IBM Security zSecure Suite V2.4 provides tracking of changes to approved change requests, enhanced file integrity monitoring, further pervasive encryption support, and strengthened compliance checking for ACF2, IMS, Db2, and z/OS UNIX

IBM United States Software Announcement 219-370
July 23, 2019

Table of contents
OverviewOverviewTechnical informationTechnical information
Key requirementsKey requirementsOrdering informationOrdering information
Planned availability datePlanned availability dateTerms and conditionsTerms and conditions
DescriptionDescriptionPricesPrices
Program numberProgram numberOrder nowOrder now
PublicationsPublications


At a glance

Top rule

IBM® Security zSecure Suite V2.4 improvements can help your organization:

  • Strengthen your enterprise security position to better demonstrate compliance with regulations
  • Automate and enhance near real-time security intelligence analytics and alerts
  • Deliver digital trust with identity governance to help organizations understand, control, and make business decisions that are related to user access and access risks
  • Increase security of cloud and mobile applications
  • Use the inherent security advantages offered by mainframes (including pervasive encryption) for enhanced data protection


Back to topBack to top

Overview

Top rule

IBM Security zSecure Suite consists of products for security administration, auditing, and compliance. Security solution packages that contain several of those components are also available.

IBM Security zSecure Suite V2.4 delivers the following features and support:

  • Support for new functionality provided in IBM z/OS® V2.4, specifically, support of enhancements in Resource Access Control Facility (RACF®), JES2, and IBM WebSphere® Application Server
  • Support for stronger checksum algorithms for monitoring file integrity
  • Additional support for pervasive encryption
  • Enhanced compliance checking capabilities, with a focus on the zSecure Audit Compliance Framework and the Security Technical Implementation Guides (STIGs) standards
  • Enhanced tracking of changes to approved change requests

Version 2.4 features and support apply to the following selected security solution components and packages:

  • IBM Security zSecure CICS® Toolkit enables RACF administration from a CICS environment.
  • IBM Security zSecure Administration is a solution package that consists of zSecure Admin and zSecure Visual. zSecure Admin provides efficient and effective RACF administration. zSecure Visual provides a Microsoft™ Windows™-based user interface for RACF administration.
  • IBM Security zSecure Audit and Compliance is a solution package that consists of zSecure Audit, zSecure Alert, and zSecure Command Verifier. zSecure Audit provides vulnerability analysis for the mainframe infrastructure and enables analyzing and reporting on security events and detecting security exposures. zSecure Alert provides a near real-time event monitor that can send out alerts in various ways. zSecure Command Verifier helps enforce compliance by preventing erroneous security commands.
  • IBM Security zSecure Audit and Administration is a solution package that consists of the zSecure Administration and zSecure Audit and Compliance solution packages.
  • IBM Security zSecure Adapters for SIEM provides a subset of the functionality of zSecure Audit for the express purpose of feeding enriched security events into a security information and event management (SIEM) solution, such as IBM QRadar® SIEM or Micro Focus Security ArcSight.

Enhancements and support that are specific to selected zSecure offerings:

  • All zSecure products support RACF.
  • zSecure Audit, zSecure Alert, and zSecure Adapters for SIEM support CA-ACF2.
  • zSecure Audit and zSecure Adapters for SIEM support CA-Top Secret.
  • zSecure CICS Toolkit runs under CICS; the other components run on z/OS
  • All components benefit from the z/OS V2.4 support enhancements.
  • The capability to track changes back to approved change requests is part of zSecure Admin. This function is strengthened further by zSecure Command Verifier.
  • The zSecure Audit Compliance Framework and file integrity monitoring are parts of zSecure Audit.


Back to topBack to top

Key requirements

Top rule

A supported IBM Z® server that is capable of supporting IBM z/OS V2.2, or later.



