IBM Security zSecure V2.3 suite delivers enhanced security management, audit, and compliance testing that includes support for IBM z/OS Pervasive Encryption

IBM United States Software Announcement 217-367
July 17, 2017

Table of contents
OverviewOverviewPublicationsPublications
Key prerequisitesKey prerequisitesTechnical informationTechnical information
Planned availability datePlanned availability dateOrdering informationOrdering information
DescriptionDescriptionTerms and conditionsTerms and conditions
Program numberProgram numberPricesPrices


Top rule
At a glance
Bottom rule

IBM® Security zSecure™ V2.3 suite helps:

  • Enhance mainframe security position to better demonstrate compliance with regulations.
  • Enhance real-time security intelligence analytics and alerts.
  • Enhance identity governance for the mainframe to:
    • Help organizations understand, control, and make business decisions that are related to user access.
    • Assess risks.
  • Secure cloud and mobile applications.
  • Utilize the inherent security advantages offered by mainframes that include pervasive encryption for enhanced data protection.


Back to topBack to top

Top rule
Overview
Bottom rule

zSecure can be optionally purchased as security solution packages. These encompass a number of the separate products.

Main features per product and solution package

IBM Security zSecure Compliance and Administration V2.3 encompasses both other solution packages: IBM Security zSecure Administration V2.3 and IBM Security zSecure Compliance and Auditing V2.3.

IBM Security zSecure Administration V2.3 is a solution package that contains:

  • IBM Security zSecure Visual V2.3 supports z/OS® V2.3, Multi-Factor (MF) Authentication, and program fixes
  • IBM Security zSecure Admin V2.3 supports:
    • IBM DB2® V12
    • IBM CICS® V5.4
    • MF Policy
    • P line command on connects and permits
    • z/OS V2.3, such as ENHANCEDGENERICOWNER
    • Eight-character user IDs
  • Ability to administer data set encryption
  • Ability review ICSF settings and encryption key definition
  • Ability to use, both symmetric and asymmetric.
  • New, five report types that are added with more than 250 new fields
  • IBM Security zSecure Access Monitor data, which is part of zSecure Admin, that feeds security event information into IBM Operations Analytics for z Systems™.

IBM Security zSecure Compliance and Auditing V2.3, a solution package that contains:

  • IBM Security zSecure Alert V2.3
    • Support for SMTP ATSIGN, MF policy support
    • Usability enhancements
    • Program fixes
    • Support for z/OS V2.3 HPE Security ArcSight Common Event Format (CEF) variant of alerts, 5 new customer requested alerts.
  • IBM Security zSecure Audit V2.3
    • Support for z/OS V2.3, like auditing data set encryption both statically and through SMF, includes z Encryption Readiness Technology (zERT).
    • Support for auditing ICSF global settings and also cryptography key definitions with extensive support for KDSR fields and Analysis of NJE node security in RACF® is made available for compliance checking.
    • Includes fast filtering on ISPF report displays, MF Policy Support, P line command on connects and permits DB12 support, CICS V5.4 support.
    • Overall, 7 new report types are added with some 400 new fields.
  • IBM Security zSecure Command Verifier V2.3 that delivers support for:
    • DataKey
    • MF policy
    • z/OS V2.3

IBM Security zSecure CICS Toolkit V2.3 delivers support for:

  • CICS V5.4
  • Program fixes

IBM Security zSecure Adapters for SIEM V2.3

  • Supports z/OS V2.3 enriching data set activity with key labels, algorithm, and key length.
  • Provides ability to pass on zERT detected network encryption activity.
  • Supports MF policy.
  • Delivers usability enhancements
  • IBM Security zSecure Adapters for QRadar® SIEM is renamed to IBM Security zSecure Adapters for SIEM.


