Feedback

CA-Top Secret for VSE/ESA, Version 1 Release 3, Protects Your Information Assets

Software Announcement
September 29, 1998
Announcement Letter Number: 298-350


Table of Contents:



At a Glance

CA-Top Secret for VSE/ESA, V1R3:

  • Provides a full function security solution together with VSE/ESA Version 2 Release 4 and the new CICS Transaction Server for VSE/ESA

  • Complements the Basic Security Manager of VSE/ESA Version 2 Release 4 which supports only basic security needs

  • Helps ensure the integrity and security of your critical information assets

  • Provides enterprise security, management, and control of mainframe and distributed environments

  • Provides an integrated security solution

  • Supports synchronized security around distributed environments

  • Provides the flexibility to organize security around existing security policies
-----------------------------------------
For ordering, contact:
  Your IBM representative, an IBM
  Business Partner, or IBM North America
  Sales Centers at
    800-IBM-CALL  Reference: LE010

EXTRA! EXTRA! . . .

Subscribe to IBM iSource, your electronic source for customized IBM information! Go to our web site at http://www.ibm.com/isource or send an e-mail to info@isource.ibm.com with the word SUBSCRIBE in the body.



Overview

CA-Top Secret** for VSE/ESA is a software product licensed from Computer Associates International, Inc. CA-Top Secret for VSE/ESA, Version 1 Release 3 (V1R3), provides enterprise security, management, and control of your mainframe and networked environments with integrated security solutions that protect your information assets. CA-Top Secret for VSE/ESA strengthens security, streamlines administration, and provides both platform and network-level security and auditing capabilities.

CA-Top Secret for VSE/ESA, V1R3:

  • Automatically distributes security policies throughout your enterprise to simplify management and help ensure consistency of controls

  • Helps ensure enterprise-wide individual accountability

  • Integrates mainframe security into the distributed environment

  • Fully supports synchronized security around a distributed environment by means of the Command Propagation Facility (CPF)

  • Encrypts all communication for complete privacy of security data

  • Maintains security across distributed VSE environments

  • Provides extensive controls for CICS (R) MRO/ISC links, and POWER protect incoming and outgoing tasks on both sending and receiving nodes

  • Provides the flexibility to organize security according to your existing security policy

  • Enables you to replicate whatever centralized, decentralized, or mixed security approach you may now be using
CA-Top Secret for VSE/ESA, Version 1 Release 3, requires CA90s** Services for VSE, from Computer Associates International, Inc. as a prerequisite.



Intended Customers

  • Customers with comprehensive security requirements in their mainframe and distributed environments.



Key Prerequisites

  • VSE/ESA Version 2 Release 4 and CICS/TS

  • CA90s Services for VSE, Version 1 Release 4, from Computer Associates International, Inc.



Planned Availability Dates

  • December 11, 1998 (Limited Availability)

  • June 25, 1999 (General Availability)

------------------------------

This announcement is provided for your information only. For additional information, contact your IBM representative, call 800-IBM-4YOU, or visit the IBM home page at: http://www.ibm.com



DESCRIPTION

CA-Top Secret for VSE/ESA, V1R3, helps ensure the integrity and security of your critical information assets. It provides flexibility and control through a unique hierarchical security configuration similar to the organizational structure of your corporate environment. Administrative tools, reporting options and automatic logging capabilities accompany CA-Top Secret for VSE/ESA, securing your environment while enabling comprehensive auditing and controlled sharing of data and resources.



Benefits and Features

Helps Ensure Security and Integrity of Systems and Information: The purpose of security software is to minimize the risks of accidental or intentional corruption, destruction, disclosure, or denial of access to corporate data. The integrity of the information kept in the computing environment is essential. CA-Top Secret for VSE/ESA helps protect that integrity. Through individual accountability, access permissions, and a comprehensive audit trail, CA-Top Secret for VSE/ESA controls and monitors who can access and change critical corporate data. In fact, CA-Top Secret for VSE/ESA policies protect data and resources even before they are created. And, until policies are established to control how new data is shared, it is protected by default.

Maintaining the integrity of the computing environment and even the security system itself is equally important. CA-Top Secret for VSE/ESA protects these programs, configurations, and settings as well as the data that relies upon them. CA-Top Secret for VSE/ESA is effective for closing common system exposures. It uses standard, documented system interfaces to provide immediate support for changes to VSE and controlled access to security information.

