IBM Sterling Secure Proxy V6.0.1 and IBM Secure External Authentication Server V6.0.1 deliver certified containers and strengthen capabilities for virus and malware protection

IBM Europe Software Announcement ZP20-0071
January 28, 2020

Table of contents
OverviewOverviewPublicationsPublications
Key requirementsKey requirementsTechnical informationTechnical information
Planned availability datePlanned availability dateOrdering informationOrdering information
DescriptionDescriptionTerms and conditionsTerms and conditions
Product positioningProduct positioningPricesPrices
Program numberProgram numberAnnouncement countriesAnnouncement countries


At a glance

Top rule

IBM® Sterling Secure Proxy V6.0.1 and IBM Secure External Authentication Server V6.0.1 deliver new features and enhancements:

  • Improved protection against external threats through virus and malware scanning that is executed in the DMZ subnetwork, outside of the trusted zone
  • Advanced IP address monitoring by enabling connection to third-party providers to enable validation of IP addresses from suspect sources
  • Support for certified containers, qualified on Red Hat® OpenShift® Platform, for deployment flexibility across hybrid cloud environments
  • Easily view availability status of Secure External Authentication Server instances from the Sterling Control Center web console


Back to topBack to top

Overview

Top rule

Sterling Secure Proxy V6.0.1 and Secure External Authentication Server V6.0.1 deliver features and enhancements that improve security for your organization's managed file transfer (MFT) file exchanges and provide containers to simplify hybrid cloud deployments.

Inflight, dynamic virus and malware scanning. This new feature enables organizations to configure Sterling Secure Proxy to use ICAP server protocols to scan incoming files over SFTP protocol for viruses and malware before files are allowed to enter the enterprise trusted zone. A new user interface for ICAP server configuration facilitates basic security setup and supports advanced scanning settings, such as maximum file size, file type, and connection retry limits. File management capabilities also include the ability to redirect large files to improve performance.

Certified containers. Take advantage of certified containers to simplify deployment of Sterling Secure Proxy and Secure External Authentication Server on hybrid cloud infrastructures. Sterling Secure Proxy certified containers are built to Kubernetes standards and qualified on the Red Hat OpenShift Container Platform.

Certified containers are also available for other B2B Collaboration offerings:

  • IBM Sterling B2B Integrator
  • IBM Sterling File Gateway
  • IBM Sterling Connect:Direct®
  • IBM Transformation Extender

Monitor availability status of Secure External Authentication Server. Sterling Control Center users can monitor Sterling Secure Proxy and its defined adapters through the web console UI. In version 6.0.1, users can now also view the status of Secure External Authentication Server instances and monitor instance availability from the web console.

Advanced IP address monitoring and validation. Sterling Secure Proxy provides the capability to connect to third-party sources that can be used to identify trusted and untrusted IP address sources, and to deny trusted zone access to suspect connections. Security administrators use provided pre-authorization and post-authentication user exits to connect to external services, validate IP sources, and if necessary, block connections from suspect sources, such as connections from specific countries or regions.



Back to topBack to top

Key requirements

Top rule

Sterling Secure Proxy runs on multiple operating systems, including IBM AIX®, Red Hat Linux®, HP-UX, Solaris, and Microsoft Windows. For the latest system requirements, see the Software Products Compatibility Reports website. Select Detailed system requirements and search for Sterling Secure Proxy.

Sterling Secure Proxy containers, built to Kubernetes standards, are validated on Red Hat OpenShift Container Platform 3.11. Separate purchase of Red Hat OpenShift Container Platform 3.11 is required. The electronic downloads for Sterling Secure Proxy containers do not include Red Hat OpenShift.

Secure External Authentication Server is an optional, separately installed component for the following business-to-business (B2B) and managed file transfer (MFT) offerings: Sterling Secure Proxy, Sterling B2B Integrator, Sterling File Gateway, and Sterling Connect:Direct.



Back to topBack to top

Planned availability date

Top rule

January 31, 2020

Availability of programs with encryption algorithm in France is subject to French government approval.