Back to topBack to top

Top rule
Key prerequisites
Bottom rule

A supported IBM z Systems™ server that is capable of supporting z/OS V2.1, or later



Back to topBack to top

Top rule
Planned availability date
Bottom rule

August 11, 2017



Back to topBack to top

Top rule
Description
Bottom rule

zSecure suite V2.3.0 delivers:

  • Administration and control of pervasive encryption
    • Eased administration of mandatory data set encryption through Data Facility Product (DFP) segments
    • Direct navigation from data set encryption key labels to key label protection profile administration
    • Command verifier policies that is added for setting DATAKEY and SYMCPACFRET
  • Audit of Pervasive Encryption
    • Data set encryption key labels that is made available if present in System Management Facility (SMF)
    • Enrichment of key labels with selectable key algorithm and key length fields
    • Report type SMF that adds 118 new fields for the new zERT Encryption Readiness Technology SMF record 119-11
    • Ability to help understanding which systems and which users can decrypt the data
  • Audit of Integrated Cryptographic Services Facility
    • Fifty-four fields are added for reviewing ICSF settings and Key Store Policy.
    • New report type ICSF_SYMKEY is added with 42 fields for symmetric key label use on DASD, in SMS data classes, in RACF DFP segments and CSFKEYS profiles, and definitions in CKDS.
    • New report type ICSF_PUBKEY are added with 36 fields for asymmetric key definitions in PKDS.
    • Supports KDSR fields like last reference, key validity dates, archive status and use.
    • Information on key algorithm and length.
    • ICSF settings and key properties are now available to the compliance standards framework and for SMF enrichment through key label lookups.
    • Sample displays and reports are provided.
  • Audit of additional z/OS security relevant settings
    • New report type NJE_NODE are added with 48 fields for reviewing NJE node definition settings and understanding their protection in RACF. Sample displays and reports are provided.
    • Includes new report type SYSTEM_VARIABLE with five fields for audit of MVS™ system variables values.
    • Seven fields are added for TSO security relevant settings.
    • Report type AS_DD is enhanced with five new fields and more often filled in, with JESSPOOL, DEVICES, and DATASET resource and profile name.
    • CICS transaction RTIMEOUT parameter is added to CICS transaction settings.
    • Report type MQ_CHANNEL is added field for incoming user ID.
    • Report type MQ_QUEUE is added support for long MQ queue names.
  • Enhancements in Access Monitor
    • Data feed to IBM Security Operations Analytics for z Systems
    • Significant performance enhancements in Access Monitor, for example, high frequency events like FSACCESS checks
    • User interface enhancements to assist in RACF group restructuring
    • New option to exclude user IDs that have been deleted from comparisons
  • Support for administering and controlling RACF Multi Factor Authentication policies, including new Command Verifier policies.
  • User interface productivity enhancements:
    • P line command is made available for fast navigation from access lists and connect lists to user and group details.
    • Added an alternative more efficient and customer-requested form of RACF profile recreation.
    • Passwords can now be recreated when accessing the live RACF database through zSecure server; requires a higher level of authority on the XFACILIT check already done.
  • Enhanced support for DISA STIGs
    • New report type ACF2_SENSDSN_ACCESS with 25 fields is used in automating 17 ACF2 ACP controls for verifying data set protection.
    • Includes added support for extended description lengths and imbedding shared tests in a rule.
    • Includes adjusted controls for STIG level 6.31.
  • Real-time ACF2 LID database support
    • Searches for specific logonid or logonid prefixes that are much quicker for large databases, automatic fallback to sequential backup data sets.
  • Client-requested enhancements for report on run time environment
    • New report type RUN are added with 14 fields about the environment where the program was run.
    • New report type RUN_DD with 12 fields are added showing input and output file and data set names, and times and system names contained in the input data sets.
  • New security event feed of events into HPE Security ArcSight in Common Event Format (CEF) format:
    • Format and stream predefined and client alerts that are based on events in SMF and WTO messages
    • Format and stream SMF records from IBM RACF systems to ArcSight
    • Enriched SMF records with data such as the sensitivity of the resource and the privileges of the user, to enable intelligent threat detection and analysis
  • Currency support for:
    • z/OS 2.3 (eight-character user IDs, email address, programs above bar, and SMF 256-2047)
    • CICS Transaction Server 5.4
    • DB2 V12 (new table unload authority, four new IFCids,and five new ZPRM settings)
    • DISA STIG 6.31

Accessibility by people with disabilities

A US Section 508 Voluntary Product Accessibility Template (VPAT) containing details on accessibility compliance can be found on the IBM Accessibility website.