Maintains Individual Accountability: CA-Top Secret for VSE/ESA, V1R3, automatically distributes security policies throughout your enterprise to simplify management and ensure consistency of controls.

CA-Top Secret for VSE/ESA, Version 1 Release 3, helps ensure enterprise-wide individual accountability. By requiring a user to supply a valid user ID and password in order to access applications, CA-Top Secret for VSE/ESA can verify a user's identity and assure that he or she will only access those resources that he or she has been permitted to use. Each user, therefore, is held accountable for his or her actions while accessing your data and resources. To protect passwords traveling over a network, CA-Top Secret for VSE/ESA will optionally use single-use password substitutes.

It helps enforce complete accountability for all administrative actions. CA-Top Secret for VSE/ESA limits administrators to maintaining only those users and resources over which they have been granted authority and for only those actions which they have been empowered to perform. All administrative actions are securely recorded in detail for archival purposes or later review.

Integrates Mainframe Security into the Distributed Environment: The need to automatically synchronize security information around a distributed environment is a critical requirement of many organizations to maintain consistency of policies and control administrative costs. CA-Top Secret for VSE/ESA fully supports synchronized security by means of the Command Propagation Facility (CPF). Whether updating user and resource information across multiple VSE, VM, and OS/390 (R) nodes, or passwords and user status information across mainframe and non-mainframe platforms such as UNIX (R) and Windows NT (R). CPF helps ensure that security information is consistently and securely maintained throughout the enterprise, automatically. All communication is encrypted for complete privacy of security data.

CA-Top Secret for VSE/ESA also maintains security across networked VSE environments. Extensive controls for CICS MRO/ISC links, and POWER protect incoming and outgoing tasks on both sending and receiving nodes.

Offers Flexible Structure to Match Your Organization: CA-Top Secret for VSE/ESA, Version 1 Release 3, provides the flexibility to organize security according to your existing security policy. Whatever centralized, decentralized, or mixed security approach you may now be using can be replicated in CA-Top Secret for VSE/ESA. Its hierarchy is organized very much like a typical corporate structure with zones, divisions, departments, and user groupings. Where administrative authorities need to extend beyond the bounds of the existing hierarchy, CA-Top Secret for VSE/ESA gives you the flexibility to define new administrative boundaries without disturbing the overall structure.

To aid in the smooth transition to CA-Top Secret for VSE/ESA, users and resources can be protected in phases. Modes of implementation enable you to incorporate resources under the CA-Top Secret for VSE/ESA realm gradually, by system, subsystem, user, group, or individual permissions written to protect critical data and resources.

Designed For Ease of Use and Effective Administration: Controlled sharing of data and resources is the key to an efficient security system that does not impede end users from doing their jobs. The most effective way to provide controlled sharing is by grouping users according to the role, or job function, they perform for the organization. The use of CA-Top Secret for VSE/ESA Profiles provides a way to group users who share common functional access needs, while maintaining the individual accountability necessary for a secure environment.

User restrictions and resource access authorizations are grouped under one or more Profile ACIDs (ACcessor IDs), which can be associated with many users at once. These profiles assist in defining the conditions under which users can access systems resources. Security administrators define access by group, enabling one permission to apply to many users at once. Permitting access becomes more efficient, and maintaining the appropriate level of security becomes much easier. A security simulator enables administrators to test authorizations before implementing them throughout the organization. CA-Top Secret for VSE/ESA, Version 1 Release 3, matches your organizational structure with a highly flexible security hierarchy.

Provides Superior Auditing and Reporting: Information management personnel have a corporate responsibility to periodically review the security software for adherence to corporate policy and effectiveness of the implementation. CA-Top Secret for VSE/ESA creates comprehensive logging records for virtually all activity on the computer network. This information is recorded in its own Audit/Tracking File which can, themselves, be protected by CA-Top Secret for VSE/ESA. An extensive set of pre-formatted reports show security validations, violations and status on all types of security events and privileges for users, jobs, and resources. Information may be further categorized by time of day, date, type of access, or type of event.

Security logs can be shared by multiple VSE systems, and with the addition of CA-Top Secret for VSE/ESA WorkStation, logs from distributed systems can be accessed for combined reporting and correlation with VSE events.

