IBM Secure File Transfer 2.0 adds hybrid cloud and lifecycle management capabilities; IBM Sterling Secure Proxy and IBM Sterling External Authentication Server strengthen capabilities for virus and malware protection and support hybrid cloud deployment through certified containers

IBM United States Software Announcement 220-342
September 8, 2020

Table of contents
OverviewOverviewPublicationsPublications
Key requirementsKey requirementsTechnical informationTechnical information
Planned availability datePlanned availability dateOrdering informationOrdering information
DescriptionDescriptionTerms and conditionsTerms and conditions
Product positioningProduct positioningPricesPrices
Program numberProgram numberOrder nowOrder now


At a glance

Top rule

IBM® Secure File Transfer 2.0 expands deployment options and bundled capabilities:

  • Provides increased deployment flexibility with a Secure File Transfer Certified Container Edition
  • Expands core managed file transfer (MFT) capabilities by adding lifecycle management capabilities
  • Provides options to run on Linux® for IBM Z®
  • Improves user experiences with simplified UI interactions and straightforward installation steps

Latest releases of IBM Sterling™ Secure Proxy 6.0 and IBM Sterling Secure External Authentication Server 6.0 deliver new features:

  • Support for certified containers, qualified on Red Hat® OpenShift® Platform, for deployment flexibility across hybrid cloud environments
  • Improved protection against external threats through virus and malware scanning that is executed in the DMZ subnetwork, outside of the trusted zone
  • Can deliver IP blocklisting and advanced monitoring by enabling connection to third-party providers to enable validation of IP addresses from suspect sources
  • Easily view availability status of Sterling™ Secure External Authentication Server instances from the Sterling Control Center web console


Back to topBack to top

Overview

Top rule

Secure File Transfer

Secure File Transfer editions provide a modern file transfer solution designed to evolve with your organization's changing MFT business requirements.

Secure File Transfer component offerings are included in all editions:

  • IBM Sterling File Gateway enables organizations to consolidate virtually all internet-based file transfers on a single, scalable, always-on multiprotocol gateway designed with security in mind.
  • IBM Sterling Connect:Direct® provides highly secure point-to-point file transfers to lessen dependency on unreliable file transfer protocol (FTP) transfers.
  • IBM Sterling Control Center Monitor tracks the critical events across your (business-to-business) B2B and MFT infrastructure for improved operations and customer service.
  • IBM Sterling Control Center Director allows remote lifecycle management and configuration of your Sterling Connect:Direct environment.
  • IBM Sterling Secure Proxy delivers advanced perimeter security technology to help secure your network and data exchanges at the network edge.

Secure File Transfer Container Edition

Secure File Transfer Container Edition is designed for large corporations that are moving along their hybrid cloud journey and are interested in gaining administrative, DevOps, and management improvements by leveraging Kubernetes-based container technology. These organizations have businesses that span time zones, countries, and continents. To manage their file transfer requirements, large organizations rely on multiple file transfer applications from multiple vendors across business units and geographical regions. To support their worldwide operations, large organizations require a consolidated file transfer solution that is reliable, highly secure, automated, and auditable. Secure File Transfer Container Edition offers unrestricted, enterprise grade MFT capabilities, supports all common communication protocols, and provides unlimited file transfer volumes.

Secure File Transfer Premium Edition

Secure File Transfer Premium Edition is designed for large corporations. These organizations have businesses that span time zones, countries, and continents. To manage their file transfer requirements, large organizations rely on multiple file transfer applications from multiple vendors across business units and geographical regions. To support their worldwide operations, large organizations require a consolidated file transfer solution that is reliable, highly secure, automated, and auditable. Secure File Transfer Premium Edition offers unrestricted, enterprise grade MFT capabilities, supports all common communication protocols, and provides unlimited file transfer volumes.

Secure File Transfer Standard Edition

Secure File Transfer Standard Edition is designed for midsize companies with growing data file transfer requirements and diversifying business relationships that span geographical regions. In growing organizations, file transfer products often include a combination of in-house and publicly available, multiple vendor MFT products. These organizations can experience problems associated with the reliability, lack of scalability, and cost of supporting and maintaining multiple, disparate products. Secure File Transfer Standard Edition includes the capabilities provided in Secure File Transfer Essentials Edition, focuses on standardization of MFT protocols, and adds support for additional communication protocols and file transfer volumes.

