CA-Top Secret for VSE/ESA, Version 1 Release 3, Protects Your Information Assets
September 29, 1998
Announcement Letter Number: 298-350
Table of Contents:
- At a Glance
- PRODUCT POSITIONING
- SUPPLEMENTAL INFORMATION
- TECHNICAL INFORMATION
- ORDERING INFORMATION
- TERMS AND CONDITIONS
- CALL NOW TO ORDER
At a Glance
CA-Top Secret for VSE/ESA, V1R3:
- Provides a full function security solution together with VSE/ESA
Version 2 Release 4 and the new CICS Transaction Server for
- Complements the Basic Security Manager of VSE/ESA Version 2
Release 4 which supports only basic security needs
- Helps ensure the integrity and security of your critical
- Provides enterprise security, management, and control of mainframe
and distributed environments
- Provides an integrated security solution
- Supports synchronized security around distributed environments
- Provides the flexibility to organize security around existing security policies
----------------------------------------- For ordering, contact: Your IBM representative, an IBM Business Partner, or IBM North America Sales Centers at 800-IBM-CALL Reference: LE010
EXTRA! EXTRA! . . .
Subscribe to IBM iSource, your electronic source for customized IBM information! Go to our web site at http://www.ibm.com/isource or send an e-mail to firstname.lastname@example.org with the word SUBSCRIBE in the body.
CA-Top Secret** for VSE/ESA is a software product licensed from Computer Associates International, Inc. CA-Top Secret for VSE/ESA, Version 1 Release 3 (V1R3), provides enterprise security, management, and control of your mainframe and networked environments with integrated security solutions that protect your information assets. CA-Top Secret for VSE/ESA strengthens security, streamlines administration, and provides both platform and network-level security and auditing capabilities.
CA-Top Secret for VSE/ESA, V1R3:
- Automatically distributes security policies throughout your
enterprise to simplify management and help ensure consistency of
- Helps ensure enterprise-wide individual accountability
- Integrates mainframe security into the distributed environment
- Fully supports synchronized security around a distributed
environment by means of the Command Propagation Facility (CPF)
- Encrypts all communication for complete privacy of security data
- Maintains security across distributed VSE environments
- Provides extensive controls for CICS (R) MRO/ISC links, and POWER
protect incoming and outgoing tasks on both sending and receiving
- Provides the flexibility to organize security according to your
existing security policy
- Enables you to replicate whatever centralized, decentralized, or mixed security approach you may now be using
- Customers with comprehensive security requirements in their mainframe and distributed environments.
- VSE/ESA Version 2 Release 4 and CICS/TS
- CA90s Services for VSE, Version 1 Release 4, from Computer Associates International, Inc.
Planned Availability Dates
- December 11, 1998 (Limited Availability)
- June 25, 1999 (General Availability)
This announcement is provided for your information only. For additional information, contact your IBM representative, call 800-IBM-4YOU, or visit the IBM home page at: http://www.ibm.com
CA-Top Secret for VSE/ESA, V1R3, helps ensure the integrity and security of your critical information assets. It provides flexibility and control through a unique hierarchical security configuration similar to the organizational structure of your corporate environment. Administrative tools, reporting options and automatic logging capabilities accompany CA-Top Secret for VSE/ESA, securing your environment while enabling comprehensive auditing and controlled sharing of data and resources.
Benefits and Features
Helps Ensure Security and Integrity of Systems and Information: The purpose of security software is to minimize the risks of accidental or intentional corruption, destruction, disclosure, or denial of access to corporate data. The integrity of the information kept in the computing environment is essential. CA-Top Secret for VSE/ESA helps protect that integrity. Through individual accountability, access permissions, and a comprehensive audit trail, CA-Top Secret for VSE/ESA controls and monitors who can access and change critical corporate data. In fact, CA-Top Secret for VSE/ESA policies protect data and resources even before they are created. And, until policies are established to control how new data is shared, it is protected by default.
