IBM Security Guardium V10.1 introduces single data security package to bring analytics, protection, and adaptability to security-critical data across enterprise

IBM United States Software Announcement 216-275
July 26, 2016


Table of contents
OverviewOverviewTechnical informationTechnical information
Key prerequisitesKey prerequisitesOrdering informationOrdering information
Planned availability datePlanned availability dateTerms and conditionsTerms and conditions
DescriptionDescriptionPricesPrices
Program numberProgram numberOrder nowOrder now
PublicationsPublications 


Top rule
At a glance
Bottom rule

IBM® Security Guardium® is a comprehensive data security and protection platform that can help you eliminate costly and high-risk manual and siloed approaches to data security and compliance. The Guardium solution can support focused needs such as compliance requirements; it is a solution that can grow with you as your data protection needs change by offering the additional modules that you require.

Module updated in this release:

  • IBM Security Guardium Data Protection V10.1 continuously monitors all data access operations in near-real-time to detect unauthorized actions based on detailed contextual information, such as the identity, search criteria, location, time, and access routes of each critical data access event.


Back to topBack to top

Top rule
Overview
Bottom rule

IBM Security Guardium is designed to help safeguard critical data. Guardium is a comprehensive data protection platform that enables security teams to automatically analyze what is happening in sensitive-data environments (databases, data warehouses, big data platforms, cloud environments, files systems, and so on) to help minimize risk, protect sensitive data from internal and external threats, and seamlessly adapt to IT changes that may impact data security.

Guardium helps ensure the integrity of information in data centers and automate compliance controls.

New IBM Security Guardium Data Protection V10.1 solution

The new Guardium Data Protection solution offers the best of Guardium Activity Monitoring bundled together in one product under a convenient new pricing model based on the number of Managed Virtual Servers or Million Service Units where data is monitored. The Guardium Data Protection solution offers capabilities such as, activity monitoring, blocking, and masking similar to those offered with the Advanced Data Activity Monitoring, and built-in Aggregation and Central Management capabilities similar to those offered with the Central Management and Aggregation products.

Guardium Data Protection is available in two functional packages:

  • Express® Data Protection for Databases. This package is an entry-level solution with preset configurations to monitor and audit databases according to best practices.
  • Data Protection. The full, customizable data protection capabilities are configured in this modular package according to the data source type, such as databases, data warehouses, big data, and files.


Back to topBack to top

Top rule
Key prerequisites
Bottom rule

IBM Security Guardium solution consists of a modular software suite built on a hardened Linux™ kernel and deployed as a series of preconfigured hardware and software appliances.

For additional information, refer to the Software requirements section.



Back to topBack to top

Top rule
Planned availability date
Bottom rule
  • July 29, 2016


Back to topBack to top

Top rule
Description
Bottom rule

IBM Security Guardium products are designed to secure and continuously monitor access to data in enterprise databases, data warehouses, file systems, document sharing solutions, and big data environments, such as Hadoop or NoSQL. Additionally, they are designed to assist you in enforcing your policies for sensitive data access across the enterprise, using a scalable platform. A centralized audit repository designed to optimize Guardium, combined with an integrated application that automates compliance workflow, enables the products to help you streamline compliance validation activities across a wide variety of mandates.

IBM Security Guardium products can help you with these tasks:

  • Monitor data activity and protect sensitive data by:
    • Automatically locating databases and file systems and subsequently discovering and classifying sensitive information within them
    • Enabling high visibility at a granular level into database, file systems, data warehousing, document-sharing, and Hadoop and NoSQL transactions that involve sensitive data
    • Tracking and dynamically masking activities of users who access data indirectly through enterprise applications
    • Monitoring and enforcing a wide range of policies, including sensitive data access, database change control, and privileged user actions
    • Creating a single, secure centralized audit repository for large numbers of heterogeneous systems and databases
    • Automating the entire compliance auditing process, including creating and distributing reports and capturing comments and signatures
  • Harden database infrastructure against vulnerabilities by:
    • Automatically assessing database vulnerabilities and configuration flaws
    • Locking down configurations after recommended changes are implemented
    • Discovering existing entitlements to data to access appropriate access rights

The Guardium solution is designed for ease of use and scalability. It can be configured for a single data repository or a large number of heterogeneous data sources located across the enterprise. It integrates with IT management and other Guardium management solutions that are designed to enable comprehensive data protection across the enterprise.