Secure File Transfer Essentials Edition

Secure File Transfer Essentials Edition is designed for smaller organizations that are starting to research the capabilities of a centralized MFT solution. These organizations may experience challenges with FTP-based file transfer products and are looking at MFT solutions to offer increased reliability, security, and visibility of file transfer exchanges. Secure File Transfer Essentials Edition is an entry-level solution that addresses these common MFT challenges by focusing on FTP remediation.

Sterling Secure Proxy and Secure External Authentication Server

Sterling Secure Proxy 6.0 series and Secure External Authentication Server 6.0 series deliver features and enhancements that improve security for your organization's MFT file exchanges and provide containers to simplify hybrid cloud deployments.

Certified containers . Take advantage of certified containers to simplify deployment of Sterling Secure Proxy and Secure External Authentication Server on hybrid cloud infrastructures. Sterling Secure Proxy certified containers are built to Kubernetes standards and qualified on the Red Hat OpenShift Container Platform.

Certified containers are also available for other Sterling B2B Collaboration offerings:

  • IBM Sterling B2B Integrator
  • Sterling File Gateway
  • Sterling Connect:Direct
  • IBM Transformation Extender

Inflight, dynamic virus and malware scanning. This feature enables organizations to configure Sterling Secure Proxy to use ICAP server protocols to scan incoming files over HTTP and Sterling Connect:Direct protocol for viruses and malware before files are allowed to enter the enterprise trusted zone. A user interface for ICAP server configuration facilitates basic security setup and supports advanced scanning settings, such as maximum file size, file type, and connection retry limits. File management capabilities also include the ability to redirect large files to improve performance.

Monitor availability status of Secure External Authentication Server. Sterling Control Center users can monitor Sterling Secure Proxy and its defined adapters through the web console UI. In 6.0.1, users can now also view the status of Secure External Authentication Server instances and monitor instance availability from the web console.

Advanced IP address monitoring and validation. Sterling Secure Proxy provides the capability to connect to third-party sources that can be used to identify trusted and untrusted IP address sources and to deny trusted zone access to suspect connections. Security administrators use provided pre-authorization and post-authentication user exits to connect to external services, validate IP sources, and if necessary, block connections from suspect sources, such as connections from specific countries or regions.



Back to topBack to top

Key requirements

Top rule

Secure File Transfer

The component products in Secure File Transfer run on common enterprise-grade operating systems that include Linux, multiple UNIX® platforms, Microsoft™ Windows™, and Linux on IBM Z.

For additional information, see the Technical information section.

Sterling Secure Proxy

Sterling Secure Proxy runs on multiple operating systems, including IBM AIX®, Red Hat Linux, HP-UX, Solaris, and Microsoft Windows. For the latest system requirements, see the Software Products Compatibility Reports website. Select Detailed system requirements and search for Sterling Secure Proxy.

Sterling Secure Proxy containers, built to Kubernetes standards, are validated on Red Hat OpenShift Container Platform 3.11. Separate purchase of Red Hat OpenShift Container Platform 3.11 is required. The electronic downloads for Sterling Secure Proxy containers do not include Red Hat OpenShift.

Secure External Authentication Server is an optional, separately installed component for the following B2B and MFT offerings: Sterling Secure Proxy, Sterling B2B Integrator, Sterling File Gateway, and Sterling Connect:Direct.



Back to topBack to top

Planned availability date

Top rule

September 18, 2020



Back to topBack to top

Description

Top rule

Secure File Transfer

Secure File Transfer editions include the following component offerings:

  • Sterling File Gateway connects your internal systems with your external business partners by supporting high-volume electronic file exchange, multiprotocol, complex routing, and data translation.

    For more information about Sterling File Gateway, see Sterling File Gateway on IBM Marketplace.

  • Sterling Connect:Direct delivers point-to-point MFT capabilities and is optimized for high performance and throughput, and moves files containing any type of data across multiple platforms, disparate file systems, and disparate media.

    For more information about Sterling Connect:Direct, see Sterling Connect:Direct on IBM Marketplace.

  • Sterling Control Center Monitor tracks the critical events across your B2B and MFT infrastructure for improved operations, customer service, and B2B governance.

    For more information about Sterling Control Center Monitor, see IBM Sterling Control Center Monitor on IBM Marketplace.

