IBM Security Access Manager V9.0.2 adds mobile, multi-factor authentication for stronger and more usable authentication

IBM United States Software Announcement 216-410
November 8, 2016

Table of contents
OverviewOverviewProgram numberProgram number
Key prerequisitesKey prerequisitesPublicationsPublications
Planned availability datePlanned availability dateTechnical informationTechnical information
DescriptionDescriptionOrdering informationOrdering information
Product positioningProduct positioningTerms and conditionsTerms and conditions
Statement of general directionStatement of general directionPricesPrices


Top rule
At a glance
Bottom rule

IBM® Security Access Manager V9.0.2 adds mobile, multi-factor authentication to help:

  • Organizations deliver superior user authentication experiences that increase both security and usability.
  • Unify the authentication experience across digital web, mobile, and cloud channels by leveraging mobile devices.
  • Allow mobile application developers to easily add intelligent, risk-based access controls and flexible authentication mechanisms to their applications.
  • Utilize a publicly available, ready-built mobile application as a second factor for user authentication.
  • Implement transaction signing to comply with emerging regulations that are aimed at reducing financial fraud.
  • Provide additional mechanisms for step-up authentication when elevated risks of user compromise are detected by integrated risk engines.


Back to topBack to top

Top rule
Overview
Bottom rule

In the face of today's large scale data breaches where passwords are compromised, organizations and regulators need ways to tighten security controls. Conversely, users are accustomed to immediate, easy, and mobile digital experiences. This makes them resistant to any time-consuming processes. Fortunately, this apparent mismatch can be resolved by combining intelligent, risk-based access technology and mobile devices to deliver stronger, easier-to-use authentication.

The Access Manager platform adds new, mobile multi-factor authentication capabilities with the IBM Verify application. IBM Verify works with Access Manager to provide mobile, second-factor authentication for web logins or financial transactions. With IBM Verify, after a log-in attempt or transaction, a push notification is sent to the users' mobile device. The push notification lets them tap once to allow or deny the access. Users can also be promoted to provide a higher level of authentication by using the TouchID fingerprint identification option.

For organizations that build their own mobile applications the flexibility, usability, and assurance of the IBM Verify application can be built into custom applications by using a software development kit (SDK).

Access Manager 9.0.2 helps organizations take back control of their access management system by managing access across many common scenarios with a single solution. Access Manager is an integrated, modular access appliance that combines web application protection, web reverse proxy, context-based access control, and identity federation to help secure web, mobile, and cloud workloads.

Available as either a virtual or hardware-based appliance, Access Manager helps secure access points into the corporate network and enforce context-based access policies that define who and what can access protected resources. Scalable and configurable, the solution is designed to provide a policy-based user authentication and authorization system that helps defend against the latest web-based security threats.

Access Manager V9.0.2 key capabilities provide:

  • IBM Verify mobile application for authentication
  • SDK for integration authentication into custom mobile applications
  • Scalable, reverse proxy for user access control and web single sign-on
  • Seamless, federated sign-on to externally hosted applications; business partner applications; and quick connectors to popular cloud applications
  • Centralized policy server for access management across resources
  • Integrated, web application protection (web application firewall)
  • Flexible, multi-factor authentication service
  • Mobile application administration and self-service
  • Compliance reporting and security intelligence integration with IBM Security QRadar® SIEM
  • Rich, context-based authorization by using a built-in, risk-scoring engine


Back to topBack to top

Top rule
Key prerequisites
Bottom rule

Access Manager is a virtual appliance that runs on a number of popular hypervisors executing on x86 servers and cloud platforms.

Refer to the Hardware requirements and Software requirements sections for more detail.



Back to topBack to top

Top rule
Planned availability date
Bottom rule
  • November 11, 2016: IBM Security Access Manager Virtual Edition V9.0.2
  • February 1, 2017: IBM Security Access Manager Appliance V9.0.2


Back to topBack to top

Top rule
Description
Bottom rule

Access Manager V9.0.2 is a modular, integrated access management appliance that helps secure access to web, mobile, and cloud workloads. The integrated appliance form factor allows for easier and more flexible deployment and maintenance. It is offered both as a physical appliance and as a virtual appliance image that runs on a number of popular hypervisors and cloud platforms.