This solution is available as preconfigured hardware appliances shipped by IBM or as software appliances that may be installed on your platform. Optional features can easily be added to your system after installation.

The Guardium product architecture enables you to select and run the modules appropriate for your immediate needs and to add modules as your requirements grow and change. Available modules include IBM Security Guardium Data Activity Monitor V10.1, IBM Security Guardium Data Protection V10.1, IBM Security Guardium Central Manager and Aggregator Pack V10.1,  IBM Security Guardium Vulnerability Assessment V10.1, IBM Security Guardium Appliances V10.1, and IBM Security Guardium Monitor for Files V10.1.

IBM Security Guardium Data Activity Monitor V10.1

  • Data Activity Monitor and Audit - Standard
    • Data Activity Monitor available for four data environments:
      • Databases, which includes traditional databases
      • Data warehouses
      • Big data (Hadoop and NoSQL databases)
      • File systems
    • Real-time alerts on suspicious activities and other Guardium events
    • Detailed audit reports and built-in compliance workflow engine
    • Application user activity monitoring (Application End-User Identifier)
  • Data Activity Monitor and Audit - Advanced

    All capabilities in Data Activity Monitor Audit - Standard, plus the capability to:

    • Block data traffic according to policy (data-level access control)
    • Quarantine unauthorized user
    • Mask unauthorized extraction of sensitive data
  • Dynamic data masking for SQL traffic, on both the result set or by enforcing fine-grained access to database objects

IBM Security Guardium Data Protection V10.1

  • Express Data Protection for Databases
    • Data Activity Monitor for distributed databases with preset best practices policies
    • Centralized and normalized audit log creation
    • Preset reports and monitoring policies for compliance
  • Data Protection

This new product offers many of the standard capabilities of monitoring, auditing, alert, and advanced capabilities such as, blocking and masking. This is all bundled together with built-in central management and aggression and offered in a convenient pricing model based on the number of Managed Virtual Servers or Million Service Units.

IBM Security Guardium Central Manager and Aggregator Pack V10.1

  • Central Manager and Aggregator application, a single console to manage monitoring policies, deployment templates, health checks, collection of audit records, reporting, and forensic analysis
  • Advanced Compliance Workflow application, which streamlines and automates the processing of compliance and audit records throughout the organization

IBM Security Guardium Vulnerability Assessment V10.1

  • Vulnerability Assessment and Monitoring
    • Database (traditional and NoSQL) Vulnerability Assessment Application for detailed vulnerability assessment reports, including recommended remediation steps and ongoing progression analysis
    • Database Protection Knowledge Base, a subscription-based module, to update the system with the latest threats, vulnerabilities, and best-practices recommendations
    • Configuration Audit System Application (CAS) to determine which database configuration files changed and how.

IBM Security Guardium Appliances V10.1

  • Physical or virtual appliance image, including cloud deployments, or both
  • Enterprise Integrator that imports data from disparate sources to be included in the consolidated audit record for data access
  • Entitlement Reporting that indicates the level of privilege configured for every sensitive object tracked
  • Sensitive Data Finder application which discovers sensitive data within the tracked data sources.

IBM Security Guardium Monitor for Files V10.1

IBM Security Guardium Monitor for Files V10.1 offers a robust, simple-to-use solution that is designed to prevent unauthorized data access and changes to your files and documents stored on file servers, file shares, and attached and removable devices. The solution helps to ensure the integrity of information in the data center and to automate compliance controls. It leverages the overall Guardium infrastructure to offer a scalable platform, intended to enable continuous file activity monitoring from heterogeneous sources, and helps you enforce policies for sensitive data access enterprise-wide.

Gain insight into your data and its owners:

  • Analyze the metadata of your documents and understand their ownership.
  • Analyze the contents of your documents and discover where your most sensitive data is stored.
  • Determine if the right owners have access to the correct data.
  • Discover where unused data resides.
  • Determine if users have too broad of an access level to your most sensitive data.