Auditing can be performed through real-time, online facilities or batch reports. Several tools included with CA-Top Secret for VSE/ESA, V1R3, including CA-Earl, the Easy Access Reporting Language, allow for additional formatting of the standard reports and facilitate easy creation of new, customized reports.



Security You Can Trust

CA-Top Secret for VSE/ESA, Version 1 Release 3, provides all in one:

  • Enterprise-wide security across networked, heterogeneous computers

  • Distributed security database and policy synchronization among VSE and non-VSE environments

  • VSE Library, Sublibrary, and Member Security

  • Record, field, and screen-level security for CICS

  • Extended VSE security controls such as time-of-day, calendars, and access by program path

  • Centralized reporting and real-time monitoring for security events throughout the enterprise

  • Simplified security extensibility to custom applications, using high-level APIs and easy administrative commands
CA-Top Secret for VSE/ESA, V1R3, has been built using the proven technology and implementation strategy of CA-Top Secret for MVS (TM).

Limited Availability: CA-Top Secret for VSE/ESA, V1R3, is available on a limited basis in the U.S. and Europe/Middle East from December 11, 1998, until June 25, 1999, when it becomes generally available. During this period, CA-Top Secret for VSE/ESA is available in English only. No national language versions in German, Japanese and Spanish will be available.

CA-Top Secret for VSE/ESA, V1R3, will be shipped on the desired distribution medium from the SMS software distribution library.

CA-Top Secret for VSE/ESA, V1R3, will be supported via normal programming service Level 1 channels.

All statements regarding IBMs future direction and intention are subject to change or withdrawal without notice, and represent goals and objectives only.



Year 2000

This product is Year 2000 ready. When used in accordance with its associated documentation, it is capable of correctly processing, providing, and/or receiving date data within and between the 20th and 21st centuries, provided all other products (for example, software, hardware, and firmware) used with the product properly exchange accurate date data with it.



PRODUCT POSITIONING

The continued growth in distributed computing brings an increased exposure to unauthorized systems access and monetary losses related to the destruction, copying, modification, or falsification of business-critical data. Security requirements from internal auditors and federal lawmakers have never been stricter. VSE customers must have the ability to better manage, control, and monitor access to their data.

CA-Top Secret for VSE/ESA, V1R3, provides the required functions for controlling your VSE batch environment as well as your CICS TS VSE/ESA system for security needs such as:

  • Avoiding system outages by preventing data corruption and modification

  • Keeping track of the expanding number of users that have access to sensitive data

  • Protecting valuable data from increasingly sophisticated security violators

  • Providing auditing capabilities

  • Interfacing with Unicenter TNG



HARDWARE AND SOFTWARE SUPPORT SERVICES



SmoothStart (TM)/Installation Services

IBM SmoothStart or Installation Services will not be provided for CA-Top Secret for VSE/ESA, V1R3.

Trademarks

      MVS and SmoothStart are trademarks of International Business
      Machines Corporation in the United States or other countries or
      both.
      CICS and OS/390 are registered trademarks of International
      Business Machines Corporation in the United States or other
      countries or both.
      Windows NT is a registered trademark of Microsoft Corporation.
      UNIX is a registered trademark in the United States and other
      countries exclusively through X/Open Company Limited.
      Other company, product, and service names may be trademarks or
      service marks of others.



SUPPLEMENTAL INFORMATION



TECHNICAL INFORMATION



Specified Operating Environment

Hardware Requirements: CA-Top Secret for VSE/ESA, V1R3, has the same requirements as VSE/ESA Version 2 Release 4.

Software Requirements

  • VSE/ESA Version 2 Release 4

  • CA90s** Services for VSE, Version 1 Release 4, or higher (from Computer Associates International, Inc.)
Compatibility: CA-Top Secret for VSE/ESA, Version 1 Release 3, corresponds to CA-Top Secret for VSE, Version 3 Release 0, from CAI Inc.

It is code and database compatible with the following products from CAI Inc.:

  • CA-Top Secret for MVS (TM), Version 5 Release 1

  • CA-Top Secret for VM, Version 1 Release 4
CA-Top Secret for VSE/ESA, V1R3, corresponds to CA-Top Secret for VSE, Version 3 Release 0, from CAI Inc. Utilities are available to enable migration from:
  • CA-Top Secret for VSE (prior to Version 3 from CAI Inc.)