Maintaining the integrity of the computing environment and even the security system itself is equally important. CA-Top Secret for VSE/ESA protects these programs, configurations, and settings as well as the data that relies upon them. CA-Top Secret for VSE/ESA is effective for closing common system exposures. It uses standard, documented system interfaces to provide immediate support for changes to VSE and controlled access to security information.
Maintains Individual Accountability: CA-Top Secret for VSE/ESA, V1R3, automatically distributes security policies throughout your enterprise to simplify management and ensure consistency of controls.
CA-Top Secret for VSE/ESA, Version 1 Release 3, helps ensure enterprise-wide individual accountability. By requiring a user to supply a valid user ID and password in order to access applications, CA-Top Secret for VSE/ESA can verify a user's identity and assure that he or she will only access those resources that he or she has been permitted to use. Each user, therefore, is held accountable for his or her actions while accessing your data and resources. To protect passwords traveling over a network, CA-Top Secret for VSE/ESA will optionally use single-use password substitutes.
It helps enforce complete accountability for all administrative actions. CA-Top Secret for VSE/ESA limits administrators to maintaining only those users and resources over which they have been granted authority and for only those actions which they have been empowered to perform. All administrative actions are securely recorded in detail for archival purposes or later review.
Integrates Mainframe Security into the Distributed Environment: The need to automatically synchronize security information around a distributed environment is a critical requirement of many organizations to maintain consistency of policies and control administrative costs. CA-Top Secret for VSE/ESA fully supports synchronized security by means of the Command Propagation Facility (CPF). Whether updating user and resource information across multiple VSE, VM, and OS/390 (R) nodes, or passwords and user status information across mainframe and non-mainframe platforms such as UNIX (R) and Windows NT (R). CPF helps ensure that security information is consistently and securely maintained throughout the enterprise, automatically. All communication is encrypted for complete privacy of security data.
CA-Top Secret for VSE/ESA also maintains security across networked VSE environments. Extensive controls for CICS MRO/ISC links, and POWER protect incoming and outgoing tasks on both sending and receiving nodes.
Offers Flexible Structure to Match Your Organization: CA-Top Secret for VSE/ESA, Version 1 Release 3, provides the flexibility to organize security according to your existing security policy. Whatever centralized, decentralized, or mixed security approach you may now be using can be replicated in CA-Top Secret for VSE/ESA. Its hierarchy is organized very much like a typical corporate structure with zones, divisions, departments, and user groupings. Where administrative authorities need to extend beyond the bounds of the existing hierarchy, CA-Top Secret for VSE/ESA gives you the flexibility to define new administrative boundaries without disturbing the overall structure.
To aid in the smooth transition to CA-Top Secret for VSE/ESA, users and resources can be protected in phases. Modes of implementation enable you to incorporate resources under the CA-Top Secret for VSE/ESA realm gradually, by system, subsystem, user, group, or individual permissions written to protect critical data and resources.
Designed For Ease of Use and Effective Administration: Controlled sharing of data and resources is the key to an efficient security system that does not impede end users from doing their jobs. The most effective way to provide controlled sharing is by grouping users according to the role, or job function, they perform for the organization. The use of CA-Top Secret for VSE/ESA Profiles provides a way to group users who share common functional access needs, while maintaining the individual accountability necessary for a secure environment.
User restrictions and resource access authorizations are grouped under one or more Profile ACIDs (ACcessor IDs), which can be associated with many users at once. These profiles assist in defining the conditions under which users can access systems resources. Security administrators define access by group, enabling one permission to apply to many users at once. Permitting access becomes more efficient, and maintaining the appropriate level of security becomes much easier. A security simulator enables administrators to test authorizations before implementing them throughout the organization. CA-Top Secret for VSE/ESA, Version 1 Release 3, matches your organizational structure with a highly flexible security hierarchy.