Protect your sensitive data and provide an audit trail:

  • Detect who is using your data and when.
  • Detect mass copying of files and directories.
  • Detect sudden spikes in file access activity by a user.
  • Receive alerts when monitored files are accessed improperly.
  • Block access to your most sensitive documents.
  • Generate custom reports for all activity.

The IBM Security Guardium product suite addresses the database security and compliance lifecycle with a unified web console, back-end data store, and workflow automation system, which are intended to help you do the following tasks:

  • Locate and classify sensitive information and its entitlements in corporate databases.
  • Assess database and NoSQL database server and operating system vulnerabilities and configuration flaws.
  • Ensure that configurations are locked down after recommended changes are implemented.
  • Enable high visibility and granularity into data transactions and activity, across all supported platforms and protocols, with an audit trail that supports separation of duties and that is designed to be secure and tamper-proof.
  • Track activities on major file systems.
  • Monitor and enforce your policies with alerting and blocking for sensitive data access, privileged user actions, change control, application user activities, and security exceptions such as failed logins.
  • Automate the entire compliance auditing process, including report distribution to oversight teams, sign-offs, and escalations with preconfigured reports relating to Sarbanes-Oxley, PCI DSS, and data privacy.
  • Create a single, centralized audit repository for enterprise-wide compliance reporting, performance optimization, investigations, and forensics.
  • Easily scale from safeguarding a single data source to protecting all data sources in distributed data centers around the world.
  • Enable deeper data activity insights to IT Security Information and Event Management tools for more accurate and effective security intelligence.

Section 508 of the US Rehabilitation Act

IBM makes no representation about the Section 508 status of the third-party electronic and information technology product in this offering. Contact the vendor for specific, current information on the Section 508 status of this product.



Back to topBack to top

Top rule
Availability of national languages
Bottom rule

Translation information, if available, can be found at the Translation Reports website.



Back to topBack to top

Top rule
Program number
Bottom rule
Program number VRM Program name
5725-I12 10.1 IBM Security Guardium Data Security and Compliance
5725-V56 10.1 IBM Security Guardium for Files


Back to topBack to top

Top rule
Education support
Bottom rule

IBM training provides education to support many IBM offerings. Descriptions of courses for IT professionals and managers are on the IBM training website

Call IBM training at 800- IBM -TEACH (426-8322) for catalogs, schedules, and enrollments.



Back to topBack to top

Top rule
Offering Information
Bottom rule

Product information is available on the IBM Offering Information website.

More information is also available on the Passport Advantage® and Passport Advantage Express website.



Back to topBack to top

Top rule
Publications
Bottom rule

No publications are shipped with these programs.

IBM Security Guardium documentation is published in IBM Knowledge Center.



Back to topBack to top

Top rule
Services
Bottom rule

Software Services

IBM Software Services has the breadth, depth, and reach to manage your services needs. You can leverage the deep technical skills of our lab-based, software services team and the business consulting, project management, and infrastructure expertise of our IBM Global Services team. Also, we extend our IBM Software Services reach through IBM Business Partners to provide an extensive portfolio of capabilities. Together, we provide the global reach, intellectual capital, industry insight, and technology leadership to support a wide range of critical business needs.

To learn more about IBM Software Services or to contact a Software Services sales specialist, go to the IBM Software Services website.



Back to topBack to top

Top rule
Technical information
Bottom rule

Specified operating environment

Hardware requirements

For information on hardware requirements, refer to the Software requirements section.

Software requirements

For information about software requirements for Guardium products, refer to the System Requirements/Platforms Supported for IBM Guardium V10.0 website.

The program's specifications and specified operating environment information may be found in documentation accompanying the program, if available, such as a readme file, or other information published by IBM, such as an announcement letter. Documentation and other program content may be supplied only in the English language. Such information is provided subject to the following terms. IT system security involves protecting systems and information through prevention, detection and, response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated, or misused, or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service, or security measure can be completely effective in preventing improper use or access. IBM systems, products, and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective.