  • Sterling Control Center Director provides simplified lifecycle management capabilities for your Sterling Connect:Direct infrastructure.

    For more information about Sterling Control Center Director, see IBM Sterling Control Center Director on IBM Marketplace.

  • Sterling Secure Proxy helps secure and shield your trusted network by preventing direct connectivity between external partners and internal servers.

    For more information about Secure Proxy, see IBM Sterling Secure Proxy on IBM Marketplace

For more information about Secure File Transfer and other Sterling B2B integration software, see:

Sterling Secure Proxy

Sterling Secure Proxy is integral component of MFT solutions. Companies all over the world rely on MFT offerings to drive their mission-critical business processes. Data security, access management, and perimeter security are key considerations when moving data inside and outside of the organization.

Sterling Secure Proxy, a DMZ-based application software proxy, enables use of security features and high-speed MFT file exchanges at the network edge for trusted B2B transactions. It provides increased perimeter security to help protect the enterprise's trusted zone, as well as authentication services to help prevent unauthorized access to business-critical internal systems. It integrates with the existing security infrastructure to help organizations meet security and audit requirements while also supporting efforts to meet compliance regulations and to incorporate industry standards and best practices.

Secure External Authentication Server

Secure External Authentication Server, an optional separately installed component, provides advanced authentication and validation services for B2B and MFT offerings. Secure External Authentication Server supports a flexible configuration to meet a variety of certificate validation and user authentication and authorization needs.

For more information about Sterling Secure Proxy and other Sterling B2B integration software, see:

For more information about Sterling File Gateway, see IBM Sterling File Gateway on IBM Marketplace website.

For more information about Sterling Connect:Direct, see IBM Sterling Connect:Direct on IBM Marketplace website.

For more information about Sterling Control Center Monitor, see IBM Sterling Control Center Monitor on IBM Marketplace website.

For more information about Sterling Control Center Director, see IBM Sterling Control Center Director on IBM Marketplace website.

For more information about Sterling Secure Proxy, see IBM Sterling Secure Proxy on IBM Marketplace website.

Accessibility by people with disabilities

Accessibility Compliance Reports (previously known as a VPAT) containing details on accessibility compliance to standards, including the Worldwide Consortium Web Content Accessibility Guidelines, European Standard EN 301 349, and US Section 508, can be found on the IBM Accessibility Conformance Report Request website.



Back to topBack to top

Product positioning

Top rule

Sterling File Gateway, Sterling Connect:Direct, Sterling Control Center Monitor, Sterling Control Center Director, and Sterling Secure Proxy belong to the Watson Supply Chain portfolio and Sterling B2B Collaboration solutions. Sterling B2B Collaboration solutions improve the management and information exchange across B2B relationships, including MFT and B2B integration offerings. For more information, see IBM Sterling B2B Collaboration website.

Sterling Secure Proxy belongs to the Sterling B2B Collaboration portfolio, which is part of IBM Sterling. Sterling B2B Collaboration solutions improve the management and information exchange across B2B relationships, including MFT and Sterling B2B integration offerings. For more information, see IBM supply chain products website.



Back to topBack to top

Reference information

Top rule

For information about IBM Secure File Transfer, see Software Announcement 219-005, dated March 19, 2019.

For information about IBM Sterling Secure Proxy and IBM Secure External Authentication Server, see Software Announcement 219-108, dated February 12, 2019.



Back to topBack to top

Program number

Top rule

Program number VRM Program name
5725-D03 6.0.1 IBM Sterling Secure Proxy
5725-D03 6.0.1 IBM Secure External Authentication Server
5737-J53 2.0 IBM Secure File Transfer


Back to topBack to top

Education support

Top rule

IBM training provides education to support many IBM offerings. Descriptions of courses for IT professionals and managers can be found on the IBM Training and Skills website. Search for Sterling Secure Proxy.

Call IBM training at 800-IBM-TEACH (426-8322) for catalogs, schedules, and enrollments.



Back to topBack to top

Offering Information

Top rule

Product information is available on the IBM Offering Information website.

More information is also available on the Passport Advantage® and Passport Advantage Express® website.



Back to topBack to top

Publications

Top rule

Secure File Transfer

Technical documentation for Secure File Transfer products can be accessed in IBM Knowledge Center.

Sterling Secure Proxy

Documentation for Sterling Secure Proxy can be accessed in IBM Knowledge Center.