Back to topBack to top

Planned availability date

Top rule

September 30, 2019



Back to topBack to top

Description

Top rule

In support of new functionality that is provided in z/OS V2.4, IBM Security zSecure Suite V2.4 delivers the following:

  • Support for enhanced security and data protection. These enhancements are designed to improve management of access and privileges in RACF. Clients can extend the RACF schema to store security-relevant information within the RACF database, where existing reporting tools and programming interfaces can be used to manage and retrieve the data.
  • Support for new JES2 functions.
  • Support for IBM WebSphere Application Server enhancements, specifically, protection for new JSON Web Token support.
  • Reporting capability on the new Restricted Use Common Storage Areas.
  • Support for the TLS V1.3 protocol, in support of the System SSL component of z/OS Cryptographic Services and the Application Transparent TLS (AT-TLS) function of z/OS Communications Server.
  • Support for IBM z/OS Container Extensions. This enhancement is designed to help users run Linux® on IBM Z Docker container in z/OS, alongside existing z/OS applications and data.

Compliance enhancements include:

  • Support for the Security Technical Implementation Guides (STIGs) is enhanced with new compliance controls for ACF2.
  • A new report type ACF2_SENSRESOURCE_ACCESS is provided for general resources, parallel to the existing ACF2_SENSDSN_ACCESS report type.
  • It is now possible to have selection on a UNIX® path name resolve symlinks and variables; this is also used in control automation.
  • New IMS reporting is available to display Information Management System Open Transaction Manager Access settings and make them available for use in compliance controls.
  • The zSecure Audit Compliance Framework and its user interface feature new modifications. The AU.R (Rule-based) auditing menu supersedes the functionality of the AU.C (Change track) menu, which has been removed.

Change tracking enhancements include:

  • Capability to help ensure that issued security commands can be related to approved changed requests.
  • A new started task zSecure Admin Command Logger (CKXLOG) provides an option to log all RACF commands that are issued through the zSecure interface in a central repository (z/OS log stream). The records of the commands can be annotated with a change ticket number and a ticket description. The zSecure Admin ISPF interface and zSecure Command Verifier can send the commands to the zSecure Admin Command Logger.
  • A new menu Command Review (CR) is available in the zSecure Admin ISPF interface. Option CR.2 (CKXLOG) enables you to review and rerun commands in the command execution log. Option CR.1 (Libraries) enables you to work with RACF commands in PDS members and route them to systems where you want them deployed.
  • The zSecure Admin ISPF interface can be configured to require entering ticket information when issuing commands. This function is available for zSecure V2.3.1 through APARs OA56705, OA56718, and OA56801.

Additional enhancements and support include:

  • Various enhancements in support of pervasive encryption are provided in connection to ICSF and Db2®. Db2 authid privileges that are configured through ZPARMs are consolidated into the Db2 access control list displays.
  • Data set checksums that are calculated by zSecure Collect can now use the SHA-2 and SHA-3 algorithms (the latter requires a z14). A new DSN_MEMBER report type is designed to ease reporting on member level information (including checksums). A new menu RE.F is provided for file integrity monitoring.
  • The zSecure CICS Toolkit VERIFY API is extended for pass phrases. This function is available for releases V2.3 and V2.3.1 through APAR OA57272.
  • A new menu option CO.L is provided to work with the last issued CARLa query.

Accessibility by people with disabilities

A US Section 508 Accessibility Compliance Report containing details on accessibility compliance can be found on the Product accessibility information website.

Value Unit-based pricing

Value Unit pricing for eligible IBM z Systems® IBM International Program License Agreement (IPLA) programs enables a lower cost of incremental growth and enterprise aggregation. Each z Systems® IPLA product with Value Unit pricing has a single price per Value Unit and a conversion matrix, called Value Unit Exhibit, for converting from some designated measurement to Value Units. Most commonly, Millions of Service Units (MSUs) is the measurement designated by IBM to be converted to Value Units. Some other measurements are engines or messages. Since MSUs are the most common measurement, that measurement will be used for the remainder of this description.

Value Unit pricing offers price benefits for you. For each z Systems IPLA program with Value Unit pricing, the quantity of that program needed to satisfy applicable IBM terms and conditions is referred to as the required license capacity. Each of the various Value Unit Exhibits stipulate that the larger your required license capacity, the fewer Value Units per MSU you will need. Value Unit Exhibits are uniquely identified by a three digit code and referred to using the nomenclature VUExxx, where xxx is the three digit code.