Access Manager is structured as a base appliance with two optional add-on modules. All required code is included with the base appliance. Clients enable add-on module functionality by entering the appropriate activation keys. This gives users the flexibility to more easily support many usage scenarios while minimizing the additional software required.

Access Manager helps centrally secure internal and external user access points into the corporate network from web and mobile channels. Scalable and configurable, the solution is designed to provide a policy-based, user authentication and authorization system that helps defend against the latest, web-based security threats.

Web applications are often subject to repeated attacks by external and internal attackers who want to acquire valuable content. According to the Open Web Application Security Project (OWASP) top 10 list of web vulnerabilities, external hackers use Structured Query Language (SQL) injections, broken authentication, and cross-site scripting (XSS) as common methods to gain unauthorized access into the web applications.

By utilizing research from the IBM X-Force® threat research team, Access Manager delivers the ability to help block OWASP top 10 web vulnerabilities before they reach the targeted application.

Access Manager key capabilities include:

  • Integrated access management with a web reverse proxy for user access policy enforcement and single sign-on(SSO)
  • Built-in, Layer 7 load balancing and distributed session cache to provide shared session management across multiple appliances and application instances
  • Compliance reporting and security intelligence integration with IBM Security QRadar SIEM
  • Coarse-grained, website-based authorization
  • Improved blocking of known in-line and preventable OWASP top 10 web vulnerabilities

Access Manager Advanced Access Control module

According to the IBM X-Force Security and Risk trend report, attackers use phishing attacks and social engineering to compromise user access to gain unauthorized access into corporate applications. Identity fraud and BYOD are growing concerns for enterprises, as they expand their web application reach into mobile, business partner, and social collaborations.

In the face of these challenges, it is important to bring increased intelligence to authentication and authorization. The Advanced Access Control Module allows Access Manager to use detailed contextual information (for example, geographic location, device fingerprint, browser type, application data, and so forth) about the user making the access request when making access decisions.

After performing the risk assessment that is based on context, Advanced Access Control then delivers the ability to utilize a range of multi-factor authentication mechanisms that are dependent on the context. Users can be prompted to use the IBM Verify mobile application to confirm their identity with a simple "Yes, I'm trying to login" or "No, this is not me" click. If greater security is warranted, users can be asked to provide their fingerprint using Apple TouchID.

Advanced Access Control module key capabilities include:

  • Risk scoring engine to enforce context-aware authorization by using information about the users, their mobile devices, and other transactions-based information
  • Mobile multi-factor authentication by utilizing the IBM Verify mobile application or custom-developed mobile applications that are developed by using the IBM Mobile Authentication SDK
  • Mobile sign-on, session management, and an authentication service for supporting multiple strong authentication schemes, for example, mobile confirmation, Apple TouchID, soft token one-time passwords by using the IBM Verify application or sent through Short Message Service (SMS) or email
  • Help to provide more secure mobile transactions with transaction signing and a graded level of trust to allow and deny access using mobile device fingerprinting, geographic location awareness, and IP reputation
  • Integration with the IBM MobileFirst™ Platform and IBM MaaS360® Enterprise Mobility Management to allow mobile application developers to easily incorporate access security
  • Integration with IBM Security Trusteer® Fraud Protection lets Access Manager use device fraud and malware indicators to make access decisions
  • A graphical policy management interface that supports authoring complex policies

Access Manager Federation module

Collaboration between organizations is a central tenant of business. Users from collaborating organizations often require secure access to each other's applications. Additionally, internal users increasingly need access to externally hosted services that include cloud-based and business partner applications.

Federated access helps enable these scenarios by delivering a secure, seamless sign-on experience to external applications. This helps to eliminate the need for providing multiple user IDs and passwords. This may lead to gains in user productivity, user experience, and reductions in administration cost. Users authenticate once, and then obtain access to federated applications and services inside and outside their network infrastructure.