Provides Superior Auditing and Reporting: Information management personnel have a corporate responsibility to periodically review the security software for adherence to corporate policy and effectiveness of the implementation. CA-Top Secret for VSE/ESA creates comprehensive logging records for virtually all activity on the computer network. This information is recorded in its own Audit/Tracking File which can, themselves, be protected by CA-Top Secret for VSE/ESA. An extensive set of pre-formatted reports show security validations, violations and status on all types of security events and privileges for users, jobs, and resources. Information may be further categorized by time of day, date, type of access, or type of event.
Security logs can be shared by multiple VSE systems, and with the addition of CA-Top Secret for VSE/ESA WorkStation, logs from distributed systems can be accessed for combined reporting and correlation with VSE events.
Auditing can be performed through real-time, online facilities or batch reports. Several tools included with CA-Top Secret for VSE/ESA, V1R3, including CA-Earl, the Easy Access Reporting Language, allow for additional formatting of the standard reports and facilitate easy creation of new, customized reports.
Security You Can Trust
CA-Top Secret for VSE/ESA, Version 1 Release 3, provides all in one:
- Enterprise-wide security across networked, heterogeneous computers
- Distributed security database and policy synchronization among VSE
and non-VSE environments
- VSE Library, Sublibrary, and Member Security
- Record, field, and screen-level security for CICS
- Extended VSE security controls such as time-of-day, calendars, and
access by program path
- Centralized reporting and real-time monitoring for security events
throughout the enterprise
- Simplified security extensibility to custom applications, using high-level APIs and easy administrative commands
Limited Availability: CA-Top Secret for VSE/ESA, V1R3, is available on a limited basis in the U.S. and Europe/Middle East from December 11, 1998, until June 25, 1999, when it becomes generally available. During this period, CA-Top Secret for VSE/ESA is available in English only. No national language versions in German, Japanese and Spanish will be available.
CA-Top Secret for VSE/ESA, V1R3, will be shipped on the desired distribution medium from the SMS software distribution library.
CA-Top Secret for VSE/ESA, V1R3, will be supported via normal programming service Level 1 channels.
All statements regarding IBMs future direction and intention are subject to change or withdrawal without notice, and represent goals and objectives only.
This product is Year 2000 ready. When used in accordance with its associated documentation, it is capable of correctly processing, providing, and/or receiving date data within and between the 20th and 21st centuries, provided all other products (for example, software, hardware, and firmware) used with the product properly exchange accurate date data with it.
The continued growth in distributed computing brings an increased exposure to unauthorized systems access and monetary losses related to the destruction, copying, modification, or falsification of business-critical data. Security requirements from internal auditors and federal lawmakers have never been stricter. VSE customers must have the ability to better manage, control, and monitor access to their data.
CA-Top Secret for VSE/ESA, V1R3, provides the required functions for controlling your VSE batch environment as well as your CICS TS VSE/ESA system for security needs such as:
- Avoiding system outages by preventing data corruption and
- Keeping track of the expanding number of users that have access to
- Protecting valuable data from increasingly sophisticated security
- Providing auditing capabilities
- Interfacing with Unicenter TNG
HARDWARE AND SOFTWARE SUPPORT SERVICES
SmoothStart (TM)/Installation Services
IBM SmoothStart or Installation Services will not be provided for CA-Top Secret for VSE/ESA, V1R3.
MVS and SmoothStart are trademarks of International Business Machines Corporation in the United States or other countries or both. CICS and OS/390 are registered trademarks of International Business Machines Corporation in the United States or other countries or both. Windows NT is a registered trademark of Microsoft Corporation. UNIX is a registered trademark in the United States and other countries exclusively through X/Open Company Limited. Other company, product, and service names may be trademarks or service marks of others.
Specified Operating Environment
Hardware Requirements: CA-Top Secret for VSE/ESA, V1R3, has the same requirements as VSE/ESA Version 2 Release 4.
- VSE/ESA Version 2 Release 4
- CA90s** Services for VSE, Version 1 Release 4, or higher (from Computer Associates International, Inc.)