  • Alert for VSE (from IBM or CAI Inc.)

  • Alert for CICS (R)-VSE (from IBM or CAI Inc.)
These migration utilities are packaged with the CA-Top Secret for VSE/ESA, V1R3, product at no additional charge.

Performance Considerations: Performance can be affected depending upon which level of security the user wishes to activate. Certain functions such as security of Record levels CICS datasets, CICS Screen Level security of DL/I VSE security might add increased overhead.

User Group Requirements: This announcement satisfies or partially satisfies 2 requirements from one or more of the worldwide user group communities, which include Australasian SHARE/GUIDE (ASG), COMMON, COMMON Europe, GUIDE International, G.U.I.D.E. Europe, Japan GUIDE/SHARE (JGS), Guide Latin American (LAG), SHARE EUROPE, and SHARE Incorporated. Requirements satisfied include:

  • CUST93022 -- Provide Security-Managment-System for VSE/ESA

  • JOOS0093045 -- Security Control Function for VSE/ESA



Planning Information

Customer Responsibilities: The user needs to plan the layout of the security organization, as described in the CA-Top Secret for VSE/ESA Planning Guides provided as entitled publication with the software.

Installability: CA-Top Secret for VSE/ESA, V1R3, is always shipped with your VSE/ESA Version 2 Release 4 SIPO order. It is key protected and requires a unique user access key. However, the user access key is only generated and delivered automatically from IBM as well as the entitled product publications, when CA-Top Secret for VSE/ESA is explicitly ordered. The license order for CA-Top Secret for VSE/ESA can be placed together with any other product with the VSE/ESA Version 2 Release 4 product set or alone at a later point in time.

CA-Top Secret for VSE/ESA, V1R3, requires CA90s Services for VSE, Version 1 Release 4, (CA90s) or higher as prerequisite. CA-Top Secret for VSE/ESA can run in "demo mode" without user access keys but still requiring CA90s. "Demo mode" means all functions in CA-Top Secret for VSE/ESA can be used, however, resources are not protected. If a security violation occurs, it will be reported with a console message only.

Customers who already have CA90s installed on their system need to check the required level for use with CA-Top Secret for VSE/ESA by contacting CAI Inc. as described below. Customers who do not have CA90s installed on their system must order it from CAI Inc. by either of the following alternatives:

CA90s -- Ordering, Inquiries: Ordering CA90s from CAI Inc. can be performed either by the customer, IBM Business Partner, or IBM representative handling the VSE/ESA Version 2 Release 4 or CA-Top Secret for VSE/ESA order. Customer name, shipping address (no Post Office Boxes), customer contact, phone number, and preferred medium must be provided via either of the following alternatives.

  • Visit the URL using CAI Inc.'s Feedback page at:
  • Send an e-mail to:

    danda01@mail.cai.com

  • If not e-Mail/Web-enabled:
    • Phone: 516-342-2181
    • Fax: 516-342-4873
The customer will receive CA90s Services for VSE, Version 1 Release 4, (CA90s) with the required documentation and a License Agreement form directly from CAI Inc. The customer must return the signed License Agreement form directly to CAI Inc.

The customer will be registered and licensed for CA90s by CAI Inc. who will also provide service for CA90s. CA90s is a Computer Associates International, Inc. product, not an IBM product. IBM does not assume any responsibility for CA90s either expressed or implied.

CA90s is provided at no additional charge.

Packaging: CA-Top Secret for VSE/ESA, V1R3, is available only together with VSE/ESA Version 2 Release 4. It is shipped on the VSE/ESA Extended Base Tape either on 3480 Cartridge, 6250 bpi magnetic tape or 4-mm DAT tape. CA-Top Secret for VSE/ESA, V1R3, is key protected. It can be activated by entering the user access key together with the customer number both of which are provided by IBM with the software deliverable if CA-Top Secret for VSE/ESA, V1R3, was ordered with VSE/ESA Version 2 Release 4 initially, or via MES after the VSE/ESA Version 2 Release 4 order was placed. Without user access keys CA-Top Secret for VSE/ESA, Version 1 Release 3, can be used in "demo mode" only.

CA90s Services for VSE, Version 1 Release 4, (CA90s) from CAI Inc. is a prerequisite to run CA-Top Secret for VSE/ESA, Version 1 Release 3, and must be ordered directly from CAI Inc. It is not available from IBM.