The Federation Module accelerates the adoption of third-party enterprise software-as-a-service (SaaS) applications within an organization by enabling easy-to-install connectors to popular applications. By using these connectors, organizations can rapidly give users access to an application without creating an additional set of logins. This also increases security and visibility by linking users' enterprise identity to the identity at the third-party application provider.

Access Manager Federation module key capabilities include:

  • Federated SSO for users across multiple applications
  • Support for SAML 2.0 and Open ID Connect protocols for federated access
  • Pre-integrated federation quick connectors to popular cloud applications

Accessibility by people with disabilities

A US Section 508 Voluntary Product Accessibility Template (VPAT) containing details on accessibility compliance can be found on the IBM Accessibility website.



Back to topBack to top

Top rule
Product positioning
Bottom rule

Access Manager V9.0.2 is delivered as an integrated access appliance, in both virtual and hardware form factors, and sold in a modular fashion. The offering is designed to strengthen an organization's web and mobile security posture with integrated access, application protection, identity federation and mobile multi-factor authentication capabilities. Access Manager helps organizations safeguard mobile, cloud, and social interactions, and protect web applications from unauthorized and fraudulent access.



Back to topBack to top

Top rule
Statement of general direction
Bottom rule

In a future release, IBM intends to add biometric authentication capability into the IBM Security Access Manager platform. Biometric authentication capability can allow users to use a picture of their face or recording of their voice to authenticate. The capability will be supported in the IBM Verify application and the native mobile application SDK.

IBM's statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM's sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remain at our sole discretion.



Back to topBack to top

Top rule
Reference information
Bottom rule

For information about IBM Security Access Manager V9.0, refer to Software Announcement 215-191, dated October 13, 2015.



Back to topBack to top

Top rule
Availability of national languages
Bottom rule
Description Availability date Language
IBM Security Access Manager V9.0.2 November 11, 2016 Brazilian Portuguese, Chinese Simplified, Chinese Traditional, Czech, English, French, German, Hungarian, Italian, Japanese, Korean, Polish, Russian, Spanish

Translation information, if available, can be found at the Translation Reports website.



Back to topBack to top

Top rule
Program number
Bottom rule
Program number VRM Program name
5725-V89 Not applicable IBM Security Access Manager Appliance
5725-V90 9.0.2 IBM Security Access Manager Virtual Edition


Back to topBack to top

Top rule
Education support
Bottom rule

IBM training provides education to support many IBM offerings. Descriptions of courses for IT professionals and managers can be found on IBM Training and Skills.

Call IBM training at 800-IBM-TEACH (426-8322) for catalogs, schedules, and enrollments.



Back to topBack to top

Top rule
Offering Information
Bottom rule

Product information is available on the IBM Offering Information website.

More information is also available on the Passport Advantage® and Passport Advantage Express® website.



Back to topBack to top

Top rule
Publications
Bottom rule

A hardcopy publication of Access Manager Hardware Appliance Quick Start Guide is shipped with the product and is available in English, French, and Japanese languages.

Softcopy publications of Access Manager V9.0.2 Quick Start Guides are available in English, French, and Japanese languages and can also be downloaded, at electronic availability, from IBM Knowledge Center.



Back to topBack to top

Top rule
Services
Bottom rule

Software Services

IBM Software Services has the breadth, depth, and reach to manage your services needs. You can leverage the deep technical skills of our lab-based, software services team and the business consulting, project management, and infrastructure expertise of our IBM Global Services team. Also, we extend our IBM Software Services reach through IBM Business Partners to provide an extensive portfolio of capabilities. Together, we provide the global reach, intellectual capital, industry insight, and technology leadership to support a wide range of critical business needs.

To learn more about IBM Software Services, contact your Lab Services Sales or Delivery Leader.



Back to topBack to top

Top rule
Technical information
Bottom rule

Specified operating environment

Hardware requirements

IBM Security Access Manager is a virtual appliance that runs on x86 servers. The virtual appliance requires at least 100GB virtual disk space and 4GB of virtual memory.