It is code and database compatible with the following products from CAI Inc.:
- CA-Top Secret for MVS (TM), Version 5 Release 1
- CA-Top Secret for VM, Version 1 Release 4
- CA-Top Secret for VSE (prior to Version 3 from CAI Inc.)
- Alert for VSE (from IBM or CAI Inc.)
- Alert for CICS (R)-VSE (from IBM or CAI Inc.)
Performance Considerations: Performance can be affected depending upon which level of security the user wishes to activate. Certain functions such as security of Record levels CICS datasets, CICS Screen Level security of DL/I VSE security might add increased overhead.
User Group Requirements: This announcement satisfies or partially satisfies 2 requirements from one or more of the worldwide user group communities, which include Australasian SHARE/GUIDE (ASG), COMMON, COMMON Europe, GUIDE International, G.U.I.D.E. Europe, Japan GUIDE/SHARE (JGS), Guide Latin American (LAG), SHARE EUROPE, and SHARE Incorporated. Requirements satisfied include:
- CUST93022 -- Provide Security-Managment-System for VSE/ESA
- JOOS0093045 -- Security Control Function for VSE/ESA
Customer Responsibilities: The user needs to plan the layout of the security organization, as described in the CA-Top Secret for VSE/ESA Planning Guides provided as entitled publication with the software.
Installability: CA-Top Secret for VSE/ESA, V1R3, is always shipped with your VSE/ESA Version 2 Release 4 SIPO order. It is key protected and requires a unique user access key. However, the user access key is only generated and delivered automatically from IBM as well as the entitled product publications, when CA-Top Secret for VSE/ESA is explicitly ordered. The license order for CA-Top Secret for VSE/ESA can be placed together with any other product with the VSE/ESA Version 2 Release 4 product set or alone at a later point in time.
CA-Top Secret for VSE/ESA, V1R3, requires CA90s Services for VSE, Version 1 Release 4, (CA90s) or higher as prerequisite. CA-Top Secret for VSE/ESA can run in "demo mode" without user access keys but still requiring CA90s. "Demo mode" means all functions in CA-Top Secret for VSE/ESA can be used, however, resources are not protected. If a security violation occurs, it will be reported with a console message only.
Customers who already have CA90s installed on their system need to check the required level for use with CA-Top Secret for VSE/ESA by contacting CAI Inc. as described below. Customers who do not have CA90s installed on their system must order it from CAI Inc. by either of the following alternatives:
CA90s -- Ordering, Inquiries: Ordering CA90s from CAI Inc. can be performed either by the customer, IBM Business Partner, or IBM representative handling the VSE/ESA Version 2 Release 4 or CA-Top Secret for VSE/ESA order. Customer name, shipping address (no Post Office Boxes), customer contact, phone number, and preferred medium must be provided via either of the following alternatives.
- Visit the URL using CAI Inc.'s Feedback page at:
- Send an e-mail to:
- If not e-Mail/Web-enabled:
- Phone: 516-342-2181
- Fax: 516-342-4873
The customer will be registered and licensed for CA90s by CAI Inc. who will also provide service for CA90s. CA90s is a Computer Associates International, Inc. product, not an IBM product. IBM does not assume any responsibility for CA90s either expressed or implied.
CA90s is provided at no additional charge.
Packaging: CA-Top Secret for VSE/ESA, V1R3, is available only together with VSE/ESA Version 2 Release 4. It is shipped on the VSE/ESA Extended Base Tape either on 3480 Cartridge, 6250 bpi magnetic tape or 4-mm DAT tape. CA-Top Secret for VSE/ESA, V1R3, is key protected. It can be activated by entering the user access key together with the customer number both of which are provided by IBM with the software deliverable if CA-Top Secret for VSE/ESA, V1R3, was ordered with VSE/ESA Version 2 Release 4 initially, or via MES after the VSE/ESA Version 2 Release 4 order was placed. Without user access keys CA-Top Secret for VSE/ESA, Version 1 Release 3, can be used in "demo mode" only.