Documentation for Secure External Authentication Server can be accessed in IBM Knowledge Center.

Version 6.0.1 documentation is available.



Back to topBack to top

Services

Top rule

Software Services

IBM Software Services has the breadth, depth, and reach to manage your services needs. You can leverage the deep technical skills of the lab-based software services team and the business consulting, project management, and infrastructure expertise of the IBM Global Services team. Also, IBM extends the reach of IBM Software Services through IBM Business Partners to provide an extensive portfolio of capabilities. IBM provides the global reach, intellectual capital, industry insight, and technology leadership to support a wide range of critical business needs.

To learn more about IBM Software Services, contact your Lab Services Sales or Delivery Leader.



Back to topBack to top

Technical information

Top rule

Specified operating environment

Hardware requirements

The component products in the Secure File Transfer solution run on a variety of platforms. Common platforms include Linux, multiple UNIX platforms, Microsoft Windows, and Linux on IBM Z.

Software Product Compatibility Reports is a good resource for the latest system requirements. Select Detailed system requirements, then search for a product and version.

For Sterling Secure Proxy, find system requirement information by searching for Sterling Secure Proxy on the Software Product Compatibility Reports page.

For Secure External Authentication Server, find system requirement information by searching for Secure External Authentication Server on the Software Product Compatibility Reports page.

Software requirements

For Sterling Secure Proxy, find system requirement information by searching for Sterling Secure Proxy on the Software Product Compatibility Reports page.

For Secure External Authentication Server, find system requirement information by searching for External Authentication Server on the Software Product Compatibility Reports page.

Companion products

Secure File Transfer

Secure File Transfer can be integrated with the following products to provide additional value from the broader Sterling B2B Collaboration portfolio. See IBM Supply Chain website and select Sterling B2B Collaboration.

  • Global High Availability Mailbox add-on to Sterling File Gateway
  • Sterling Connect:Enterprise®
  • Sterling Connect: Express
  • IBM Transformation Extender Advanced

Sterling Secure Proxy

Sterling Secure Proxy provides critical edge security capabilities for the B2B and MFT solutions in the Sterling B2B Collaboration portfolio. Sterling Secure Proxy supports and can be sold with any of the following MFT and B2B products:

  • Sterling B2B Integrator
  • Sterling Connect:Direct (all platforms, including IBM z/OS®)
  • Sterling File Gateway
  • Sterling Connect: Express
  • Sterling Control Center
IBM Support

IBM Support is your gateway to technical support tools and resources that are designed to help you save time and simplify support. IBM Support can help you find answers to questions, download fixes, troubleshoot, submit and track problem cases, and build skills. Learn and stay informed about the transformation of IBM Support, including new tools, new processes, and new capabilities, by going to the IBM Support Insider.

Planning information

Information resources for planning your container installation and deployment are included in IBM Knowledge Center, IBM Support, and Software Product Compatibility Reports.

Container images are distributed to entitled users through IBM Passport Advantage . Product maintenance distributions are available through Fix Central.

Sterling Secure Proxy container distributions use the same technical support terms as the base, noncontainer distributions. Support terms may vary by product and version. For details, see IBM Support Software lifecycle website.

Packaging

These offerings are delivered through the internet as an electronic download. There is no physical media.

Noncontainer distributions for Secure File Transfer, Sterling Secure Proxy 6.0.1 and Secure External Authentication Server 6.0.1 are available as traditional e-images. Container and noncontainer distributions are available to entitled users through IBM Passport Advantage.

Certified containers, built on Kubernetes standards and validated on Red Hat OpenShift Container Platform, require separate purchase of Red Hat OpenShift Container Platform. Container distributions are available for the following Sterling B2B Collaboration offerings. For details, see Ordering information.

  • Secure File Transfer
  • Sterling Secure Proxy 6.0.1
  • Sterling B2B Integrator 6.0
  • Sterling B2B File Gateway 6.0
  • Sterling Connect:Direct 6.0
  • Transformation Extender 10.0


Back to topBack to top

Ordering information

Top rule

For ordering information, consult your IBM representative or IBM Business Partner, or go to the Passport Advantage website.

This program is only available through Passport Advantage. It is not available as shrinkwrap.

These products may only be sold directly by IBM or by IBM Business Partners.

To locate IBM Business Partners in your geography, see the Find a Business Partner page.