For additional information, refer to the Detailed system requirements for a specific product site. Enter "IBM Security Access Manager" as the product name. Select the desired version level and submit.

Software requirements

IBM Security Access Manager runs on a number of popular hypervisors and cloud platforms that include:

  • VMware
  • KVM
  • Citrix XenServer
  • Amazon Web Services

For additional information, refer to the Detailed system requirements for a specific product site. Enter "IBM Security Access Manager" as the product name. Select the desired version level and submit.

The program's specifications and specified operating environment information may be found in documentation accompanying the program, if available, such as a readme file, or other information published by IBM, such as an announcement letter. Documentation and other program content may be supplied only in the English language.

IBM Electronic Support

The IBM Support Portal is your gateway to technical support. This includes IBM Electronic Support tools and resources, for software and hardware, to help save time and simplify support. The Electronic Support tools can help you find answers to questions, download fixes, troubleshoot, automate data collection, submit and track problems through the Service Request online tool, and build skills. All these tools are made available through your IBM support agreement. Read about the Electronic Support portfolio of tools on the IBM Electronic Support website.

You can also access the IBM Support Portal page and the online Service requests and PMRs tool for more support.

Planning information

Packaging

The products in this announcement are distributed with:

  • International Program License Agreement (Z125-3301)
  • License Information document
  • Publications (refer to the Publications section)

This program, when downloaded from a website, contains the applicable IBM license agreement and License Information, if appropriate, and will be presented for acceptance at the time of installation of the program. For future reference, the license and License Information will be stored in a directory such as LICENSE.TXT.



Back to topBack to top

Top rule
Ordering information
Bottom rule

This product is only available through Passport Advantage. It is not available as shrinkwrap.

These products may only be sold directly by IBM or by authorized IBM Business Partners for Software Value Plus.

More information can be found on the IBM Software Value Plus website.

To locate IBM Business Partners for Software Value Plus in your geography for a specific Software Value Plus portfolio, go to the Find a Business Partner page.

Product group: Security

Product: IBM Security Access Manager Appliance (5725-V89)

Product: IBM Security Access Manager Virtual Appliance (5725-V90)

Product category: Access Manager


Passport Advantage

The ordering information is unchanged from the previous releases. Refer to the Ordering information section in Software Announcements 216-197, dated May 3, 2016, and 215-191, dated October 13, 2015.


Cross-platform product for use on z Systems™

The ordering information is unchanged from the previous releases. Refer to the ordering information in Software Announcement 216-025, dated January 26, 2016.

Charge metric

Program name PID number Charge metric
IBM Security Access Manager Appliance 5725-V89 Appliance Install
IBM Security Access Manager Appliance Non-production 5725-V89 Appliance Install
IBM Security Access Manager Appliance Advanced Access Control Module AOSW 5725-V89 Install
IBM Security Access Manager Appliance Advanced Access Control Module Non-production AOSW 5725-V89 Install
IBM Security Access Manager Appliance Federation Module AOSW 5725-V89 Install
IBM Security Access Manager Appliance Federation Module Non-production AOSW 5725-V89 Install
IBM Security Access Manager Virtual Edition 5725-V90 Processor Value Unit, User Value Unit
Security Access Manager Virtual Edition Non-production 5725-V90 Processor Value Unit
Security Access Manager Virtual Edition Advanced Access Control Module AOS 5725-V90 Processor Value Unit, User Value Unit
Security Access Manager Virtual Edition Advanced Access Control Module Non-production AOS 5725-V90 Processor Value Unit
Security Access Manager Virtual Edition Federation Module AOS 5725-V90 Processor Value Unit, User Value Unit
Security Access Manager Virtual Edition Federation Module Non-production AOS 5725-V90 Processor Value Unit

The Users for the purposes of UVU calculation are the sum of all Internal Users, External Users, and Infrequent Users given access to the Program or whose access is managed by the Program.