Subsequent acquisitions of Value Unit priced programs offer additional price benefits. The quantity of each z Systems IPLA program that you have acquired is referred to as entitled license capacity. If you wish to grow your entitled license capacity for a z Systems IPLA program, the calculation to determine additional needed Value Units is based upon the number of Value Units already acquired.

For each z Systems IPLA program with Value Unit pricing, you should:

  • Determine the required license capacity, in MSUs.
  • Aggregate the MSUs across the enterprise.
  • Convert the total MSUs to Value Units, using the applicable Value Unit Exhibit.
  • Multiply the price per Value Unit by the total number of Value Units to determine the total cost.

To simplify conversion from the designated measurement to Value Units or vice-versa, use the Value Unit Converter Tool. For additional information or to obtain a copy of the Value Unit Converter Tool, visit the Value Unit Converter Tool, go to the IBM System z® Software Pricing website.

Note that Value Units of a given product cannot be exchanged, interchanged, or aggregated with Value Units of another product.

To determine the required license capacity for the z Systems IPLA program you selected, see the Terms and conditions section.



Back to topBack to top

Reference information

Top rule

For more information about IBM Security zSecure, see Software Announcement 218-349, dated July 17, 2018.



Back to topBack to top

Business Partner information

Top rule

If you are a Direct Reseller - System Reseller acquiring products from IBM, you may link directly to Business Partner information for this announcement. A PartnerWorld® ID and password are required (use IBMid).

BP Attachment for Announcement Letter 219-370


Back to topBack to top

Program number

Top rule

Program name VRM Program number
IBM Security zSecure Admin 2.4.0 5655-N16
IBM Security zSecure Audit 2.4.0 5655-N17
IBM Security zSecure CICS Toolkit 2.4.0 5655-N18
IBM Security zSecure Command Verifier 2.4.0 5655-N19
IBM Security zSecure Visual 2.4.0 5655-N20
IBM Security zSecure Alert 2.4.0 5655-N21
IBM Security zSecure Adapters for SIEM 2.4.0 5655-AD8
IBM Security zSecure Administration 2.4.0 5655-N23
IBM Security zSecure Compliance and Auditing 2.4.0 5655-N24
IBM Security zSecure Compliance and Administration 2.4.0 5655-N25

IBM Security zSecure suite

Program PID number Subscription and Support PID number
5655-N16 5655-T03
5655-N17 5655-T04
5655-N18 5655-T06
5655-N19 5655-T08
5655-N20 5655-T10
5655-N21 5655-T12
5655-AD8 5655-AD9

IBM Security zSecure Compliance, Auditing, and Administration solutions

Program PID number Subscription and Support PID number
5655-N23 5655-SE4
5655-N24 5655-SE5
5655-N25 5655-SE6



Back to topBack to top

Offering Information

Top rule

Product information is available on the IBM Offering Information website.



Back to topBack to top

Publications

Top rule

Technical documentation can be found in IBM Knowledge Center.



Back to topBack to top

Services

Top rule

Software Services

IBM Software Services has the breadth, depth, and reach to manage your services needs. You can leverage the deep technical skills of the lab-based software services team and the business consulting, project management, and infrastructure expertise of the IBM Global Services team. Also, IBM extends the reach of IBM Software Services through IBM Business Partners to provide an extensive portfolio of capabilities. IBM provides the global reach, intellectual capital, industry insight, and technology leadership to support a wide range of critical business needs.

To learn more about IBM Software Services, contact your Lab Services Sales or Delivery Leader.



Back to topBack to top

Technical information

Top rule

Specified operating environment

Hardware requirements

A supported IBM Z server capable of supporting IBM z/OS V2.2, or later.

Software requirements

IBM Security zSecure Suite V2.4 and the IBM Security zSecure Compliance and Administration V2.4, IBM Security zSecure Compliance and Auditing V2.4, and IBM Security zSecure Administration V2.4 solutions are supported in the following environments:

  • IBM z/OS V2.2
  • IBM z/OS V2.3
  • IBM z/OS V2.4

zSecure offerings that include features for CA ACF2 and CA Top Secret support CA ACF2 R16 and CA Top Secret R16.