Value Unit-based pricing

Value Unit pricing for eligible IBM z Systems IBM International Program License Agreement (IPLA) programs enables a lower cost of incremental growth and enterprise aggregation. Each z Systems IPLA product with Value Unit pricing has a single price per Value Unit and a conversion matrix, called Value Unit Exhibit, for converting from some designated measurement to Value Units. Most commonly, Millions of Service Units (MSUs) is the measurement designated by IBM to be converted to Value Units. Some other measurements are engines or messages. Since MSUs are the most common measurement, that measurement will be used for the remainder of this description.

Value Unit pricing offers price benefits for you. For each z Systems IPLA program with Value Unit pricing, the quantity of that program needed to satisfy applicable IBM terms and conditions is referred to as the required license capacity. Each of the various Value Unit Exhibits stipulate that the larger your required license capacity, the fewer Value Units per MSU you will need. Value Unit Exhibits are uniquely identified by a three digit code and referred to using the nomenclature VUExxx, where xxx is the three digit code.

Subsequent acquisitions of Value Unit priced programs offer additional price benefits. The quantity of each z Systems IPLA program that you have acquired is referred to as entitled license capacity. If you wish to grow your entitled license capacity for a z Systems IPLA program, the calculation to determine additional needed Value Units is based upon the number of Value Units already acquired.

For each z Systems IPLA program with Value Unit pricing, you should:

  • Determine the required license capacity, in MSUs.
  • Aggregate the MSUs across the enterprise.
  • Convert the total MSUs to Value Units, using the applicable Value Unit Exhibit.
  • Multiply the price per Value Unit by the total number of Value Units to determine the total cost.

To simplify conversion from the designated measurement to Value Units or vice-versa, use the Value Unit Converter Tool. For additional information or to obtain a copy of the Value Unit Converter Tool, visit the Value Unit Converter Tool, go to the IBM System z® Software Pricing website.

Note that Value Units of a given product cannot be exchanged, interchanged, or aggregated with Value Units of another product.

To determine the required license capacity for the z Systems IPLA program you selected, refer to the Terms and conditions section.



Back to topBack to top

Top rule
Program number
Bottom rule
Program name VRM Program number
IBM Security zSecure Admin 2.3.0 5655-N16
IBM Security zSecure Audit 2.3.0 5655-N17
IBM Security zSecure CICS Toolkit 2.3.0 5655-N18
IBM Security zSecure Command Verifier 2.3.0 5655-N19
IBM Security zSecure Visual 2.3.0 5655-N20
IBM Security zSecure Alert 2.3.0 5655-N21
IBM Security zSecure Adapters for SIEM 2.3.0 5655-AD8
IBM Security zSecure Administration 2.3.0 5655-N23
IBM Security zSecure Compliance and Auditing 2.3.0 5655-N24
IBM Security zSecure Compliance and Administration 2.3.0 5655-N25

Product identification number

IBM Security zSecure suite

Program PID number Subscription and Support PID number
5655-N16 5655-T03
5655-N17 5655-T04
5655-N18 5655-T06
5655-N19 5655-T08
5655-N20 5655-T10
5655-N21 5655-T12
5655-AD8 5655-AD9

IBM Security zSecure Compliance, Auditing, and Administration solutions

Program PID number Subscription and Support PID number
5655-N23 5655-SE4
5655-N24 5655-SE5
5655-N25 5655-SE6


Back to topBack to top

Top rule
Offering Information
Bottom rule

Product information is available on the IBM Offering Information website.