Passport Advantage

IBM Secure File Transfer (5737-J53)

Part description Part number
IBM Secure File Transfer-Essentials Edition for Linux on IBM z Systems® Connection License + SW Subscription & Support 12 Months D28XXLL
IBM Secure File Transfer-Essentials Edition for Linux on IBM z Systems Connection Monthly License D28XZLL
IBM Secure File Transfer-Essentials Edition for Linux on IBM z Systems Connection Annual SW Subscription & Support Renewal 12 Months E0R5MLL
IBM Secure File Transfer-Essentials Edition for Linux on IBM z Systems Connection SW Subscription & Support Reinstatement 12 Months D28XYLL
IBM Secure File Transfer-Essentials Edition for Linux on IBM z Systems for Non-Production Environment Connection Monthly License D28Y2LL
   
IBM Secure File Transfer-Essentials Edition for Linux on IBM z Systems for Non-Production Environment Connection License + SW Subscription & Support 12 Months D28Y0LL
IBM Secure File Transfer-Essentials Edition for Linux on IBM z Systems for Non-Production Environment Connection Annual SW Subscription & Support Renewal 12 Months E0R5NLL
IBM Secure File Transfer-Essentials Edition for Linux on IBM z Systems for Non-Production Environment Connection SW Subscription & Support Reinstatement 12 Months D28Y1LL
   
IBM Secure File Transfer-Standard Edition for Linux on IBM z Systems Connection Committed Term License D28Y6LL
IBM Secure File Transfer-Standard Edition for Linux on IBM z Systems Connection License + SW Subscription & Support 12 Months D28Y3LL
IBM Secure File Transfer-Standard Edition for Linux on IBM z Systems Connection Monthly License D28Y5LL
IBM Secure File Transfer-Standard Edition for Linux on IBM z Systems Connection Annual SW Subscription & Support Renewal 12 Months E0R5PLL
IBM Secure File Transfer-Standard Edition for Linux on IBM z Systems Connection SW Subscription & Support Reinstatement 12 Months D28Y4LL
   
IBM Secure File Transfer-Standard Edition for Linux on IBM z Systems for Non-Production Environment Connection Committed Term License D28YGLL
IBM Secure File Transfer-Standard Edition for Linux on IBM z Systems for Non-Production Environment Connection License + SW Subscription & Support 12 Months D28YDLL
IBM Secure File Transfer-Standard Edition for Linux on IBM z Systems for Non-Production Environment Connection Monthly License D28YFLL
IBM Secure File Transfer-Standard Edition for Linux on IBM z Systems for Non-Production Environment Connection Annual SW Subscription & Support Renewal 12 Months E0R5QLL
IBM Secure File Transfer-Standard Edition for Linux on IBM z Systems for Non-Production Environment Connection SW Subscription & Support Reinstatement 12 Months D28YELL
   
IBM Secure File Transfer-Premium Edition for Linux on IBM z Systems Processor Value Unit (PVU) Committed Term License D28YKLL
IBM Secure File Transfer-Premium Edition for Linux on IBM z Systems Processor Value Unit (PVU) License + SW Subscription & Support 12 Months D28YHLL
IBM Secure File Transfer-Premium Edition for Linux on IBM z Systems Processor Value Unit (PVU) Monthly License D28YJLL
IBM Secure File Transfer-Premium Edition for Linux on IBM z Systems Processor Value Unit (PVU) Annual SW Subscription & Support Renewal 12 Months E0R5RLL
IBM Secure File Transfer-Premium Edition for Linux on IBM z Systems Processor Value Unit (PVU) SW Subscription & Support Reinstatement 12 Months D28YILL
   
IBM Secure File Transfer-Premium Edition for Linux on IBM z Systems for Non-Production Environment Processor Value Unit (PVU) Committed Term License D28YPLL
IBM Secure File Transfer-Premium Edition for Linux on IBM z Systems for Non-Production Environment Processor Value Unit (PVU) License + SW Subscription & Support 12 Months D28YLLL
IBM Secure File Transfer-Premium Edition for Linux on IBM z Systems for Non-Production Environment Processor Value Unit (PVU) Monthly License D28YNLL
IBM Secure File Transfer-Premium Edition for Linux on IBM z Systems for Non-Production Environment Processor Value Unit (PVU) Annual SW Subscription & Support Renewal 12 Months E0R5SLL
IBM Secure File Transfer-Premium Edition for Linux on IBM z Systems for Non-Production Environment Processor Value Unit (PVU) SW Subscription & Support Reinstatement 12 Months D28YMLL
   