Such information is provided subject to the following terms. IT system security involves protecting systems and information through prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated, or misused, or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service, or security measure can be completely effective in preventing improper use or access. IBM systems, products, and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective.

Important: IBM does not warrant that any systems, products, or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

The IBM Support Community

The IBM Support Community is your gateway to technical support tools and resources that are designed to help you save time and simplify support. Support Community tools can help you find answers to questions, download fixes, troubleshoot, automate data collection, submit and track problems, and build skills.

You can also access the Service requests and PMRs tool for more support.

Planning information

Packaging

This offering is delivered through the internet as an electronic download. There is no physical media.



Back to topBack to top

Ordering information

Top rule

Consult your IBM representative.


Value Unit exhibit VUE020

Level Minimum Maximum Value Units/MSU
Base 1 3 1
Tier A 4 45 0.15
Tier B 46 175 0.08
Tier C 176 315 0.04
Tier D 316 + 0.03

Charge metric

The charge metrics for these licensed products can be found in the following License Information documents:

Program name PID VRM LI number
IBM Security zSecure Admin 5655-N16 2.4.0 L-RSTR-B4YCKK
IBM Security zSecure Audit 5655-N17 2.4.0 L-RSTR-B4YCDM
IBM Security zSecure CICS Toolkit 5655-N18 2.4.0 L-RSTR-B4YCJN
IBM Security zSecure Command Verifier 5655-N19 2.4.0 L-RSTR-B4YCC7
IBM Security zSecure Visual 5655-N20 2.4.0 L-RSTR-B4YCLG
IBM Security zSecure Alert 5655-N21 2.4.0 L-RSTR-B4YC75
IBM Security zSecure Administration 5655-N23 2.4.0 L-RSTR-B4YCM7
IBM Security zSecure Compliance and Auditing 5655-N24 2.4.0 L-RSTR-B4YCB5
IBM Security zSecure Compliance and Administration 5655-N25 2.4.0 L-RSTR-B4YC9L
IBM Security zSecure Adapters for SIEM 5655-AD8 2.4.0 L-RSTR-B4YA2N

Select your language of choice and scroll down to the Charge Metrics section. Follow-on releases, if any, may have updated terms. See the License Information documents website for more information.

Basic license


On/Off CoD

IBM Security zSecure is eligible for On/Off CoD with a temporary use charge calculated that is based on MSUs per-day usage.


Subscription and Support

To receive voice technical support via telephone and future releases and versions at no additional charge, Subscription and Support must be ordered. The capacity of Subscription and Support (Value Units) must be the same as the capacity ordered for the product licenses.

To order, specify the Subscription and Support program number (PID) referenced above and the appropriate license or charge option.

IBM is also providing Subscription and Support for these products via a separately purchased offering under the terms of the IBM International Agreement for Acquisition of Software Maintenance. This offering:

  • Includes and extends the support services provided in the base support to include technical support via telephone.
  • Entitles you to future releases and versions, at no additional charge. Note that you are not entitled to new products.

When Subscription and Support is ordered, the charges will automatically renew annually unless canceled by you.

The combined effect of the IPLA license and the Agreement for Acquisition of Software Maintenance gives you rights and support services comparable to those under the traditional ICA S/390® and z Systems license or its equivalent. To ensure that you continue to enjoy the level of support you are used to in the ICA business model, you must order both the license for the program and the support for the selected programs at the same Value Unit quantities.

Customized Offerings

Product deliverables are shipped only through CBPDO and ServerPac. These customized offerings are offered for internet delivery. For more details on internet delivery, go to the Help section on the Shopz website.

IBM recommends internet delivery. However, if you still require physical media, you can choose DVD.

Many products can be ordered in ServerPac the month following their availability in CBPDO. z/OS can be ordered through CBPDO and ServerPac at general availability. Many products will also be orderable in a Product ServerPac without also having to order the z/OS operating system or subsystem.

Shopz and CFSW will determine the eligibility based on product requisite checking. For more details on the Product ServerPac, go to the Help section on the Shopz website.

Production of software product orders will begin on the planned general availability date.

  • CBPDO shipments will begin one week after general availability.
  • ServerPac shipments will begin four weeks after general availability.