Back to topBack to top

Top rule
Publications
Bottom rule

Technical documentation can be found in IBM Knowledge Center.



Back to topBack to top

Top rule
Services
Bottom rule

Software Services

IBM Software Services has the breadth, depth, and reach to manage your services needs. You can leverage the deep technical skills of our lab-based, software services team and the business consulting, project management, and infrastructure expertise of our IBM Global Services team. Together, we provide the global reach, intellectual capital, industry insight, and technology leadership to support a wide range of critical business needs.

To learn more about IBM Software Services, contact your Lab Services Sales or Delivery Leader.



Back to topBack to top

Top rule
Technical information
Bottom rule

Specified operating environment

Hardware requirements

A supported IBM Z server that is capable of supporting z/OS V2.1, or later.

Software requirements

zSecure suite V2.3, zSecure Compliance and Administration V2.3, zSecure Compliance and Auditing V2.3, and zSecure Administration V2.3 solutions are supported in the following environments:

  • z/OS V2R1
  • z/OS V2R2
  • z/OS V2R3

zSecure products that include features for CA ACF2 and CA Top Secret support CA ACF2 R14, R15 and R16, and CA Top Secret R14, R15, and R16.

Planning information

Packaging

This offering is delivered through the internet as an electronic download. There is no physical media.



Back to topBack to top

Top rule
Ordering information
Bottom rule


Value Unit exhibit VUE020

Level Minimum Maximum Value Units/MSU
Base 1 3 1
Tier A 4 45 0.15
Tier B 46 175 0.08
Tier C 176 315 0.04
Tier D 316 + 0.03


Ordering z/OS through the internet

Shopz provides an easy way to plan and order your z/OS ServerPac or CBPDO. It will analyze your current installation, determine the correct product migration, and present your new configuration based on z/OS. Additional products can also be added to your order (including determination of whether all product requisites are satisfied). For more details and availability, go to the Shopz website.

Charge metric

Program name PID number Charge metric
IBM Security zSecure Admin 5655-N16 MultiVersion Measurement No Charge
IBM Security zSecure Audit 5655-N17 MultiVersion Measurement No Charge
IBM Security zSecure CICS Toolkit 5655-N18 MultiVersion Measurement No Charge
IBM Security zSecure Command Verifier 5655-N19 MultiVersion Measurement No Charge
IBM Security zSecure Visual 5655-N20 MultiVersion Measurement No Charge
IBM Security zSecure Alert 5655-N21 MultiVersion Measurement No Charge
IBM Security zSecure Adapters for SIEM 5655-AD8 MultiVersion Measurement No Charge
IBM Security zSecure Administration 5655-N23 MultiVersion Measurement No Charge
IBM Security zSecure Compliance and Auditing 5655-N24 MultiVersion Measurement No Charge
IBM Security zSecure Compliance and Administration 5655-N25 MultiVersion Measurement No Charge

Basic license


On/Off CoD

IBM Security zSecure is eligible for On/Off CoD with a temporary use charge calculated based on MSUs per-day usage.


Subscription and Support

To receive voice technical support via telephone and future releases and versions at no additional charge, Subscription and Support must be ordered. The capacity of Subscription and Support (Value Units) must be the same as the capacity ordered for the product licenses.

To order, specify the Subscription and Support program number (PID) referenced above and the appropriate license or charge option.

IBM is also providing Subscription and Support for these products via a separately purchased offering under the terms of the IBM International Agreement for Acquisition of Software Maintenance. This offering:

  • Includes and extends the support services provided in the base support to include technical support via telephone.
  • Entitles you to future releases and versions, at no additional charge. Note that you are not entitled to new products.

When Subscription and Support is ordered, the charges will automatically renew annually unless cancelled by you.