Back to topBack to top

Description

Top rule

Sterling Secure Proxy is an integral component of IBM managed file transfer solutions. Companies all over the world rely on IBM managed file transfer (MFT) offerings to drive their mission-critical business processes. Data security, access management, and perimeter security are key considerations when moving data inside and outside of the organization.

Sterling Secure Proxy, a DMZ-based application software proxy, enables use of security features and high-speed MFT file exchanges at the network edge for trusted B2B transactions. It provides increased perimeter security to help protect the enterprise's trusted zone, as well as authentication services to help prevent unauthorized access to business-critical internal systems. It integrates with the existing security infrastructure to help organizations meet security and audit requirements while also supporting efforts to meet compliance regulations and to incorporate industry standards and best practices.

Secure External Authentication Server, an optional separately installed component, provides advanced authentication and validation services for B2B and MFT offerings. Secure External Authentication Server supports a flexible configuration to meet a variety of certificate validation and user authentication and authorization needs.

For more information about Sterling Secure Proxy and other Sterling B2B integration software, see:

Accessibility by people with disabilities

Accessibility Compliance Reports (previously known as a VPAT) containing details on accessibility compliance to standards, including the Worldwide Consortium Web Content Accessibility Guidelines, European Standard EN 301 349, and US Section 508, can be found on the IBM Accessibility Conformance Report Request website.



Back to topBack to top

Product positioning

Top rule

Sterling Secure Proxy belongs to the Sterling B2B Collaboration portfolio, which is part of IBM Sterling. Sterling B2B Collaboration solutions improve the management and information exchange across business-to-business (B2B) relationships, including managed file transfer (MFT) and B2B integration offerings. For more information, see IBM Sterling products website.



Back to topBack to top

Reference information

Top rule

For information about IBM Secure Proxy, see Software Announcement ZP19-0127, dated February 12, 2019.

For earlier product announcement information, use the IBM Offering Information website to search for product announcements.



Back to topBack to top

Program number

Top rule

Program number VRM Program name
5725-D03 V6.0.1 IBM Sterling Secure Proxy


Back to topBack to top

Education support

Top rule

IBM training provides education to support many IBM offerings. Descriptions of courses for IT professionals and managers can be found on the IBM Training and Skills website. Search for Sterling Secure Proxy.

Contact your IBM representative for course information.



Back to topBack to top

Offering Information

Top rule

Product information is available on the IBM Offering Information website.

More information is also available on the Passport Advantage® and Passport Advantage Express® website.



Back to topBack to top

Publications

Top rule

Documentation for Sterling Secure Proxy can be accessed in IBM Knowledge Center.

Documentation for Secure External Authentication Server can be accessed in IBM Knowledge Center.

Version 6.0.1 documentation is available on the planned availability date.



Back to topBack to top

Services

Top rule

Global Technology Services

Contact your IBM representative for the list of selected services available in your country, either as standard or customized offerings for the efficient installation, implementation, or integration of this product.



Back to topBack to top

Technical information

Top rule

Specified operating environment

Hardware requirements

For Sterling Secure Proxy, find system requirement information by searching for Sterling Secure Proxy on the Software Product Compatibility Reports page.

For Secure External Authentication Server, find system requirement information by searching for External Authentication Server on the Software Product Compatibility Reports page.

Software requirements

For Sterling Secure Proxy, find system requirement information by searching for Sterling Secure Proxy on the Software Product Compatibility Reports page.

For Secure External Authentication Server, find system requirement information by searching for External Authentication Server on the Software Product Compatibility Reports page.

Companion products

Sterling Secure Proxy provides critical edge security capabilities for the B2B and managed file transfer (MFT) solutions in the Sterling B2B Collaboration portfolio. Sterling Secure Proxy supports and can be sold with any of the following MFT and B2B products:

  • Sterling B2B Integrator
  • Sterling Connect:Direct (all platforms, including IBM z/OS®)
  • Sterling File Gateway
  • Sterling Connect: Express
  • Sterling Control Center
IBM Support

IBM Support is your gateway to technical support tools and resources that are designed to help you save time and simplify support. IBM Support can help you find answers to questions, download fixes, troubleshoot, submit and track problem cases, and build skills. Learn and stay informed about the transformation of IBM Support, including new tools, new processes, and new capabilities, by going to the IBM Support Insider.