  • An Internal User is a unique person that is given access to the Program or whose access is managed by the Program and is an employee of the Licensee or a contractor performing work on behalf of the Licensee. Each Internal User equals one User for the purpose of calculating User Value Units.
  • An External User is a unique person that is given access to the Program or whose access is managed by the Program and is not an employee of the Licensee or a contractor performing work on behalf of the Licensee. A ratio of fifteen External Users equals one User for the purpose of calculating User Value Units.
  • An Infrequent Internal User is an Internal User who accesses the Program or whose access is managed by the Program less than five times a year. A ratio of fifteen Infrequent Internal Users equals one User for the purpose of calculating User Value Units.
  • Each Internal, External and Infrequent Internal User must be trackable and auditable.

Users who no longer have access to the Program and whose access is no longer managed by the Program, but whose identities are retained in the user registry for archival and audit purposes, are not counted for purposes of UVU calculation. User identities must be trackable and auditable.

The further guidance below clarifies the counting of external users with regard to our service provider customers:

If the Licensee is a Service Provider as defined in the International Passport Advantage or the International Passport Advantage Express Agreement, the UVU calculation must be based upon the following:

  • For each end user customer of the Service Provider, an Internal User is a unique person that is given access to the Program or whose access is managed by the Program through or as part of the Service Provider's information technology service, and is an employee of the end user customer or a contractor performing work on behalf of the end user customer. Each Internal User equals one User for the purpose of calculating User Value Units.
  • For each end user customer of the Service Provider, an External User is a unique person that is given access to the Program or whose access is managed by the Program through or as part of the Service Provider's information technology service, and is not an employee of the end user customer or a contractor performing work on behalf of the end user customer. A ratio of fifteen External Users equals one User for the purpose of calculating User Value Units.
  • For each end user customer of the Service Provider, an Infrequent Internal User is an Internal User that is given access to the Program or whose access is managed by the Program through or as part of the Service Provider's information technology service less than five times per year. A ratio of fifteen Infrequent Internal Users equals one User for the purpose of calculating User Value Units.
  • For each end user customer of the Service Provider, each Internal, External and Infrequent Internal User must be trackable and auditable.


User Value Unit (UVU)

UVU is a unit of measure by which the program can be licensed. UVU Proofs of Entitlement (PoEs) are based on the number and type of users for the given program. Licensee must obtain sufficient entitlements for the number of UVUs required for licensee's environment as specified in the program specific table. The UVU entitlements are specific to the program and type of user and may not be exchanged, interchanged, or aggregated with UVU entitlements of another program or type of user. Refer to the program specific UVU table.


Install

Install is a unit of measure by which the program can be licensed. An install is an installed copy of the program on a physical or virtual disk made available to be executed on a computer. Licensee must obtain an entitlement for each install of the program.


Appliance Install

Appliance Install is a unit of measure by which the program can be licensed An Appliance Install is an installed copy of the program that is included on a single unit of supporting hardware. Licensee must obtain an entitlement for each Appliance Install of the program.


Processor Value Unit (PVU)

PVU is a unit of measure by which the program can be licensed. The number of PVU entitlements required is based on the processor technology (defined within the PVU table by processor value, brand, type, and model number at the website below) and the number of processors made available to the program. IBM continues to define a processor, for the purpose of PVU-based licensing, to be each processor core on a chip (socket). A dual-core processor chip, for example, has two processor cores. The PVU table can be found on the PVU licensing for Distributed Software page. Licensee can deploy the program using either full capacity licensing or virtualization capacity (sub-capacity) licensing according to the Passport Advantage Sub-Capacity Licensing Terms found on the Virtualization Capacity License Counting Rules page. If using full capacity licensing, licensee must obtain PVU entitlements sufficient to cover all activated processor cores* in the physical hardware environment made available to or managed by the program, except for those servers from which the program has been permanently removed. If using virtualization capacity licensing, licensee must obtain entitlements sufficient to cover all activated processor cores made available to or managed by the program, as defined according to the Virtualization Capacity License Counting Rules that can be found on the Virtualization Capacity License Counting Rules page.