The combined effect of the IPLA license and the Agreement for Acquisition of Software Maintenance gives you rights and support services comparable to those under the traditional ICA S/390® and z Systems license or its equivalent. To ensure that you continue to enjoy the level of support you are used to in the ICA business model, you must order both the license for the program and the support for the selected programs at the same Value Unit quantities.



Back to topBack to top

Top rule
Terms and conditions
Bottom rule

The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the IBM International Program License Agreement, IBM International Passport Advantage® Agreement, and the IBM Agreement for Acquisition of Software Maintenance.

Licensing

IBM International Program License Agreement including the License Information document and Proof of Entitlement (PoE) govern your use of the program. PoEs are required for all authorized use.

Agreement for Acquisition of Software Maintenance

The IBM Agreement for Acquisition of Software Maintenance (Z125-6011) applies for Software Subscription and Support (Software Maintenance) and does not require customer signatures.

These programs are licensed under the IBM Program License Agreement (IPLA) and the associated Agreement for Acquisition of Software Maintenance, which provide for support with ongoing access to releases and versions of the program. These programs have a one-time license charge for use of the program and an annual renewable charge for the enhanced support that includes telephone assistance (voice support for defects during normal business hours), as well as access to updates, releases, and versions of the program as long as support is in effect. IBM z Systems Operational Support Services - SoftwareXcel is an option if you desire added services.

License Information number

Description PID LI number
IBM Security zSecure Admin 5655-N16 L-MADP-AM6H4X
IBM Security zSecure Audit 5655-N17 L-MADP-AM6H2K
IBM Security zSecure CICS Toolkit 5655-N18 L-MADP-AM6GXR
IBM Security zSecure Command Verifier 5655-N19 L-MADP-AM6GVZ
IBM Security zSecure Visual 5655-N20 L-MADP-AM6H64
IBM Security zSecure Alert 5655-N21 L-MADP-AM6H3M
IBM Security zSecure Administration 5655-N23 L-MADP-AM6HR3
IBM Security zSecure Compliance and Auditing 5655-N24 L-MADP-AM6H77
IBM Security zSecure Compliance and Administration 5655-N25 L-MADP-AM6H9S
IBM Security zSecure Adapters for SIEM 5655-AD8 L-MADP-AM6GUV

See the License Information documents page on the IBM Software License Agreement website for more information.

Limited warranty applies

Yes

Limited warranty

IBM warrants that when the program is used in the specified operating environment, it will conform to its specifications. The warranty applies only to the unmodified portion of the program. IBM does not warrant uninterrupted or error-free operation of the program or that IBM will correct all program defects. You are responsible for the results obtained from the use of the program.

IBM provides you with access to IBM databases containing information on known program defects, defect corrections, restrictions, and bypasses at no additional charge. For further information, see the IBM Software Support Handbook.

IBM will maintain this information for at least one year after the original licensee acquires the program (warranty period).

Program technical support

Technical support of a program product version or release will be available for a minimum of three years from the general availability date, as long as your Software Subscription and Support (also referred to as Software Maintenance) is in effect.

This technical support allows you to obtain assistance (by telephone or electronic means) from IBM for product-specific, task-oriented questions regarding the installation and operation of the program product. Software Subscription and Support (Software Maintenance) also provides you with access to updates (modifications or fixes), releases, and versions of the program. You will be notified, through an announcement letter, of discontinuance of support with 12 months' notice. If you require additional technical support from IBM, including an extension of support beyond the discontinuance date, contact your IBM representative. This extension may be available for a fee.

For additional information on the IBM Software Support Lifecycle Policy, see the IBM Software Support Lifecycle Policy website.

Money-back guarantee

If for any reason you are dissatisfied with the program and you are the original licensee, you may obtain a refund of the amount you paid for it, if within 30 days of your invoice date you return the program and its PoE to the party from whom you obtained it. If you downloaded the program, you may contact the party from whom you acquired it for instructions on how to obtain the refund.