IBM Secure File Transfer-Container Edition Virtual Processor Core Committed Term License D28YTLL
IBM Secure File Transfer-Container Edition Virtual Processor Core License + SW Subscription & Support 12 Months D28YQLL
IBM Secure File Transfer-Container Edition Virtual Processor Core Monthly License D28YSLL
IBM Secure File Transfer-Container Edition Virtual Processor Core Annual SW Subscription & Support Renewal 12 Months E0R5TLL
IBM Secure File Transfer-Container Edition Virtual Processor Core SW Subscription & Support Reinstatement 12 Months D28YRLL
   
IBM Secure File Transfer-Container Edition for Non-Production Environment Virtual Processor Core Committed Term License D28YXLL
IBM Commerce Secure File Transfer-Container Edition for Non-Production Environment Virtual Processor Core Virtual Processor Core License + SW Subscriptn and Support 12 Months D28YULL
IBM Secure File Transfer-Container Edition for Non-Production Environment Virtual Processor Core Monthly License D28YWLL
IBM Secure File Transfer-Container Edition for Non-Production Environment Virtual Processor Core Annual SW Subscription & Support Renewal 12 Months E0R5ULL
IBM Secure File Transfer-Container Edition for Non-Production Environment Virtual Processor Core SW Subscription & Support Reinstatement 12 Months D28YVLL

Charge metric

The charge metrics for this licensed product can be found in the following License Information documents:

Program identifier License Information document title License Information document number
5737-J53 IBM Secure File Transfer Essentials Edition bundle 2.0 L-BCHE-BSGSEM
5737-J53 IBM Secure File Transfer Essentials Edition 2.0 L-BCHE-BSGRWE
5737-J53 IBM Secure File Transfer Essentials Edition for Non-Production 2.0 L-BCHE-BSGS2Z
5737-J53 IBM Secure File Transfer Premium Edition bundle 2.0 L-BCHE-BSGSFM
5737-J53 IBM Secure File Transfer Premium Edition 2.0 L-BCHE-BSGS52
5737-J53 IBM Secure File Transfer Premium Edition for Non-Production 2.0 L-BCHE-BSGS65
5737-J53 IBM Secure File Transfer Standard Edition bundle 2.0 L-BCHE-BSGSJF
5737-J53 IBM Secure File Transfer Standard Edition 2.0 L-BCHE-BSGS6V
5737-J53 IBM Secure File Transfer Standard Edition for Non-Production 2.0 L-BCHE-BSGS8H
5737-J53 IBM Secure File Transfer Container Edition bundle 2.0 L-BCHE-BSGSKB
5737-J53 IBM Secure File Transfer Container Edition 2.0 L-BCHE-BSGS9A
5737-J53 IBM Secure File Transfer Container Edition for Non-Production 2.0 L-BCHE-BSGSA7
5725-D03 IBM Sterling Secure Proxy 6.0.1 L-BCHE-BJQHHK

Select your language of choice and scroll down to the Charge Metrics section. Follow-on releases, if any, may have updated terms. See the License Information documents website for more information.



Back to topBack to top

Terms and conditions

Top rule

The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the IBM International Program License Agreement, IBM International Passport Advantage Agreement, and the IBM Agreement for Acquisition of Software Maintenance.

This product is only available through Passport Advantage.

Licensing

IBM International Program License Agreement including the License Information document and Proof of Entitlement (PoE) govern your use of the program. PoEs are required for all authorized use. Part number products only, offered outside of Passport Advantage, where applicable, are license only and do not include Software Maintenance.

This software license includes Software Subscription and Support (also referred to as Software Maintenance).

Software Maintenance

Licenses under the IBM International Program License Agreement (IPLA) provide for support with ongoing access to releases and versions of the program. IBM includes one year of Software Subscription and Support (also referred to as Software Maintenance) with the initial license acquisition of each program acquired. The initial period of Software Subscription and Support can be extended by the purchase of a renewal option, if available. Two charges apply: a one-time license charge for use of the program and an annual renewable charge for the enhanced support that includes telephone assistance (voice support for defects during normal business hours), as well as access to updates, releases, and versions of the program as long as support is in effect.