Important: IBM does not warrant that any systems, products, or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

IBM Electronic Support

The IBM Support Portal is your gateway to technical support. This includes IBM Electronic Support tools and resources, for software and hardware, to help save time and simplify support. The Electronic Support tools can help you find answers to questions, download fixes, troubleshoot, automate data collection, submit and track problems through the Service Request online tool, and build skills. All these tools are made available through your IBM support agreement. Read about the Electronic Support portfolio of tools on the IBM Electronic Support website.

You can also access the IBM Support Portal page and the online Service requests and PMRs tool for more support.

Planning information

Packaging

IBM Security Guardium products are distributed with the following:

  • DVD

This program, when downloaded from a website, contains the applicable IBM license agreement and License Information, if appropriate, and will be presented for acceptance at the time of installation of the program. For future reference, the license and License Information will be stored in a directory such as LICENSE.TXT.

Security, auditability, and control

IBM Security Guardium products are installed as a hardened Linux appliance (physical or virtual). The appliance includes various security, audit, and compliance functions to help ensure the availability of the solution, confidentiality of the data stored on the appliance, and accountability for any configuration changes.

The customer is responsible for evaluation, selection, and implementation of security features, administrative procedures, and appropriate controls in application systems and communication facilities.



Back to topBack to top

Top rule
Ordering information
Bottom rule

This product is only available through Passport Advantage. It is not available as shrinkwrap.

These products may only be sold directly by IBM or by authorized IBM Business Partners for Software Value Plus.

More information can be found on the IBM Software Value Plus website.

To locate IBM Business Partners for Software Value Plus in your geography for a specific Software Value Plus portfolio, go to the Find a Business Partner page.

Product Group: Security Guardium

Product Identifier Description: 5725-I12, 5725-V56

Product Category: Security Guardium


Passport Advantage

5725-I12 - IBM Security Guardium Data Protection for Databases

Description Part number
IBM Security Guardium Data Protection for Databases Resource Value Unit (MVS) License + SW Subscription & Support 12 Months D1NE3LL
IBM Security Guardium Data Protection for Databases Resource Value Unit (MVS) Annual SW Subscription & Support Renewal 12 Months E0MQKLL
IBM Security Guardium Data Protection for Databases Resource Value Unit (MVS) SW Subscription & Support Reinstatement 12 Months D1NE4LL
IBM Security Guardium Data Protection for Databases Resource Value Unit Monthly License D1NBULL
IBM Security Guardium Data Protection for Databases for Linux on System z® Resource Value Unit (MVS) License + SW Subscription & Support 12 Months D1NE5LL
IBM Security Guardium Data Protection for Databases for Linux on System z Resource Value Unit (MVS) Annual SW Subscription & Support Renewal 12 Months E0MQLLL
IBM Security Guardium Data Protection for Databases for Linux on System z Resource Value Unit (MVS) SW Subscription & Support Reinstatement 12 Months D1NE6LL
IBM Security Guardium Data Protection for Databases for Linux on System z Resource Value Unit Monthly License D1NBVLL

5725-I12 - IBM Security Guardium Data Protection for Data Warehouses

Description Part number
IBM Security Guardium Data Protection for Data Warehouses Resource Value Unit (MVS) License + SW Subscription & Support 12 Months D1NE7LL
IBM Security Guardium Data Protection for Data Warehouses Resource Value Unit (MVS) Annual SW Subscription & Support Renewal 12 Months E0MQMLL
IBM Security Guardium Data Protection for Data Warehouses Resource Value Unit (MVS) SW Subscription & Support Reinstatement 12 Months D1NE8LL
IBM Security Guardium Data Protection for Data Warehouses Resource Value Unit Monthly License D1NBWLL
IBM Security Guardium Data Protection for Data Warehouses for Linux on System z Resource Value Unit (MVS) License + SW Subscription & Support 12 Months D1NE9LL
IBM Security Guardium Data Protection for Data Warehouses for Linux on System z Resource Value Unit (MVS) Annual SW Subscription & Support Renewal 12 Months E0MQNLL
IBM Security Guardium Data Protection for Data Warehouses for Linux on System z Resource Value Unit (MVS) SW Subscription & Support Reinstatement 12 Months D1NEALL
IBM Security Guardium Data Protection for Data Warehouses for Linux on System z Resource Value Unit Monthly License D1NBYLL