Planning information

Information resources for planning your container installation and deployment are included in IBM Knowledge Center, IBM Support, and Software Product Compatibility Reports.

Container images are distributed to entitled users through IBM Passport Advantage. Product maintenance distributions are available through Fix Central.

Sterling Secure Proxy container distributions use the same technical support terms as the base, noncontainer distributions. Support terms may vary by product and version. For details, see IBM Support Software Lifecycle.

Packaging

This offering is delivered through the internet as an electronic download. There is no physical media.

Noncontainer distributions for Sterling Secure Proxy V6.0.1 and Secure External Authentication Server V6.0.1 are available as traditional e-images. Container and noncontainer distributions are available to entitled users through IBM Passport Advantage.

Certified containers, built on Kubernetes standards and validated on Red Hat OpenShift Container Platform, require separate purchase of Red Hat OpenShift Container Platform. Container distributions are available for the following Sterling B2B Collaboration offerings. For details, see Ordering information.

  • Sterling Secure Proxy V6.0.1
  • Sterling B2B Integrator V6.0
  • Sterling B2B File Gateway V6.0
  • Sterling Connect:Direct V6.0
  • Transformation Extender V10.0


Back to topBack to top

Ordering information

Top rule

For ordering information, consult your IBM representative or IBM Business Partner, or go to the Passport Advantage website.

This product is only available through Passport Advantage. It is not available as shrinkwrap.

These products may only be sold directly by IBM or by IBM Business Partners.

To locate IBM Business Partners in your geography, see the Find a Business Partner page.


Passport Advantage

IBM Sterling Secure Proxy (5725-D03)

Part number description Part number
IBM Sterling Secure Proxy for Red Hat OpenShift Virtual Processor Core License + SW Subscription & Support 12 Months D27F7LL
IBM Sterling Secure Proxy for Red Hat OpenShift Virtual Processor Core SW Subscription & Support Reinstatement 12 Months D27F8LL
IBM Sterling Secure Proxy for Red Hat OpenShift Virtual Processor Core Annual SW Subscription & Support Renewal E0QURLL
IBM Sterling Secure Proxy for Red Hat OpenShift Virtual Processor Core Monthly License D27F6LL
IBM Sterling Secure Proxy for Red Hat OpenShift Virtual Processor Core Initial Fixed Term License + SW Subscription & Support 12 Months D27F9LL
IBM Sterling Secure Proxy for Red Hat OpenShift Virtual Processor Core Subsequent Fixed Term License + SW Subscription & Support 12 Months E0QUSLL
Part number description Part number
IBM Sterling Secure Proxy Non-Production for Red Hat OpenShift Virtual Processor Core License + SW Subscription & Support 12 Months D27FCLL
IBM Sterling Secure Proxy Non-Production for Red Hat OpenShift Virtual Processor Core SW Subscription & Support Reinstatement 12 Months D27FDLL
IBM Sterling Secure Proxy Non-Production for Red Hat OpenShift Virtual Processor Core Annual SW Subscription & Support Renewal E0QUULL
IBM Sterling Secure Proxy Non-Production for Red Hat OpenShift Virtual Processor Core Monthly License D27FBLL
IBM Sterling Secure Proxy Non-Production for Red Hat OpenShift Virtual Processor Core Initial Fixed Term License + SW Subscription & Support 12 Months D27FALL
IBM Sterling Secure Proxy Non-Production for Red Hat OpenShift Virtual Processor Core Subsequent Fixed Term License + SW Subscription & Support 12 Months E0QUTLL

Charge metric

The charge metrics for this licensed product can be found in the following License Information documents:

Program identifier License Information document title License Information document number
5725-D03 IBM Sterling Secure Proxy V6.0.1 L-BCHE-BJQHHK

Select your language of choice and scroll down to the Charge Metrics section. Follow-on releases, if any, may have updated terms. See the License Information documents website for more information.