License Information number

The following License Information document applies to the offering in this announcement:

Program identifier License Information document title License Information document number
5737-J53 IBM Secure File Transfer Essentials Edition bundle 2.0 L-BCHE-BSGSEM
5737-J53 IBM Secure File Transfer Essentials Edition 2.0 L-BCHE-BSGRWE
5737-J53 IBM Secure File Transfer Essentials Edition for Non-Production 2.0 L-BCHE-BSGS2Z
5737-J53 IBM Secure File Transfer Premium Edition bundle 2.0 L-BCHE-BSGSFM
5737-J53 IBM Secure File Transfer Premium Edition 2.0 L-BCHE-BSGS52
5737-J53 IBM Secure File Transfer Premium Edition for Non-Production 2.0 L-BCHE-BSGS65
5737-J53 IBM Secure File Transfer Standard Edition bundle 2.0 L-BCHE-BSGSJF
5737-J53 IBM Secure File Transfer Standard Edition 2.0 L-BCHE-BSGS6V
5737-J53 IBM Secure File Transfer Standard Edition for Non-Production 2.0 L-BCHE-BSGS8H
5737-J53 IBM Secure File Transfer Container Edition bundle 2.0 L-BCHE-BSGSKB
5737-J53 IBM Secure File Transfer Container Edition 2.0 L-BCHE-BSGS9A
5737-J53 IBM Secure File Transfer Container Edition for Non-Production 2.0 L-BCHE-BSGSA7
5725-D03 IBM Sterling Secure Proxy 6.0.1 L-BCHE-BJQHHK

Follow-on releases, if any, may have updated terms. See the License Information documents website for more information.

Limited warranty applies

Yes

Limited warranty

IBM warrants that when the program is used in the specified operating environment, it will conform to its specifications. The warranty applies only to the unmodified portion of the program. IBM does not warrant uninterrupted or error-free operation of the program or that IBM will correct all program defects. You are responsible for the results obtained from the use of the program.

IBM provides you with access to IBM databases containing information on known program defects, defect corrections, restrictions, and bypasses at no additional charge. For further information, see the IBM Support Guide.

IBM will maintain this information for at least one year after the original licensee acquires the program (warranty period).

Program technical support

Technical support of a program product version or release will be available for a minimum of five years from the general availability date, as long as your Software Subscription and Support (also referred to as Software Maintenance) is in effect.

This technical support allows you to obtain assistance (by telephone or electronic means) from IBM for product-specific, task-oriented questions regarding the installation and operation of the program product. Software Subscription and Support (Software Maintenance) also provides you with access to updates (modifications or fixes), releases, and versions of the program. You will be notified, through an announcement letter, of discontinuance of support with 12 months' notice.

If you require additional technical support from IBM, including an extension of support beyond the discontinuance date, contact your IBM representative or IBM Business Partner. This extension may be available for a fee.

For additional information on the IBM Software Support Lifecycle Policy, see the IBM Software Support Lifecycle Policy website.

Money-back guarantee

If for any reason you are dissatisfied with the program and you are the original licensee, you may obtain a refund of the amount you paid for it, if within 30 days of your invoice date you return the program and its PoE to the party from whom you obtained it. If you downloaded the program, you may contact the party from whom you acquired it for instructions on how to obtain the refund.

For clarification, note that (1) for programs acquired under the IBM International Passport Advantage offering, this term applies only to your first acquisition of the program and (2) for programs acquired under any of IBM's On/Off Capacity on Demand (On/Off CoD) software offerings, this term does not apply since these offerings apply to programs already acquired and in use by you.

Volume orders (IVO)

No

Passport Advantage applies

Yes, information is available on the Passport Advantage and Passport Advantage Express website.

Software Subscription and Support applies

Yes. Software Subscription and Support, also referred to as Software Maintenance, is included with licenses purchased through Passport Advantage and Passport Advantage Express. Product upgrades and Technical Support are provided by the Software Subscription and Support offering as described in the Agreements. Product upgrades provide the latest versions and releases to entitled software, and Technical Support provides voice and electronic access to IBM support organizations, worldwide.

IBM includes one year of Software Subscription and Support with each program license acquired. The initial period of Software Subscription and Support can be extended by the purchase of a renewal option, if available.