5725-I12 - IBM Security Guardium Data Protection for Big Data

Description Part number
IBM Security Guardium Data Protection for Big Data Resource Value Unit (MVS) License + SW Subscription & Support 12 Months D1NEBLL
IBM Security Guardium Data Protection for Big Data Resource Value Unit (MVS) Annual SW Subscription & Support Renewal 12 Months E0MQPLL
IBM Security Guardium Data Protection for Big Data Resource Value Unit (MVS) SW Subscription & Support Reinstatement 12 Months D1NECLL
IBM Security Guardium Data Protection for Big Data Resource Value Unit Monthly License D1NC0LL
IBM Security Guardium Data Protection for Big Data for Linux on System z Resource Value Unit (MVS) License + SW Subscription & Support 12 Months D1NEDLL
IBM Security Guardium Data Protection for Big Data for Linux on System z Resource Value Unit (MVS) Annual SW Subscription & Support Renewal 12 Months E0MQQLL
IBM Security Guardium Data Protection for Big Data for Linux on System z Resource Value Unit (MVS) SW Subscription & Support Reinstatement 12 Months D1NEELL
IBM Security Guardium Data Protection for Big Data for Linux on System z Resource Value Unit Monthly License D1NC1LL

5725-I12 - IBM Security Guardium Data Protection for z/OS®

Description Part number
IBM Security Guardium Data Protection for z/OS for System z VU Value Unit (MSU) License + SW Subscription & Support 12 Months D1NEJLL
IBM Security Guardium Data Protection for z/OS for System z VU Value Unit (MSU) Annual SW Subscription & Support Renewal 12 Months E0MQTLL
IBM Security Guardium Data Protection for z/OS for System z VU Value Unit (MSU) SW Subscription & Support Reinstatement 12 Months D1NEKLL

5725-I12 - IBM Security Guardium Express Data Protection for Databases

Description Part number
IBM Security Guardium Express Data Protection for Databases Resource Value Unit (MVS) License + SW Subscription & Support 12 Months D1NELLL
IBM Security Guardium Express Data Protection for Databases Resource Value Unit (MVS) Annual SW Subscription & Support Renewal 12 Months E0MQULL
IBM Security Guardium Express Data Protection for Databases Resource Value Unit (MVS) SW Subscription & Support Reinstatement 12 Months D1NEMLL
IBM Security Guardium Express Data Protection for Databases Resource Value Unit Monthly License D1NC4LL

5725-V56 - IBM Security Guardium for Files

Description Part number
IBM Security Guardium Data Protection for Files Resource Value Unit (MVS) License + SW Subscription & Support 12 Months D1NEFLL
IBM Security Guardium Data Protection for Files Resource Value Unit (MVS) Annual SW Subscription & Support Renewal 12 Months E0MQRLL
IBM Security Guardium Data Protection for Files Resource Value Unit (MVS) SW Subscription & Support Reinstatement 12 Months D1NEGLL
IBM Security Guardium Data Protection for Files Resource Value Unit Monthly License D1NC2LL
IBM Security Guardium Data Protection for Files for Linux on System z Resource Value Unit (MVS) License + SW Subscription & Support 12 Months D1NEHLL
IBM Security Guardium Data Protection for Files for Linux on System z Resource Value Unit (MVS) Annual SW Subscription & Support Renewal 12 Months E0MQSLL
IBM Security Guardium Data Protection for Files for Linux on System z Resource Value Unit (MVS) SW Subscription & Support Reinstatement 12 Months D1NEILL
IBM Security Guardium Data Protection for Files for Linux on System z Resource Value Unit Monthly License D1NC3LL


Passport Advantage customer: Media pack entitlement details

Customers with active maintenance or subscription for the products listed are entitled to receive the corresponding media pack.