* An activated processor core is a processor core that is available for use in a physical or virtual server, regardless of whether the capacity of the processor core can be or is limited through virtualization technologies, operating system commands, BIOS settings, or similar restrictions.

Notes

  • Some programs may require licenses for the program and what is being managed. In that case, the following applies. In addition to the entitlements required for the program directly, licensee must obtain PVU entitlements for this program sufficient to cover the processor cores managed by the program.
  • Some programs may be licensed on a managed basis only. In that case, the following applies. Instead of the entitlements required for the program directly, licensee must obtain PVU entitlements for this program sufficient to cover the processor cores managed by the program.
  • A few programs on an exception basis may be licensed on a referenced basis. In that case, the following applies. Rather than obtaining entitlements for the activated processor cores available to the program, licensee must obtain PVU entitlements for this program sufficient to cover the environment made available to the referenced program as if the program itself were executing everywhere the referenced program was executing, independent of the basis on which the referenced program is licensed.



Back to topBack to top

Top rule
Terms and conditions
Bottom rule

The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the IBM International Program License Agreement, IBM International Passport Advantage Agreement, and the IBM Agreement for Acquisition of Software Maintenance.

This product is only available through Passport Advantage.

Licensing

IBM International Program License Agreement including the License Information document and Proof of Entitlement (PoE) govern your use of the program. PoEs are required for all authorized use. Part number products only, offered outside of Passport Advantage, where applicable, are license only and do not include Software Maintenance.

This software license includes Software Subscription and Support (also referred to as Software Maintenance).

Agreement for Acquisition of Software Maintenance

These programs are licensed under the IBM Program License Agreement (IPLA) and the associated Agreement for Acquisition of Software Maintenance, which provide for support with ongoing access to releases and versions of the program. IBM includes one year of Software Subscription and Support (also referred to as Software Maintenance) with the initial license acquisition of each program acquired. The initial period of Software Subscription and Support (also referred to as Software Maintenance) can be extended by the purchase of a renewal option, if available. These programs have a one-time license charge for use of the program and an annual renewable charge for the enhanced support that includes telephone assistance (voice support for defects during normal business hours), as well as access to updates, releases, and versions of the program as long as support is in effect.

License Information number

  • L-KCBS-AD6LHA: IBM Security Access Manager V9.0.2 Appliance (5725-V89)
  • L-KCBS-AD6KBX: IBM Security Access Manager V9.0.2 Virtual Edition (5725-V90)

See the License Information documents page on the IBM Software License Agreement website for more information.

Limited warranty applies

Yes

Limited warranty

IBM warrants that when the program is used in the specified operating environment, it will conform to its specifications. The warranty applies only to the unmodified portion of the program. IBM does not warrant uninterrupted or error-free operation of the program or that IBM will correct all program defects. You are responsible for the results obtained from the use of the program.

IBM provides you with access to IBM databases containing information on known program defects, defect corrections, restrictions, and bypasses at no additional charge. For further information, see the IBM Software Support Handbook.

IBM will maintain this information for at least one year after the original licensee acquires the program (warranty period).

Program technical support

Technical support of a program product version or release will be available for a minimum of five years from the general availability date, as long as your Software Subscription and Support (also referred to as Software Maintenance) is in effect.

This technical support allows you to obtain assistance (by telephone or electronic means) from IBM for product-specific, task-oriented questions regarding the installation and operation of the program product. Software Subscription and Support (Software Maintenance) also provides you with access to updates (modifications or fixes), releases, and versions of the program. You will be notified, through an announcement letter, of discontinuance of support with 12 months' notice. If you require additional technical support from IBM, including an extension of support beyond the discontinuance date, contact your IBM representative or IBM Business Partner. This extension may be available for a fee.

Money-back guarantee

If for any reason you are dissatisfied with the program and you are the original licensee, you may obtain a refund of the amount you paid for it, if within 30 days of your invoice date you return the program and its PoE to the party from whom you obtained it. If you downloaded the program, you may contact the party from whom you acquired it for instructions on how to obtain the refund.