Security, Auditability, and Control

The announced programs use the security and auditability features of its components. The customer is responsible for evaluation, selection, and implementation of security features, administrative procedures, and appropriate controls in application systems and communication facilities.



ORDERING INFORMATION

A memo, program directory and one copy of the following publications are supplied automatically with the basic machine-readable material:

                                        Order
Title                                   Number

Installation Guide SC33-7974 Command Functions Guide SC33-7975 Control Options Guide SC33-7976 Implementation: CICS Guide SC33-7977 Messages and Codes Guide SC33-7978 Planning Guide SC33-7979 Report and Tracking Guide SC33-7980 User Guide SC33-7981 Licensed Programming Spec SC33-7982

Additional copies of unlicensed publications will be available for a fee after availability. These copies may be ordered from your IBM representative, through the System Library Subscription Service (SLSS), or by direct order.

Displayable Softcopy Publications: CA-Top Secret for VSE/ESA publications are also offered in displayable softcopy form. All unlicensed manuals are included. The displayable manuals are part of the basic machine-readable material. The files are shipped on CD-ROM.

These displayable manuals can be used with the BookManager (R) READ licensed programs in any of the supported environments. Terms and conditions for use of the machine-readable files are shipped with the files.

Subsequent updates (technical newsletters or revisions between releases) to the publications shipped with the product will be distributed to the user of record for as long as a license for this software remains in effect. A separate publication order or subscription is not needed.



New Licensees

Orders for new licenses may be configured in CFSW, syslinked to AAS, and entered into AAS beginning of September 29, 1998.

Shipment will begin on the planned availability date.

Orders that ship after the planned availability date will receive CA-Top Secret for VSE/ESA, Version 1 Release 3.

New users of CA-Top Secret for VSE/ESA, Version 1 Release 3 should specify:

         Type           Model

5686 A05

Note: This program is part of the base package of 5690-VSE (SIPO SPO).

Basic License: To order a basic license, specify the program number and feature number 9001 for asset registration. For a graduated one-time charge or graduated monthly license charge, specify the feature below that corresponds to the group that contains the designated machine.

CA-Top Secret for VSE/ESA (5686-A05)

Basic Graduated Monthly Processor License Charge Group Feature Number

18 0100 20 0101 25 0102 28 0103 29 0104 30 0105 31 0106 32 0107 35 0108 38 0109 40 0110 50 0111 60 0112 70 0113 80 0114

Entry Support License (ESL): To order an ESL license, specify the program number, feature number 9001 for asset registration, and the applicable ESL OTC feature number.

                                              ESL
                                        One-Time Charge
Program Number/Description               Feature Number

5686-A05 CA-Top Secret for 0150 VSE/ESA

Note: ESL machines can be determined by referring to the IBM Entry End User/390 Attachment (Z125-4379).

Multiple Operating System -- PR/SM (TM) (MOSP): For a graduated one-time charge or graduated monthly license charge, specify the feature number below that corresponds to the group that contains the designated machine.

CA-Top Secret for VSE/ESA (5686-A05)

MOSP Basic Graduated Monthly License Charge Processor Feature number Group

18 0215 20 0216 25 0217 28 0218 29 0219 30 0220 31 0221 32 0222 35 0223 38 0224 40 0225 50 0226 60 0227 70 0228 80 0229

Note: The group can be determined by referring to the Exhibit for IBM System/390 (R) Machines (Z125-3901) or the Exhibit for Non-IBM Machines (Z125-3902) that are associated with the IBM Customer Agreement (Z125-4575).

Single Version Charging: To elect Single Version Charging, the customer must notify and identify to IBM the prior program and replacement program and the designated machine the programs are operating on.

Version-To-Version Upgrade Credit: To upgrade from a prior program acquired for a one-time charge to a replacement program using a Version-To-Version upgrade credit, the customer must notify and identify to IBM the applicable prior program and replacement program participating in the upgrade credit.

Basic Machine-Readable Material for CA-Top Secret for VSE/ESA, V1R3: To order CA-Top Secret for VSE/ESA, Version 1 Release 3 (5686-A05), select the feature number of the desired distribution medium. Basic machine-readable material will be shipped in 9/6250 bpi magnetic tape reels, 3480 tape cartridges or 4-mm DAT tape cartridges as part of the 5690-VSE system program order.