Description Media pack number
IBM Security Guardium Data Protection for Databases V10.1 Multiplatform Multilingual Media Pack BB06RML
IBM Security Guardium Data Protection for Data Warehouses V10.1 Multiplatform Multilingual Media BB06SML
IBM Security Guardium Data Protection for Big Data V10.1 Multiplatform Multilingual Media Pack BB06TML
IBM Security Guardium Data Protection for z/OS V10.1 Multiplatform Media Pack BB06XML
IBM Security Guardium Express Data Protection for Databases V10.1 Multiplatform Multilingual Media Pack BB06YML
IBM Security Guardium Data Protection for Files V10.1 Multiplatform Multilingual Media Pack BB06VML

Charge metric

PID number Program name Charge metric
5725-I12 IBM Security Guardium Data Protection for Databases RVU (Managed Virtual Server)
5725-II2 IBM Security Guardium Data Protection for Data Warehouses RVU (Managed Virtual Server)
5725-I12 IBM Security Guardium Data Protection for Big Data RVU (Managed Virtual Server)
5725-I12 IBM Security Guardium Data Protection for z/OS® RVU (Million Service Units)
5725-I12 IBM Security Guardium Express Data Protection for Databases RVU (Managed Virtual Server)
5725-V56 IBM Security Guardium Data Protection for Files RVU (Managed Virtual Server)


Charge metrics

Resource Value Unit (RVU)

RVU is a unit of measure by which the program can be licensed. RVU Proofs of Entitlement are based on the number of units of a specific resource used or managed by the program. Licensee must obtain sufficient entitlements for the number of RVUs required for licensee's environment for the specific resources as specified in the program specific table. RVU entitlements are specific to the program and the type of resource and may not be exchanged, interchanged, or aggregated with RVU entitlements of another program or resource. Refer to the program-specific RVU table.

Notes:

  • Some programs may require licenses for the resources available to and the resources being managed by the program. In that case, the following applies. In addition to the entitlements required for the resources used by the program directly, licensee must obtain entitlements for this program sufficient to cover the resources managed by the program.
  • Some programs may be licensed on a managed basis only. In that case, the following applies. Instead of the entitlements required for the resources used by the program directly, licensee must obtain entitlements for this program sufficient to cover the resources managed by the program.

Managed Virtual Server

Managed Virtual Server is a unit of measure by which the Program can be licensed. A server is a physical computer that is comprised of processing units, memory, and input/output capabilities and that execute requested procedures, commands, or applications for one or more users or client devices. Where racks, blade enclosures, or other similar equipment is being employed, each separable physical device (for example a blade or a rack-mounted device) that has the required components is considered itself a separate server. A virtual server is either a virtual computer created by partitioning the resources available to a physical server or an unpartitioned physical server. Licensee must obtain Managed Virtual Server entitlements for each virtual server managed by the Program.



Back to topBack to top

Top rule
Terms and conditions
Bottom rule

The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the IBM International Program License Agreement, IBM International Passport Advantage Agreement, and the IBM Agreement for Acquisition of Software Maintenance.

This product is only available through Passport Advantage.

Licensing

IBM International Program License Agreement including the License Information document and Proof of Entitlement (PoE) govern your use of the program. PoEs are required for all authorized use. Part number products only, offered outside of Passport Advantage, where applicable, are license only and do not include Software Maintenance.

This software license includes Software Subscription and Support (also referred to as Software Maintenance).

Agreement for Acquisition of Software Maintenance

These programs are licensed under the IBM Program License Agreement (IPLA) and the associated Agreement for Acquisition of Software Maintenance, which provide for support with ongoing access to releases and versions of the program. IBM includes one year of Software Subscription and Support (also referred to as Software Maintenance) with the initial license acquisition of each program acquired. The initial period of Software Subscription and Support (also referred to as Software Maintenance) can be extended by the purchase of a renewal option, if available. These programs have a one-time license charge for use of the program and an annual renewable charge for the enhanced support that includes telephone assistance (voice support for defects during normal business hours), as well as access to updates, releases, and versions of the program as long as support is in effect.