For clarification, note that for programs acquired under any of IBM's On/Off Capacity on Demand (On/Off CoD) software offerings, this term does not apply since these offerings apply to programs already acquired and in use by you.

Volume orders (IVO)

No

Passport Advantage applies

No

Software Subscription and Support applies

Yes. During the Software Subscription and Support period, for the unmodified portion of a program, and to the extent problems can be recreated in the specified operating environment, IBM will provide the following:

  • Defect correction information, a restriction, or a bypass.
  • Program updates. Periodic releases of collections of code corrections, fixes, functional enhancements and new versions and releases to the program and documentation.
  • Technical assistance. A reasonable amount of remote assistance by telephone or electronically to address suspected program defects. Technical assistance is available from the IBM support center in the organization's geography.

Additional details regarding Technical Assistance, which includes IBM contact information, are provided in the IBM Software Support Handbook.

Software Subscription and Support does not include assistance for:

  • The design and development of applications.
  • Your use of programs in other than their specified operating environment.
  • Failures caused by products for which IBM is not responsible under the IBM Agreement for Acquisition of Software Maintenance.

Software Subscription and Support is provided only if the program is within its support timeframe as specified in the Software Support Lifecycle policy for the program.

For operating system software, the revised IBM Operational Support Services - SoftwareXcel offering will provide support for those operating systems and associated products that are not available with the Software Subscription and Support (Software Maintenance) offering.

This will ensure total support coverage for your enterprise needs, including IBM and selected non-IBM products. For complete lists of products supported under both the current and revised offering, go to the Supported product list website.

Variable charges apply

No

Educational allowance available

Yes. A 15% education allowance applies to qualified education institution customers.

Multi-Version Measurement

Multi-Version Measurement (MVM) replaces the previously announced Migration Grace Period time limit of six months and allows unlimited time for clients to run more than one eligible version of a software program. Clients may run multiple versions of a program simultaneously for an unlimited duration during a program version upgrade. Clients may also choose to run multiple versions of a program simultaneously for an unlimited duration in a production environment. MVM does not extend support dates for programs withdrawn from service.

For more information about MVM, including requirements for qualification, see the MVM web page. For a list of eligible programs, see the IPLA Execution-based web page.

Sub-capacity terms and conditions

For each z Systems IPLA program with Value Unit pricing, the quantity of that program needed to satisfy applicable IBM terms and conditions is referred to as the required license capacity. Your required license capacity is based upon the following factors:

  • The z Systems IPLA program you select
  • The applicable Value Unit Exhibit
  • The applicable terms
  • Whether your current mainframes are full capacity or sub-capacity

For more information on the Value Unit Exhibit for the z Systems IPLA program you selected, refer to the Ordering information section.

Full-capacity mainframes

In cases where full capacity is applicable, the following terms apply.

Execution-based, z/OS-based, full-machine-based: The required capacity of a z Systems IPLA program with these terms equals the MSU-rated capacity of the machines where the z Systems IPLA program executes.

For more information on mainframe MSU-rated capacities, go to the IBM System z Software Contracts website.

Reference-based: The required license capacity of a z Systems IPLA program with these terms equals the license capacity of the applicable monthly license charge (MLC) program. This MLC program is called the parent program.

Sub-capacity mainframes

In cases where sub-capacity is applicable, the following terms apply.

Execution-based: The required capacity of a z Systems IPLA sub-capacity program with these terms equals the capacity of the LPARs where the z Systems IPLA program executes.

z/OS-based: The required license capacity of a z Systems IPLA program with these terms equals the license capacity of z/OS on the machines where the z Systems IPLA program executes.

Reference-based: The required license capacity of a z Systems IPLA program with these terms equals the license capacity of the applicable monthly license charge (MLC) program. This MLC program is called the parent program.

Full-machine-based: The required license capacity of a z Systems IPLA program with full machine based terms equals the MSU-rated capacity of the machines where the z Systems IPLA program executes.