CA90s Services for VSE, Version 1 Release 4, (CA90s) from CAI Inc. is a prerequisite to run CA-Top Secret for VSE/ESA, Version 1 Release 3, and must be ordered directly from CAI Inc. It is not available from IBM.
Security, Auditability, and Control
The announced programs use the security and auditability features of its components. The customer is responsible for evaluation, selection, and implementation of security features, administrative procedures, and appropriate controls in application systems and communication facilities.
A memo, program directory and one copy of the following publications are supplied automatically with the basic machine-readable material:
Order Title Number
Installation Guide SC33-7974 Command Functions Guide SC33-7975 Control Options Guide SC33-7976 Implementation: CICS Guide SC33-7977 Messages and Codes Guide SC33-7978 Planning Guide SC33-7979 Report and Tracking Guide SC33-7980 User Guide SC33-7981 Licensed Programming Spec SC33-7982
Additional copies of unlicensed publications will be available for a fee after availability. These copies may be ordered from your IBM representative, through the System Library Subscription Service (SLSS), or by direct order.
Displayable Softcopy Publications: CA-Top Secret for VSE/ESA publications are also offered in displayable softcopy form. All unlicensed manuals are included. The displayable manuals are part of the basic machine-readable material. The files are shipped on CD-ROM.
These displayable manuals can be used with the BookManager (R) READ licensed programs in any of the supported environments. Terms and conditions for use of the machine-readable files are shipped with the files.
Subsequent updates (technical newsletters or revisions between releases) to the publications shipped with the product will be distributed to the user of record for as long as a license for this software remains in effect. A separate publication order or subscription is not needed.
Orders for new licenses may be configured in CFSW, syslinked to AAS, and entered into AAS beginning of September 29, 1998.
Shipment will begin on the planned availability date.
Orders that ship after the planned availability date will receive CA-Top Secret for VSE/ESA, Version 1 Release 3.
New users of CA-Top Secret for VSE/ESA, Version 1 Release 3 should specify:
Note: This program is part of the base package of 5690-VSE (SIPO SPO).
Basic License: To order a basic license, specify the program number and feature number 9001 for asset registration. For a graduated one-time charge or graduated monthly license charge, specify the feature below that corresponds to the group that contains the designated machine.
CA-Top Secret for VSE/ESA (5686-A05)
Basic Graduated Monthly Processor License Charge Group Feature Number
18 0100 20 0101 25 0102 28 0103 29 0104 30 0105 31 0106 32 0107 35 0108 38 0109 40 0110 50 0111 60 0112 70 0113 80 0114
Entry Support License (ESL): To order an ESL license, specify the program number, feature number 9001 for asset registration, and the applicable ESL OTC feature number.
ESL One-Time Charge Program Number/Description Feature Number
5686-A05 CA-Top Secret for 0150 VSE/ESA
Note: ESL machines can be determined by referring to the IBM Entry End User/390 Attachment (Z125-4379).
Multiple Operating System -- PR/SM (TM) (MOSP): For a graduated one-time charge or graduated monthly license charge, specify the feature number below that corresponds to the group that contains the designated machine.
CA-Top Secret for VSE/ESA (5686-A05)
MOSP Basic Graduated Monthly License Charge Processor Feature number Group
18 0215 20 0216 25 0217 28 0218 29 0219 30 0220 31 0221 32 0222 35 0223 38 0224 40 0225 50 0226 60 0227 70 0228 80 0229
Note: The group can be determined by referring to the Exhibit for IBM System/390 (R) Machines (Z125-3901) or the Exhibit for Non-IBM Machines (Z125-3902) that are associated with the IBM Customer Agreement (Z125-4575).
Single Version Charging: To elect Single Version Charging, the customer must notify and identify to IBM the prior program and replacement program and the designated machine the programs are operating on.
Version-To-Version Upgrade Credit: To upgrade from a prior program acquired for a one-time charge to a replacement program using a Version-To-Version upgrade credit, the customer must notify and identify to IBM the applicable prior program and replacement program participating in the upgrade credit.