License Information number

Program number Description License document number
5725-I12 IBM Security Guardium Data Protection for Databases L-TESX-A8RULQ
5725-I12 IBM Security Guardium Data Protection for Data Warehouses L-TESX-A8RUJM
5725-I12 IBM Security Guardium Data Protection for Big Data L-TESX-A8RUE2
5725-I12 IBM Security Guardium Data Protection for z/OS L-TESX-A8RUQT
5725-I12 IBM Security Guardium Express Data Protection for Databases L-TESX-A8RTVU
5725-V56 IBM Security Guardium Data Protection for Files L-TESX-A8RUNA

The program's License Information will be available for review on the IBM Software License Agreement website.

Limited warranty applies

Yes

Limited warranty

IBM warrants that when the program is used in the specified operating environment, it will conform to its specifications. The warranty applies only to the unmodified portion of the program. IBM does not warrant uninterrupted or error-free operation of the program or that IBM will correct all program defects. You are responsible for the results obtained from the use of the program.

IBM provides you with access to IBM databases containing information on known program defects, defect corrections, restrictions, and bypasses at no additional charge. For further information, see the IBM Software Support Handbook.

IBM will maintain this information for at least one year after the original licensee acquires the program (warranty period).

Program technical support

Technical support of a program product version or release will be available for a minimum of five years from the general availability date, as long as your Software Subscription and Support (also referred to as Software Maintenance) is in effect.

This technical support allows you to obtain assistance (by telephone or electronic means) from IBM for product-specific, task-oriented questions regarding the installation and operation of the program product. Software Subscription and Support (Software Maintenance) also provides you with access to updates (modifications or fixes), releases, and versions of the program. You will be notified, through an announcement letter, of discontinuance of support with 12 months' notice. If you require additional technical support from IBM, including an extension of support beyond the discontinuance date, contact your IBM representative or IBM Business Partner. This extension may be available for a fee.

Money-back guarantee

If for any reason you are dissatisfied with the program and you are the original licensee, you may obtain a refund of the amount you paid for it, if within 30 days of your invoice date you return the program and its PoE to the party from whom you obtained it. If you downloaded the program, you may contact the party from whom you acquired it for instructions on how to obtain the refund.

For clarification, note that (1) for programs acquired under the IBM International Passport Advantage offering, this term applies only to your first acquisition of the program and (2) for programs acquired under any of IBM 's On/Off Capacity on Demand (On/Off CoD) software offerings, this term does not apply since these offerings apply to programs already acquired and in use by you.

Volume orders (IVO)

Yes. Contact your IBM representative.

Passport Advantage applies

Yes, information is available on the Passport Advantage and Passport Advantage Express website.

Software Subscription and Support applies

Yes. Software Subscription and Support, also referred to as Software Maintenance, is included with licenses purchased through Passport Advantage and Passport Advantage Express. Product upgrades and Technical Support are provided by the Software Subscription and Support offering as described in the Agreements. Product upgrades provide the latest versions and releases to entitled software, and Technical Support provides voice and electronic access to IBM support organizations, worldwide.

IBM includes one year of Software Subscription and Support with each program license acquired. The initial period of Software Subscription and Support can be extended by the purchase of a renewal option, if available.

While your Software Subscription and Support is in effect, IBM provides you assistance for your routine, short duration installation and usage (how-to) questions, and code-related questions. IBM provides assistance by telephone and, if available, electronic access, only to your information systems (IS) technical support personnel during the normal business hours (published prime shift hours) of your IBM support center. (This assistance is not available to your users.) IBM provides Severity 1 assistance 24 hours a day, 7 days a week. For additional details, see the IBM Software Support Handbook. Software Subscription and Support does not include assistance for the design and development of applications, your use of programs in other than their specified operating environment, or failures caused by products for which IBM is not responsible under the applicable agreements.

Unless specified otherwise in a written agreement with you, IBM does not provide support for third party products that were not provided by IBM. Ensure that when contacting IBM for covered support, you follow problem determination and other instructions that IBM provides, including in the IBM Software Support Handbook.

For additional information about the International Passport Advantage Agreement and the IBM International Passport Advantage Express Agreement, go to the Passport Advantage and Passport Advantage Express website.

System i Software Maintenance applies

No

Variable charges apply

No

Educational allowance available

Not applicable.



Back to topBack to top

Top rule
Statement of good security practices
Bottom rule

IT system security involves protecting systems and information through prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective.

