back to topBack to top

Top rule
Statement of good security practices
Bottom rule

IT system security involves protecting systems and information through prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party.



Back to topBack to top

Top rule
Prices
Bottom rule

The prices are unchanged by this announcement.

Trademarks

zSecure, IBM z Systems, IMS and z Systems are trademarks of IBM Corporation in the United States, other countries, or both.

IBM, z/OS, Passport Advantage, System i, CICS, RACF, QRadar, PartnerWorld, z/VM, S/390, Parallel Sysplex, OS/390 and z/Architecture are registered trademarks of IBM Corporation in the United States, other countries, or both.

UNIX is a registered trademark of The Open Group in the United States and other countries.

Oracle and Java are trademarks of Oracle and/or its affiliates in the United States, other countries, or both.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Additional terms of use are located on

Terms of use

For the most current information regarding IBM products, consult your IBM representative or reseller, or visit the IBM worldwide contacts page

http://www.ibm.com/planetwide/us/