While your Software Subscription and Support is in effect, IBM provides you assistance for your routine, short duration installation and usage (how-to) questions, and code-related questions. IBM provides assistance by telephone and, if available, electronic access, only to your information systems (IS) technical support personnel during the normal business hours (published prime shift hours) of your IBM support center. (This assistance is not available to your users.) IBM provides Severity 1 assistance 24 hours a day, 7 days a week. For additional details, see the IBM Support Guide. Software Subscription and Support does not include assistance for the design and development of applications, your use of programs in other than their specified operating environment, or failures caused by products for which IBM is not responsible under the applicable agreements.

Unless specified otherwise in a written agreement with you, IBM does not provide support for third-party products that were not provided by IBM. Ensure that when contacting IBM for covered support, you follow problem determination and other instructions that IBM provides, including in the IBM Support Guide.

For additional information about the International Passport Advantage Agreement and the IBM International Passport Advantage Express Agreement, go to the Passport Advantage and Passport Advantage Express website.

Variable charges apply

No

Educational allowance available

Not applicable.



Back to topBack to top

Statement of good security practices

Top rule

IT system security involves protecting systems and information through intrusion prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a regulatory compliant, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective.

Important: IBM does not warrant that any systems, products, or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.



Back to topBack to top

Prices

Top rule

For additional information and current prices, contact your local IBM representative or IBM Business Partner.


Business Partner information

If you are an IBM Business Partner acquiring products from IBM, you may link to Passport Advantage Online for resellers where you can obtain Business Partner pricing information. An IBMid and password are required to access the IBM Passport Advantage or IBM PartnerWorld® website.


Passport Advantage

For Passport Advantage information and charges, contact your IBM representative or IBM Business Partner. Additional information is also available on the Passport Advantage and Passport Advantage Express website.

IBM Global Financing

IBM Global Financing offers competitive financing to credit-qualified clients to assist them in acquiring IT solutions. Offerings include financing for IT acquisition, including hardware, software, and services, from both IBM and other manufacturers or vendors. Offerings (for all client segments: small, medium, and large enterprise), rates, terms, and availability can vary by country. Contact your local IBM Global Financing organization or go to the IBM Global Financing website for more information.

IBM Global Financing offerings are provided through IBM Credit LLC in the United States, and other IBM subsidiaries and divisions worldwide to qualified commercial and government clients. Rates are based on a client's credit rating, financing terms, offering type, equipment type, and options, and may vary by country. Other restrictions may apply. Rates and offerings are subject to change, extension, or withdrawal without notice.

Financing from IBM Global Financing helps you preserve cash and credit lines, enables more technology acquisition within current budget limits, can help accelerate implementation of economically attractive new technologies, offers payment and term flexibility, and can help match project costs to projected benefits. Financing is available worldwide for credit-qualified clients.



Back to topBack to top

Order now

Top rule

To order, contact the IBM Digital Sales Center, your local IBM representative, or your IBM Business Partner. To identify your local IBM representative or IBM Business Partner, call 800-IBM-4YOU (426-4968). For more information, contact the IBM Digital Sales Center.

Phone: 800-IBM-CALL (426-2255)

Fax: 800-2IBM-FAX (242-6329)

For IBM representative: askibm@ca. ibm.com

For IBM Business Partner: pwcs@us. ibm.com



IBM Digital Sales Offices
1177 S Belt Line Rd
Coppell, TX 75019-4642, US

The IBM Digital Sales Center, our national direct marketing organization, can add your name to the mailing list for catalogs of IBM products.


Note: Shipments will begin after the planned availability date.

Trademarks

IBM Sterling and Sterling are trademarks of IBM Corporation in the United States, other countries, or both.

IBM, IBM Z, AIX, Express, z/OS, PartnerWorld, Passport Advantage, IBM z Systems and ibm.com are registered trademarks of IBM Corporation in the United States, other countries, or both.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.

Red Hat and OpenShift are registered trademarks of Red Hat Inc. in the U.S. and other countries.

Connect:Direct and Connect:Enterprise are registered trademarks of IBM International Group B.V., an IBM Company in the U.S. and other countries.

UNIX is a registered trademark of The Open Group in the United States and other countries.

Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Additional terms of use are located at

Terms of use

For the most current information regarding IBM products, consult your IBM representative or reseller, or go to the IBM worldwide contacts page

IBM United States