For order feature number for CA-Top Secret for VSE/ESA, V1R3, refer to VSE/ESA Version 2 Release 4 ordering information.

Customization Options: Select the appropriate feature numbers to customize your order to specify the delivery options desired. These features can be specified on the initial or MES orders.

Example: If publications are not desired for the initial order, specify feature number 3470 to ship media only. For future updates, specify feature number 3480 to ship media updates only. If, in the future, publication updates are required, order an MES to remove feature number 3480; then, the publications will ship with the next release of the program.

                                                    Feature
Description                                         Number

Initial Shipments

Serial Number Only (suppresses shipment 3444 of media and documentation)

Ship Media Only (suppresses initial 3470 shipment of documentation)

Ship Documentation Only (suppresses 3471 initial shipment of media)

Update Shipments

Ship Media Updates Only (suppresses 3480 update shipment of documentation)

Ship Documentation Only (suppresses 3481 update shipment of media)

Suppress Updates (suppresses update 3482 shipment of media and documentation)

Expedite Shipments

Local IBM Office Expedite 3445 (for IBM use only)

Customer Expedite Process Charge 3446 ($30 charge for each product)

Expedite shipments will be processed to receive 72-hour delivery from the time IBM (SMS) receives the order. SMS will then ship the order via overnight air transportation.

DSLO License: To order a DSLO license, specify the program number, feature number 9901 for asset registration, and the feature number for graduated one-time charge or graduated monthly license charge that corresponds to the processor group containing the designated machine.

CA-Top Secret for VSE/ESA (5686-A05)

DSLO Graduated Monthly Processor License Charge Group Feature Number

18 0130 20 0131 25 0132 28 0133 29 0134 30 0135 31 0136 32 0137 35 0138 38 0139 40 0140 50 0141 60 0142 70 0143 80 0144

Multiple Operating System -- PR/SM (TM) (MOSP): For a graduated one-time charge or graduated monthly licence charge, specify the feature number, corresponding to the group that contains the designated machine.

CA-Top Secret for VSE/ESA (5686-A05)

MOSP DSLO Graduated Monthly Processor License Charge Group Feature Number

18 0151 20 0152 25 0153 28 0154 29 0155 30 0156 31 0157 32 0158 35 0159 38 0160 40 0161 50 0162 60 0163 70 0164 80 0165

Ordering a DSLO feature will result in IBM maintaining a record of this customer location as a DSLO user only. All material for the DSLO license will be provided through the basic license location. If a user selects DSLO, no other feature numbers are valid for this order and no program materials or updates will be shipped.

Licensed Documentation: There will be no licensed documentation available for this product.

Ordering Online Library Collections: In the United States, order a single update or an ongoing SLSS subscription of online library collections through normal publication ordering channels using the order number of the collection. Call the IBM toll-free number, 800-879-2755, use PUBORDER on IBMLink (TM), or contact an IBM representative, or an IBM Business Partner. Or, send an order form to IBM by fax, Internet, IBM Mail Exchange or direct mail as follows:

  • Fax: 800-445-9269

  • E-mail: usib6flp@ibmmail.com

  • IBM Mail Exchange: usib6flp at ibmmail

  • Direct mail:
      IBM Corporation P.O. Box 29570 Raleigh, NC 27626-0570
In the U.S. and other countries, order online library collections using the ordering systems normally used to order IBM hardcopy publications. Specify the appropriate order numbers listed above.

To order collections for a specific country, do one of the following:

  • Access the Publications Direct Catalog on the World Wide Web at: and select "Country Selection" and then "Publications and Information".

  • Access the DIAL IBM PUBS application (registered customers or IBM business partners only).

  • Send a note to the IBM BOOKSHOP service at one of the following:
    • E-mail: bookshop@dk.ibm.com
    • IBM Mail Exchange: dkibmbsh at ibmmail
    Inquiries from customers are automatically forwarded to the publications center or literature coordinator for that country.

  • Access PUBORDER on the IBMLink application, either directly or through the World Wide Web at:
  • Contact an IBM representative or an IBM Business Partner
Feedback and Additional Information: For specific questions, customer feedback on the IBM Online Library or more information about the collections, contact the Softcopy Center as follows: To view IBM Online Library books on the Internet, select "The Library" at: To view the contents (catalogs) of the collections, select your country at: and then select "IBMManuals" and "Softcopy."