Back to topBack to top

Terms and conditions

Top rule

The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the IBM International Program License Agreement, IBM International Passport Advantage® Agreement, and the IBM Agreement for Acquisition of Software Maintenance.

Licensing

IBM International Program License Agreement including the License Information document and Proof of Entitlement (PoE) govern your use of the program. PoEs are required for all authorized use.

Software Maintenance

The following agreement applies for Software Subscription and Support (Software Maintenance) and does not require client signatures:

  • IBM Agreement for Acquisition of Software Maintenance (Z125-6011)

These programs are licensed under the IBM International Program License Agreement (IPLA) and the associated Agreement for Acquisition of Software Maintenance, which provide for support with ongoing access to releases and versions of the program. These programs have a one-time license charge for use of the program and an annual renewable charge for the enhanced support that includes telephone assistance (voice support for defects during normal business hours), as well as access to updates, releases, and versions of the program as long as support is in effect. IBM Operational Support Services - SoftwareXcel is an option if you desire added services.

License Information number

The following License Information documents apply to the offerings in this announcement:

Program name PID VRM LI number
IBM Security zSecure Admin 5655-N16 2.4.0 L-RSTR-B4YCKK
IBM Security zSecure Audit 5655-N17 2.4.0 L-RSTR-B4YCDM
IBM Security zSecure CICS Toolkit 5655-N18 2.4.0 L-RSTR-B4YCJN
IBM Security zSecure Command Verifier 5655-N19 2.4.0 L-RSTR-B4YCC7
IBM Security zSecure Visual 5655-N20 2.4.0 L-RSTR-B4YCLG
IBM Security zSecure Alert 5655-N21 2.4.0 L-RSTR-B4YC75
IBM Security zSecure Administration 5655-N23 2.4.0 L-RSTR-B4YCM7
IBM Security zSecure Compliance and Auditing 5655-N24 2.4.0 L-RSTR-B4YCB5
IBM Security zSecure Compliance and Administration 5655-N25 2.4.0 L-RSTR-B4YC9L
IBM Security zSecure Adapters for SIEM 5655-AD8 2.4.0 L-RSTR-B4YA2N

Follow-on releases, if any, may have updated terms. See the License Information documents website for more information.

Limited warranty applies

Yes

Limited warranty

IBM warrants that when the program is used in the specified operating environment, it will conform to its specifications. The warranty applies only to the unmodified portion of the program. IBM does not warrant uninterrupted or error-free operation of the program or that IBM will correct all program defects. You are responsible for the results obtained from the use of the program.

IBM provides you with access to IBM databases containing information about known program defects, defect corrections, restrictions, and bypasses at no additional charge. For further information, see the IBM Support Guide.

IBM will maintain this information for at least one year after the original licensee acquires the program (warranty period).

Program technical support

Technical support of a program product version or release will be available for a minimum of three years from the general availability date, as long as your Software Subscription and Support (also referred to as Software Maintenance) is in effect.

This technical support allows you to obtain assistance (by telephone or electronic means) from IBM for product-specific, task-oriented questions regarding the installation and operation of the program product. Software Subscription and Support (Software Maintenance) also provides you with access to updates (modifications or fixes), releases, and versions of the program. You will be notified, through an announcement letter, of discontinuance of support with 12 months' notice. If you require additional technical support from IBM, including an extension of support beyond the discontinuance date, contact your IBM representative or IBM Business Partner. This extension may be available for a fee.

For additional information about the IBM Software Support Lifecycle Policy, see the IBM Software Support Lifecycle Policy website.

Money-back guarantee

If for any reason you are dissatisfied with the program and you are the original licensee, you may obtain a refund of the amount you paid for it, if within 30 days of your invoice date you return the program and its PoE to the party from whom you obtained it. If you downloaded the program, you may contact the party from whom you acquired it for instructions on how to obtain the refund.

For clarification, note that for programs acquired under any of IBM's On/Off Capacity on Demand (On/Off CoD) software offerings, this term does not apply since these offerings apply to programs already acquired and in use by you.