Basic Machine-Readable Material for CA-Top Secret for VSE/ESA, V1R3: To order CA-Top Secret for VSE/ESA, Version 1 Release 3 (5686-A05), select the feature number of the desired distribution medium. Basic machine-readable material will be shipped in 9/6250 bpi magnetic tape reels, 3480 tape cartridges or 4-mm DAT tape cartridges as part of the 5690-VSE system program order.
For order feature number for CA-Top Secret for VSE/ESA, V1R3, refer to VSE/ESA Version 2 Release 4 ordering information.
Customization Options: Select the appropriate feature numbers to customize your order to specify the delivery options desired. These features can be specified on the initial or MES orders.
Example: If publications are not desired for the initial order, specify feature number 3470 to ship media only. For future updates, specify feature number 3480 to ship media updates only. If, in the future, publication updates are required, order an MES to remove feature number 3480; then, the publications will ship with the next release of the program.
Feature Description Number
Serial Number Only (suppresses shipment 3444 of media and documentation)
Ship Media Only (suppresses initial 3470 shipment of documentation)
Ship Documentation Only (suppresses 3471 initial shipment of media)
Ship Media Updates Only (suppresses 3480 update shipment of documentation)
Ship Documentation Only (suppresses 3481 update shipment of media)
Suppress Updates (suppresses update 3482 shipment of media and documentation)
Local IBM Office Expedite 3445 (for IBM use only)
Customer Expedite Process Charge 3446 ($30 charge for each product)
Expedite shipments will be processed to receive 72-hour delivery from the time IBM (SMS) receives the order. SMS will then ship the order via overnight air transportation.
DSLO License: To order a DSLO license, specify the program number, feature number 9901 for asset registration, and the feature number for graduated one-time charge or graduated monthly license charge that corresponds to the processor group containing the designated machine.
CA-Top Secret for VSE/ESA (5686-A05)
DSLO Graduated Monthly Processor License Charge Group Feature Number
18 0130 20 0131 25 0132 28 0133 29 0134 30 0135 31 0136 32 0137 35 0138 38 0139 40 0140 50 0141 60 0142 70 0143 80 0144
Multiple Operating System -- PR/SM (TM) (MOSP): For a graduated one-time charge or graduated monthly licence charge, specify the feature number, corresponding to the group that contains the designated machine.
CA-Top Secret for VSE/ESA (5686-A05)
MOSP DSLO Graduated Monthly Processor License Charge Group Feature Number
18 0151 20 0152 25 0153 28 0154 29 0155 30 0156 31 0157 32 0158 35 0159 38 0160 40 0161 50 0162 60 0163 70 0164 80 0165
Ordering a DSLO feature will result in IBM maintaining a record of this customer location as a DSLO user only. All material for the DSLO license will be provided through the basic license location. If a user selects DSLO, no other feature numbers are valid for this order and no program materials or updates will be shipped.
Licensed Documentation: There will be no licensed documentation available for this product.
Ordering Online Library Collections: In the United States, order a single update or an ongoing SLSS subscription of online library collections through normal publication ordering channels using the order number of the collection. Call the IBM toll-free number, 800-879-2755, use PUBORDER on IBMLink (TM), or contact an IBM representative, or an IBM Business Partner. Or, send an order form to IBM by fax, Internet, IBM Mail Exchange or direct mail as follows:
- Fax: 800-445-9269
- E-mail: email@example.com
- IBM Mail Exchange: usib6flp at ibmmail
- Direct mail:
P.O. Box 29570
Raleigh, NC 27626-0570
To order collections for a specific country, do one of the following:
- Access the Publications Direct Catalog on the World Wide Web at:
- Access the DIAL IBM PUBS application (registered customers or IBM
business partners only).