For clarification, note that (1) for programs acquired under the IBM International Passport Advantage offering, this term applies only to your first acquisition of the program and (2) for programs acquired under any of IBM's On/Off Capacity on Demand (On/Off CoD) software offerings, this term does not apply since these offerings apply to programs already acquired and in use by you.

Volume orders (IVO)

No

Passport Advantage applies

Yes, information is available on the Passport Advantage and Passport Advantage Express website.

Software Subscription and Support applies

Yes. Software Subscription and Support, also referred to as Software Maintenance, is included with licenses purchased through Passport Advantage and Passport Advantage Express. Product upgrades and Technical Support are provided by the Software Subscription and Support offering as described in the Agreements. Product upgrades provide the latest versions and releases to entitled software, and Technical Support provides voice and electronic access to IBM support organizations, worldwide.

IBM includes one year of Software Subscription and Support with each program license acquired. The initial period of Software Subscription and Support can be extended by the purchase of a renewal option, if available.

While your Software Subscription and Support is in effect, IBM provides you assistance for your routine, short duration installation and usage (how-to) questions, and code-related questions. IBM provides assistance by telephone and, if available, electronic access, only to your information systems (IS) technical support personnel during the normal business hours (published prime shift hours) of your IBM support center. (This assistance is not available to your users.) IBM provides Severity 1 assistance 24 hours a day, 7 days a week. For additional details, see the IBM Software Support Handbook. Software Subscription and Support does not include assistance for the design and development of applications, your use of programs in other than their specified operating environment, or failures caused by products for which IBM is not responsible under the applicable agreements.

Unless specified otherwise in a written agreement with you, IBM does not provide support for third party products that were not provided by IBM. Ensure that when contacting IBM for covered support, you follow problem determination and other instructions that IBM provides, including in the IBM Software Support Handbook.

For additional information about the International Passport Advantage Agreement and the IBM International Passport Advantage Express Agreement, go to the Passport Advantage and Passport Advantage Express website.

System i Software Maintenance applies

No

Variable charges apply

No

Educational allowance available

Not applicable.



Back to topBack to top

Top rule
Statement of good security practices
Bottom rule

IT system security involves protecting systems and information through prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective.

Important: IBM does not warrant that any systems, products, or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.



Back to topBack to top

Top rule
IBM Electronic Services
Bottom rule

Electronic Service Agent™ and the IBM Electronic Support web portal are dedicated to providing fast, exceptional support to organizations that have IBM Systems. The IBM Electronic Service Agent tool is a no-additional-charge tool that proactively monitors and reports hardware events, such as system errors, performance issues, and inventory. The Electronic Service Agent tool can help you stay focused on your company's strategic business initiatives, save time, and spend less effort managing day-to-day IT maintenance issues. Servers enabled with this tool can be monitored remotely around the clock by IBM Support, all at no additional cost to you.

Now integrated into the base operating system of AIX® V5.3, AIX V6.1, and AIX V7.1, Electronic Service Agent is designed to automatically and electronically report system failures and utilization issues to IBM, which can result in faster problem resolution and increased availability. System configuration and inventory information collected by the Electronic Service Agent tool also can be viewed on the secure Electronic Support web portal, and used to improve problem determination and resolution by you and the IBM support team. To access the tool main menu, simply type smitty esa_main, and select Configure Electronic Service Agent. In addition, ESA now includes a powerful web user interface, giving the administrator easy access to status, tool settings, problem information, and filters. For more information and documentation on how to configure and use Electronic Service Agent, go to the IBM Electronic Support website.

The IBM Electronic Support portal is a single Internet entry point that replaces the multiple entry points traditionally used to access IBM Internet services and support. This portal enables you to gain easier access to IBM resources for assistance in resolving technical problems. The My Systems and Premium Search functions make it even easier for organizations that are Electronic Service Agent tool-enabled to track system inventory and find pertinent fixes.