Volume orders (IVO)

No

Passport Advantage applies

No

Software Subscription and Support applies

Yes. During the Software Subscription and Support period, for the unmodified portion of a program, and to the extent problems can be recreated in the specified operating environment, IBM will provide the following:

  • Defect correction information, a restriction, or a bypass.
  • Program updates: Periodic releases of collections of code corrections, fixes, functional enhancements and new versions and releases to the program and documentation.
  • Technical assistance: A reasonable amount of remote assistance by telephone or electronically to address suspected program defects. Technical assistance is available from the IBM support center in the organization's geography.

Additional details regarding Technical Assistance, which includes IBM contact information, are provided in the IBM Support Guide.

Software Subscription and Support does not include assistance for:

  • The design and development of applications.
  • Your use of programs in other than their specified operating environment.
  • Failures caused by products for which IBM is not responsible under the IBM Agreement for Acquisition of Software Maintenance.

Software Subscription and Support is provided only if the program is within its support timeframe as specified in the Software Support Lifecycle policy for the program.

For operating system software, the revised IBM Operational Support Services - SoftwareXcel offering will provide support for those operating systems and associated products that are not available with the Software Subscription and Support (Software Maintenance) offering.

This will ensure total support coverage for your enterprise needs, including IBM and selected non-IBM products. For complete lists of products supported under both the current and revised offering, go to the Supported product list website.

IBM Operational Support Services - SoftwareXcel

No

Variable charges apply

No

Educational allowance available

Yes. A 15% education allowance applies to qualified education institution clients.

Multi-Version Measurement

Multi-Version Measurement (MVM) replaces the previously announced Migration Grace Period time limit of six months and allows unlimited time for clients to run more than one eligible version of a software program. Clients may run multiple versions of a program simultaneously for an unlimited duration during a program version upgrade. Clients may also choose to run multiple versions of a program simultaneously for an unlimited duration in a production environment. MVM does not extend support dates for programs withdrawn from service.

For more information about MVM, including requirements for qualification, see the MVM web page. For a list of eligible programs, see the IPLA Execution-Based web page.

Sub-capacity terms and conditions

For each z Systems IPLA program with Value Unit pricing, the quantity of that program needed to satisfy applicable IBM terms and conditions is referred to as the required license capacity. Your required license capacity is based upon the following factors:

  • The z Systems IPLA program you select
  • The applicable Value Unit Exhibit
  • The applicable terms
  • Whether your current mainframes are full capacity or sub-capacity

For more information about the Value Unit Exhibit for the z Systems IPLA program you selected, see the Ordering information section.

Full-capacity mainframes

In cases where full capacity is applicable, the following terms apply.

Execution-based, z/OS-based, full-machine-based: The required capacity of a z Systems IPLA program with these terms equals the MSU-rated capacity of the machines where the z Systems IPLA program executes.

For more information about mainframe MSU-rated capacities, go to the IBM Z Software Contracts website.

Reference-based: The required license capacity of a z Systems IPLA program with these terms equals the license capacity of the applicable monthly license charge (MLC) program. This MLC program is called the parent program.

Sub-capacity mainframes

In cases where sub-capacity is applicable, the following terms apply.

Execution-based: The required capacity of a z Systems IPLA sub-capacity program with these terms equals the capacity of the LPARs where the z Systems IPLA program executes.

z/OS-based: The required license capacity of a z Systems IPLA program with these terms equals the license capacity of z/OS on the machines where the z Systems IPLA program executes.

Reference-based: The required license capacity of a z Systems IPLA program with these terms equals the license capacity of the applicable monthly license charge (MLC) program. This MLC program is called the parent program.

Full-machine-based: The required license capacity of a z Systems IPLA program with full machine based terms equals the MSU-rated capacity of the machines where the z Systems IPLA program executes.

For more information about mainframe MSU-rated capacities, see the The IBM z Systems Machines Exhibit, Z125-3901, or visit the Mainframes section of the z Systems Exhibits website.

For additional information for products with reference-based terms, z Systems IPLA sub-capacity programs with reference-based terms adds value to the parent program across the environment, regardless of where in the environment the z Systems IPLA program executes.

An environment is defined as either a single or stand-alone machine or a qualified Parallel Sysplex®. You may have one or more different environments across the enterprise. To determine the required license capacity for each z Systems IPLA program with referenced-based terms, each environment should be assessed separately.