Back to topBack to top

Terms and conditions

Top rule

The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the IBM International Program License Agreement, IBM International Passport Advantage Agreement, and the IBM Agreement for Acquisition of Software Maintenance.

This product is only available through Passport Advantage.

Licensing

IBM International Program License Agreement including the License Information document and Proof of Entitlement (PoE) govern your use of the program. PoEs are required for all authorized use. Part number products only, offered outside of Passport Advantage, where applicable, are license only and do not include Software Maintenance.

This software license includes Software Subscription and Support (also referred to as Software Maintenance).

Software Maintenance

Licenses under the IBM International Program License Agreement (IPLA) provide for support with ongoing access to releases and versions of the program. IBM includes one year of Software Subscription and Support (also referred to as Software Maintenance) with the initial license acquisition of each program acquired. The initial period of Software Subscription and Support can be extended by the purchase of a renewal option, if available. Two charges apply: a one-time license charge for use of the program and an annual renewable charge for the enhanced support that includes telephone assistance (voice support for defects during normal business hours), as well as access to updates, releases, and versions of the program as long as support is in effect.

License Information number

The following License Information document applies to the offering in this announcement:

Program identifier License Information document title License Information document number
5725-D03 IBM Sterling Secure Proxy V6.0.1 L-BCHE-BJQHHK

Follow-on releases, if any, may have updated terms. See the License Information documents website for more information.

Limited warranty applies

Yes

Limited warranty

IBM warrants that when the program is used in the specified operating environment, it will conform to its specifications. The warranty applies only to the unmodified portion of the program. IBM does not warrant uninterrupted or error-free operation of the program or that IBM will correct all program defects. You are responsible for the results obtained from the use of the program.

IBM provides you with access to IBM databases containing information on known program defects, defect corrections, restrictions, and bypasses at no additional charge. For further information, see the IBM Support Guide.

IBM will maintain this information for at least one year after the original licensee acquires the program (warranty period).

Program technical support

Technical support of a program product version or release will be available for a minimum of five years from the general availability date, as long as your Software Subscription and Support (also referred to as Software Maintenance) is in effect.

This technical support allows you to obtain assistance (by telephone or electronic means) from IBM for product-specific, task-oriented questions regarding the installation and operation of the program product. Software Subscription and Support (Software Maintenance) also provides you with access to updates (modifications or fixes), releases, and versions of the program. You will be notified, through an announcement letter, of discontinuance of support with 12 months' notice.

If you require additional technical support from IBM, including an extension of support beyond the discontinuance date, contact your IBM representative or IBM Business Partner. This extension may be available for a fee.

For additional information on the IBM Software Support Lifecycle Policy, see the IBM Software Support Lifecycle Policy website.

Money-back guarantee

If for any reason you are dissatisfied with the program and you are the original licensee, you may obtain a refund of the amount you paid for it, if within 30 days of your invoice date you return the program and its PoE to the party from whom you obtained it. If you downloaded the program, you may contact the party from whom you acquired it for instructions on how to obtain the refund.

For clarification, note that (1) for programs acquired under the IBM International Passport Advantage offering, this term applies only to your first acquisition of the program and (2) for programs acquired under any of IBM's On/Off Capacity on Demand (On/Off CoD) software offerings, this term does not apply since these offerings apply to programs already acquired and in use by you.

Volume orders (IVO)

No

Passport Advantage applies

Yes, information is available on the Passport Advantage and Passport Advantage Express website.

Software Subscription and Support applies

Yes. Software Subscription and Support, also referred to as Software Maintenance, is included with licenses purchased through Passport Advantage and Passport Advantage Express. Product upgrades and Technical Support are provided by the Software Subscription and Support offering as described in the Agreements. Product upgrades provide the latest versions and releases to entitled software, and Technical Support provides voice and electronic access to IBM support organizations, worldwide.