For more information on mainframe MSU-rated capacities, refer to The IBM z Systems Machines Exhibit , Z125-3901, or visit the Mainframes section of the z Systems Exhibits website.

For additional information for products with reference-based terms, z Systems IPLA sub-capacity programs with reference-based terms adds value to the parent program across the environment, regardless of where in the environment the z Systems IPLA program executes.

An environment is defined as either a single or stand-alone machine or a qualified Parallel Sysplex®. You may have one or more different environments across the enterprise. To determine the required license capacity for each z Systems IPLA program with referenced-based terms, each environment should be assessed separately.

When a z Systems IPLA sub-capacity program with reference-based terms is used in a qualified Parallel Sysplex environment, the required license capacity of the z Systems IPLA program must equal with the license capacity of the parent program across the Parallel Sysplex. Qualified Parallel Sysplex refers to one where MLC pricing is aggregated across the sysplex.

Sub-capacity eligibility

To be eligible for sub-capacity charging on select z Systems IPLA programs, you must first implement and comply with all terms of either sub-capacity Workload License Charges (WLC) or sub-capacity Entry Workload License Charges (EWLC). To implement sub-capacity WLC or EWLC, a machine must be z Systems (or equivalent). On that machine:

  • All instances of the OS/390® operating system must be migrated to the z/OS operating systems.
  • Any licenses for the OS/390 operating system must be discontinued.
  • All instances of the z/OS operating systems must be running in z/Architecture® (64-bit) mode.

For that machine, you must create and submit a Sub-Capacity Report to IBM each month. Sub-Capacity Reports must be generated using the Sub-Capacity Reporting Tool (SCRT). For additional information or to obtain a copy of SCRT, go to the IBM System z Software Pricing website.

You must comply with all of the terms of the WLC or EWLC offering, whichever is applicable:

  • The complete terms and conditions of sub-capacity WLC are defined in the IBM Customer Agreement - Attachment for z Systems Workload License Charges (Z125-6516).
  • The complete terms and conditions for sub-capacity EWLC are defined in the IBM Customer Agreement - Attachment for EWLC, TWLC, zELC, and z/OS.e License Charges (Z125-6587).

Additionally, you must sign and comply with the terms and conditions specified in the amendment to the IPLA contract - Amendment for Amendment for IBM z Systems Programs Sub-Capacity Pricing (Z125-6929). Once the amendment is signed, the terms in the amendment replace any and all previous z Systems IPLA sub-capacity terms and conditions.

Sub-capacity terms and conditions

IBM Getting Started Sub-capacity Pricing for z/OS IPLA Software applies.

On/Off CoD

To be eligible for On/Off CoD pricing, you must be enabled for temporary capacity on the corresponding hardware, and the required contract, Attachment for IBM z Systems On/Off Capacity on Demand (Z125-7883) must be signed prior to use.



Back to topBack to top

Top rule
Statement of good security practices
Bottom rule

IT system security involves protecting systems and information through intrusion prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a regulatory compliant, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective.

Important: IBM does not warrant that any systems, products, or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.



Back to topBack to top

Top rule
Prices
Bottom rule

Registered external customers and IBM Business Partners can access IBMLink to view pricing information.

Specify "Price type," "Search type," and "Search value," then click "Search."

Note: Enter program number in the "Search value."

You can also contact your local IBM representative or IBM Business Partner for the applicable charges.

Trademarks

zSecure, z Systems, IBM z Systems and MVS are trademarks of IBM Corporation in the United States, other countries, or both.

IBM, z/OS, DB2, CICS, RACF, QRadar, Passport Advantage, System z, S/390, Parallel Sysplex, OS/390 and z/Architecture are registered trademarks of IBM Corporation in the United States, other countries, or both.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Additional terms of use are located at:

Terms of use

For the most current information regarding IBM products, consult your IBM representative or reseller, or visit the IBM worldwide contacts page

IBM United States