When a z Systems IPLA sub-capacity program with reference-based terms is used in a qualified Parallel Sysplex environment, the required license capacity of the z Systems IPLA program must equal with the license capacity of the parent program across the Parallel Sysplex. Qualified Parallel Sysplex refers to one where MLC pricing is aggregated across the sysplex.

Sub-capacity eligibility

To be eligible for sub-capacity charging on select z Systems IPLA programs, you must first implement and comply with all terms of either sub-capacity Workload License Charges (WLC) or sub-capacity Entry Workload License Charges (EWLC). To implement sub-capacity WLC or EWLC, a machine must be z Systems (or equivalent). On that machine:

  • All instances of the OS/390® operating system must be migrated to the z/OS operating systems.
  • Any licenses for the OS/390 operating system must be discontinued.
  • All instances of the z/OS operating systems must be running in z/Architecture® (64-bit) mode.

For that machine, you must create and submit a Sub-Capacity Report to IBM each month. Sub-Capacity Reports must be generated using the Sub-Capacity Reporting Tool (SCRT). For additional information or to obtain a copy of SCRT, go to the IBM Z Software Pricing website.

You must comply with all of the terms of the WLC or EWLC offering, whichever is applicable:

  • The complete terms and conditions of sub-capacity WLC are defined in the IBM Customer Agreement - Attachment for z Systems Workload License Charges (Z125-6516).
  • The complete terms and conditions for sub-capacity EWLC are defined in the IBM Customer Agreement - Attachment for EWLC, TWLC, zELC, and z/OS.e License Charges (Z125-6587).

Additionally, you must sign and comply with the terms and conditions specified in the amendment to the IPLA contract - Amendment for Amendment for IBM z Systems Programs Sub-Capacity Pricing (Z125-6929). Once the amendment is signed, the terms in the amendment replace any and all previous z Systems IPLA sub-capacity terms and conditions.

Sub-capacity terms and conditions

IBM Getting Started Sub-capacity Pricing for z/OS IPLA Software applies.

On/Off CoD

To be eligible for On/Off CoD pricing, you must be enabled for temporary capacity on the corresponding hardware, and the required contract, Attachment for IBM z Systems On/Off Capacity on Demand (Z125-7883) must be signed prior to use.



Back to topBack to top

Statement of good security practices

Top rule

IT system security involves protecting systems and information through intrusion prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a regulatory compliant, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective.

Important: IBM does not warrant that any systems, products, or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.



Back to topBack to top

Prices

Top rule

Registered external customers and IBM Business Partners can access IBMLink to view pricing information.

Specify "Price type," "Search type," and "Search value," then click "Search."

Note: Enter program number in the "Search value."

You can also contact your local IBM representative or IBM Business Partner for the applicable charges.



Back to topBack to top

Order now

Top rule

To order, contact the IBM Digital Sales Center, your local IBM representative, or your IBM Business Partner. To identify your local IBM representative or IBM Business Partner, call 800-IBM-4YOU (426-4968). For more information, contact the IBM Digital Sales Center.

Phone: 800-IBM-CALL (426-2255)

Fax: 800-2IBM-FAX (242-6329)

For IBM representative: askibm@ca.ibm.com

For IBM Business Partner: pwcs@us.ibm.com

IBM Digital Sales Offices
1177 S Belt Line Rd
Coppell, TX 75019-4642, US

The IBM Digital Sales Center, our national direct marketing organization, can add your name to the mailing list for catalogs of IBM products.

Note: Shipments will begin after the planned availability date.

Trademarks

IBM, z/OS, RACF, WebSphere, CICS, QRadar, IBM Z, PartnerWorld, Passport Advantage, Db2, IBM z Systems, z Systems, System z, S/390, Parallel Sysplex, OS/390 and z/Architecture are registered trademarks of IBM Corporation in the United States, other countries, or both.

Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both.

Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.

UNIX is a registered trademark of The Open Group in the United States and other countries.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Additional terms of use are located at

Terms of use

For the most current information regarding IBM products, consult your IBM representative or reseller, or go to the IBM worldwide contacts page

IBM United States