IBM includes one year of Software Subscription and Support with each program license acquired. The initial period of Software Subscription and Support can be extended by the purchase of a renewal option, if available.

While your Software Subscription and Support is in effect, IBM provides you assistance for your routine, short duration installation and usage (how-to) questions, and code-related questions. IBM provides assistance by telephone and, if available, electronic access, only to your information systems (IS) technical support personnel during the normal business hours (published prime shift hours) of your IBM support center. (This assistance is not available to your users.) IBM provides Severity 1 assistance 24 hours a day, 7 days a week. For additional details, see the IBM Support Guide. Software Subscription and Support does not include assistance for the design and development of applications, your use of programs in other than their specified operating environment, or failures caused by products for which IBM is not responsible under the applicable agreements.

Unless specified otherwise in a written agreement with you, IBM does not provide support for third-party products that were not provided by IBM. Ensure that when contacting IBM for covered support, you follow problem determination and other instructions that IBM provides, including in the IBM Support Guide.

For additional information about the International Passport Advantage Agreement and the IBM International Passport Advantage Express Agreement, go to the Passport Advantage and Passport Advantage Express website.

Variable charges apply

No

Educational allowance available

Education allowance does not apply. Education software allowance does not apply. Special education prices are available for qualified clients through Passport Advantage.



Back to topBack to top

Statement of good security practices

Top rule

IT system security involves protecting systems and information through intrusion prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a regulatory compliant, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective.

Important: IBM does not warrant that any systems, products, or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.



Back to topBack to top

Prices

Top rule

For all local charges, contact your local IBM representative or IBM Business Partner.


Business Partner information

If you are an IBM Business Partner acquiring products from IBM, you may link to Passport Advantage Online for resellers where you can obtain Business Partner pricing information. An IBMid and password are required to access the IBM Passport Advantage or IBM PartnerWorld® website.


Passport Advantage

For Passport Advantage information and charges, contact your IBM representative or IBM Business Partner for Channel Value Rewards. Additional information is also available on the Passport Advantage and Passport Advantage Express website.

IBM Global Financing

IBM Global Financing offers competitive financing to credit-qualified clients to assist them in acquiring IT solutions. Offerings include financing for IT acquisition, including hardware, software, and services, from both IBM and other manufacturers or vendors. Offerings (for all client segments: small, medium, and large enterprise), rates, terms, and availability can vary by country. Contact your local IBM Global Financing organization or go to the IBM Global Financing website for more information.

IBM Global Financing offerings are provided through IBM Credit LLC in the United States, and other IBM subsidiaries and divisions worldwide to qualified commercial and government clients. Rates are based on a client's credit rating, financing terms, offering type, equipment type, and options, and may vary by country. Other restrictions may apply. Rates and offerings are subject to change, extension, or withdrawal without notice.

Financing from IBM Global Financing helps you preserve cash and credit lines, enables more technology acquisition within current budget limits, can help accelerate implementation of economically attractive new technologies, offers payment and term flexibility, and can help match project costs to projected benefits. Financing is available worldwide for credit-qualified clients.



Back to topBack to top

Announcement countries

Top rule

All European, Middle Eastern, and African countries, except Islamic Republic of Iran, Sudan, and Syrian Arab Republic.

Trademarks

IBM, AIX, z/OS, Express, Global Technology Services, PartnerWorld and Passport Advantage are registered trademarks of IBM Corporation in the United States, other countries, or both.

Red Hat and OpenShift are registered trademarks of Red Hat Inc. in the U.S. and other countries.

Connect:Direct is a registered trademark of IBM International Group B.V., an IBM Company in the U.S. and other countries.

Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Reference to other products in this announcement does not necessarily imply those products are announced, or intend to be announced, in your country. Additional terms of use are located at

Terms of use

For the most current information regarding IBM products, consult your IBM representative or reseller, or go to the IBM worldwide contacts page

IBM Directory of worldwide contacts