- Send a note to the IBM BOOKSHOP service at one of the following:
- E-mail: firstname.lastname@example.org
- IBM Mail Exchange: dkibmbsh at ibmmail
- Access PUBORDER on the IBMLink application, either directly or through the World Wide Web at:
- Contact an IBM representative or an IBM Business Partner
- Fax: 914-432-9405
- E-mail: email@example.com
- World Wide Web:
- IBM Mail Exchange: usib6tc9 at ibmmail
For announcements of updated collections, select your country at:
To get a price comparison of hardcopy on a collection, choose "Country Selection" at:
Licensing: IBM Customer Agreement
Indexed Monthly License Charge (IMLC) Applies: No
Installation License or Location License Applies: No
Usage Restriction Applies: No
Educational Allowance: Yes, to qualified education customers.
Volume Discount: Not applicable
Version-To-Version Upgrade Credits Apply: Yes
Single Replaced Program(s) Replacement Program(s) Version Program Program Program Program Charging Number Name Number Name Applies
5686-072 Alert for Top Secret for VSE/ESA Yes VSE
5686-079 Alert for Top Secret for VSE/ESA Yes CICS-VSE
5686-A05 Top Secret To a follow-on, if any Yes for VSE/ESA
Licensed Program Materials Availability
- Restricted Materials of IBM: None
- Non-Restricted Source Materials: Some
- Object Code Only (OCO): Some
Publication that identifies OCO components: SC33-7974 Availability Date: June 25, 1999
Testing Period: Two Months (Basic License only)
Support Center applies: Yes
Access is available through the IBM Support Center
Available until discontinued: 12 months' written notice
IBM provides Level 1 service for CA-Top Secret for VSE/ESA, Version 1 Release 3. Level 2 service will be provided by Computer Associates International, Inc.
Services for DSLO Licenses: Provided through Basic License location
Support Line: S/390 (R)
The charges provided in this announcement are suggested retail prices for the U.S. only and are provided for your information only. Dealer prices may vary, and prices may also vary by country. Prices are subject to change without notice. For additional information and current prices, contact your local IBM representative.
Program Number 5686-A05 (CA-Top Secret for VSE/ESA)
Basic Monthly DSLO Monthly Group License Charge License Charge
18 $ 79 $ 59 20 115 86 25 149 112 28 204 153 29 265 199 30 344 258 31 423 317 32 541 406 35 622 467 38 715 536 40 822 617 50 1,030 773 60 1,290 968 70 1,615 1,210 80 2,020 1,515
Program Number 5686-A05 (CA-Top Secret for VSE/ESA)
MOSP Basic MOSP DSLO Graduated Monthly Graduated Monthly Group License Charge License Charge
18 $ 79 $ 59 20 97 73 25 132 99 28 177 133 29 235 176 30 305 229 31 384 288 32 482 362 35 582 437 38 669 502 40 769 577 50 926 695 60 1,160 870 70 1,455 1,090 80 1,820 1,365
One-Time Charge Entry End User/390 Entry Support License: $1,262
Entry Support License One-Time Charge: One-time charge authorizes use only on IBM Entry End User/390 Machines.
To order, contact the IBM North America Sales Centers, your local IBM representative, or your IBM Business Partner.
IBM North America Sales Centers, our national direct marketing organization, can add your name to the mailing list for catalogs of IBM products.
Phone: 800-IBM-CALL Fax: 800-2IBM-FAX Internet: firstname.lastname@example.org Mail: IBM North America Sales Centers Dept. LE010 P.O. Box 2690 Atlanta, GA 30301-2690 Reference: LE010
To identify your local IBM Business Partner or IBM representative, call 800-IBM-4YOU.
Note: Shipments will begin after the planned availability date.
MVS, PR/SM, PR/SM, and IBMLink are trademarks of International Business Machines Corporation in the United States or other countries or both. CICS, BookManager, System/390, and S/390 are registered trademarks of International Business Machines Corporation in the United States or other countries or both. Other company, product, and service names may be trademarks or service marks of others. CA-Top Secret and CA90s are registered trademarks of Computer Associates International, Inc.