Benefits

Increased uptime: The Electronic Service Agent™ tool is designed to enhance the Warranty or Maintenance Agreement by providing faster hardware error reporting and uploading system information to IBM Support. This can translate to less wasted time monitoring the symptoms, diagnosing the error, and manually calling IBM Support to open a problem record. Its 24 x 7 monitoring and reporting mean human intervention is not required to report errors.

Security: The Electronic Service Agent tool is designed to be secure in monitoring, reporting, and storing the data at IBM. The Electronic Service Agent tool is designed to securely transmit either through the Internet (HTTPS or VPN) or modem to provide organizations a single point of exit from their site. Communication is one way. Activating Electronic Service Agent does not enable IBM to call into an organization's system.

For additional information, go to the IBM Electronic Service Agent website.

More accurate reporting: Because system information and error logs are automatically uploaded to the IBM Support Center in conjunction with the service request, you are not required to find and send system information, decreasing the risk of misreported or misdiagnosed errors. Once inside IBM, problem error data is run through a data knowledge management system and knowledge articles are appended to the problem record.

Customized support: Using the IBM ID entered during activation, you can view system and support information in the My Systems and Premium Search sections of the IBM Electronic Support page.

My Systems provides valuable reports of installed hardware and software using information collected from the systems by Electronic Service Agent. Reports are available for any system associated with your IBM ID. Premium Search combines the function of search and the value of Electronic Service Agent information, providing advanced search of the technical support knowledgebase. Using Premium Search and the Electronic Service Agent information that has been collected from your system, you are able to see search results that apply specifically to your systems.

For more information on how to utilize the power of IBM Electronic Services, contact your IBM Systems Services Representative, or go to the IBM Electronic Support website.



Back to topBack to top

Top rule
Prices
Bottom rule


Business Partner information

If you are an IBM Business Partner -- Distributor for Workstation Software acquiring products from IBM, you may link to Passport Advantage Online for resellers where you can obtain Business Partner pricing information. An IBM ID and password are required to access the IBM Passport Advantage website.


Passport Advantage

For Passport Advantage information and charges, contact your IBM representative or authorized IBM Business Partner for Software Value Plus. Additional information is also available on the Passport Advantage and Passport Advantage Express website.

IBM Global Financing

IBM Global Financing offers competitive financing to credit-qualified customers to assist them in acquiring IT solutions. Offerings include financing for IT acquisition, including hardware, software, and services, from both IBM and other manufacturers or vendors. Offerings (for all customer segments: small, medium, and large enterprise), rates, terms, and availability can vary by country. Contact your local IBM Global Financing organization or go to the IBM Global Financing website for more information.

IBM Global Financing offerings are provided through IBM Credit LLC in the United States, and other IBM subsidiaries and divisions worldwide to qualified commercial and government customers. Rates are based on a customer's credit rating, financing terms, offering type, equipment type, and options, and may vary by country. Other restrictions may apply. Rates and offerings are subject to change, extension, or withdrawal without notice.

Financing from IBM Global Financing helps you preserve cash and credit lines, enables more technology acquisition within current budget limits, permits accelerated implementation of economically attractive new technologies, offers payment and term flexibility, and can help match project costs to projected benefits. Financing is available worldwide for credit-qualified customers.



Back to topBack to top

Top rule
Appliance announcement countries
Bottom rule

The IBM Security Access Manager V9.0.2 appliance products are available in the US and Puerto Rico.

Trademarks

IBM MobileFirst, z Systems and Electronic Service Agent are trademarks of IBM Corporation in the United States, other countries, or both.

IBM, QRadar, PartnerWorld, Passport Advantage, System i, Express, X-Force and AIX are registered trademarks of IBM Corporation in the United States, other countries, or both.

MaaS360 is a registered trademark of Fiberlink Communications Corporation in the U.S. and other countries.

Trusteer is a registered trademark of Trusteer in the U.S. and other countries.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Additional terms of use are located at:

Terms of use

For the most current information regarding IBM products, consult your IBM representative or reseller, or visit the IBM worldwide contacts page

IBM United States