For announcements of updated collections, select your country at:

on the World Wide Web and then select the IBMLink menu choice InfoLinkCenter SOFTPUBS ONLINELIBRARY NEWSOFTCOPY.

To get a price comparison of hardcopy on a collection, choose "Country Selection" at:

and then select "Publications and Information" and "CD-ROMs." Select a particular collection and select the "structured overview" link at the bottom of the panel to view the price comparison.



TERMS AND CONDITIONS

Licensing: IBM Customer Agreement

Indexed Monthly License Charge (IMLC) Applies: No

Installation License or Location License Applies: No

Usage Restriction Applies: No

Educational Allowance: Yes, to qualified education customers.

Volume Discount: Not applicable

Version-To-Version Upgrade Credits Apply: Yes

                                                         Single
Replaced Program(s)      Replacement Program(s)         Version
Program     Program      Program        Program         Charging
Number      Name         Number         Name            Applies

5686-072 Alert for Top Secret for VSE/ESA Yes VSE

5686-079 Alert for Top Secret for VSE/ESA Yes CICS-VSE

5686-A05 Top Secret To a follow-on, if any Yes for VSE/ESA

Warranted: Yes

Licensed Program Materials Availability

  • Restricted Materials of IBM: None
  • Non-Restricted Source Materials: Some
  • Object Code Only (OCO): Some
Publication that identifies
 OCO components:                      SC33-7974
 Availability Date:                   June 25, 1999

Testing Period: Two Months (Basic License only)

Program Services

Support Center applies:          Yes

Access is available through the IBM Support Center

Available until discontinued: 12 months' written notice

IBM provides Level 1 service for CA-Top Secret for VSE/ESA, Version 1 Release 3. Level 2 service will be provided by Computer Associates International, Inc.

Services for DSLO Licenses:      Provided through Basic
                                  License location

Support Line: S/390 (R)



CHARGES

The charges provided in this announcement are suggested retail prices for the U.S. only and are provided for your information only. Dealer prices may vary, and prices may also vary by country. Prices are subject to change without notice. For additional information and current prices, contact your local IBM representative.

Program Number 5686-A05
(CA-Top Secret for VSE/ESA)

Basic Monthly DSLO Monthly Group License Charge License Charge

18 $ 79 $ 59 20 115 86 25 149 112 28 204 153 29 265 199 30 344 258 31 423 317 32 541 406 35 622 467 38 715 536 40 822 617 50 1,030 773 60 1,290 968 70 1,615 1,210 80 2,020 1,515

Program Number 5686-A05
(CA-Top Secret for VSE/ESA)

MOSP Basic MOSP DSLO Graduated Monthly Graduated Monthly Group License Charge License Charge

18 $ 79 $ 59 20 97 73 25 132 99 28 177 133 29 235 176 30 305 229 31 384 288 32 482 362 35 582 437 38 669 502 40 769 577 50 926 695 60 1,160 870 70 1,455 1,090 80 1,820 1,365

                                One-Time Charge
Entry End User/390
  Entry Support License:             $1,262

Entry Support License One-Time Charge: One-time charge authorizes use only on IBM Entry End User/390 Machines.



CALL NOW TO ORDER

To order, contact the IBM North America Sales Centers, your local IBM representative, or your IBM Business Partner.

IBM North America Sales Centers, our national direct marketing organization, can add your name to the mailing list for catalogs of IBM products.

 Phone:     800-IBM-CALL
 Fax:       800-2IBM-FAX
 Internet:  ibm_direct@vnet.ibm.com
 Mail:      IBM North America Sales Centers
            Dept. LE010
            P.O. Box 2690
            Atlanta, GA  30301-2690
 Reference: LE010

To identify your local IBM Business Partner or IBM representative, call 800-IBM-4YOU.

Note: Shipments will begin after the planned availability date.

Trademarks

      MVS, PR/SM, PR/SM, and IBMLink are trademarks of International
      Business Machines Corporation in the United States or other
      countries or both.
      CICS, BookManager, System/390, and S/390 are registered
      trademarks of International Business Machines Corporation in
      the United States or other countries or both.
      Other company, product, and service names may be trademarks or
      service marks of others.
      CA-Top Secret and CA90s are registered trademarks of Computer
      Associates International, Inc.