Important: IBM does not warrant that any systems, products, or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.



Back to topBack to top

Top rule
IBM Electronic Services
Bottom rule

Electronic Service Agent™ and the IBM Electronic Support web portal are dedicated to providing fast, exceptional support to organizations that have IBM Systems. The IBM Electronic Service Agent tool is a no-additional-charge tool that proactively monitors and reports hardware events, such as system errors, performance issues, and inventory. The Electronic Service Agent tool can help you stay focused on your company's strategic business initiatives, save time, and spend less effort managing day-to-day IT maintenance issues. Servers enabled with this tool can be monitored remotely around the clock by IBM Support, all at no additional cost to you.

Now integrated into the base operating system of AIX® V5.3, AIX V6.1, and AIX V7.1, Electronic Service Agent is designed to automatically and electronically report system failures and utilization issues to IBM, which can result in faster problem resolution and increased availability. System configuration and inventory information collected by the Electronic Service Agent tool also can be viewed on the secure Electronic Support web portal, and used to improve problem determination and resolution by you and the IBM support team. To access the tool main menu, simply type smitty esa_main, and select Configure Electronic Service Agent. In addition, ESA now includes a powerful web user interface, giving the administrator easy access to status, tool settings, problem information, and filters. For more information and documentation on how to configure and use Electronic Service Agent, go to the IBM Electronic Support website.

The IBM Electronic Support portal is a single Internet entry point that replaces the multiple entry points traditionally used to access IBM Internet services and support. This portal enables you to gain easier access to IBM resources for assistance in resolving technical problems. The My Systems and Premium Search functions make it even easier for organizations that are Electronic Service Agent tool-enabled to track system inventory and find pertinent fixes.

Benefits

Increased uptime: The Electronic Service Agent™ tool is designed to enhance the Warranty or Maintenance Agreement by providing faster hardware error reporting and uploading system information to IBM Support. This can translate to less wasted time monitoring the symptoms, diagnosing the error, and manually calling IBM Support to open a problem record. Its 24 x 7 monitoring and reporting mean human intervention is not required to report errors.

Security: The Electronic Service Agent tool is designed to be secure in monitoring, reporting, and storing the data at IBM. The Electronic Service Agent tool is designed to securely transmit either through the Internet (HTTPS or VPN) or modem to provide organizations a single point of exit from their site. Communication is one way. Activating Electronic Service Agent does not enable IBM to call into an organization's system.

For additional information, go to the http://www.ibm.com/support/esa website.

More accurate reporting: Because system information and error logs are automatically uploaded to the IBM Support Center in conjunction with the service request, you are not required to find and send system information, decreasing the risk of misreported or misdiagnosed errors. Once inside IBM, problem error data is run through a data knowledge management system and knowledge articles are appended to the problem record.

Customized support: Using the IBM ID entered during activation, you can view system and support information in the My Systems and Premium Search sections of the IBM Electronic Support page.

My Systems provides valuable reports of installed hardware and software using information collected from the systems by Electronic Service Agent. Reports are available for any system associated with your IBM ID. Premium Search combines the function of search and the value of Electronic Service Agent information, providing advanced search of the technical support knowledgebase. Using Premium Search and the Electronic Service Agent information that has been collected from your system, you are able to see search results that apply specifically to your systems.

For more information on how to utilize the power of IBM Electronic Services, contact your IBM Systems Services representative, or go to the IBM Electronic Support website.



Back to topBack to top

Top rule
Prices
Bottom rule


Business Partner information

If you are an IBM Business Partner -- Distributor for Workstation Software acquiring products from IBM, you may link to Passport Advantage Online for resellers where you can obtain Business Partner pricing information. An IBM ID and password are required to access the https://www.ibm.com/software/howtobuy/passportadvantage/paoreseller website.


Passport Advantage

For Passport Advantage information and charges, contact your IBM representative or authorized IBM Business Partner for Software Value Plus. Additional information is also available on the Passport Advantage and Passport Advantage Express website.

IBM Global Financing

IBM Global Financing offers competitive financing to credit-qualified customers to assist them in acquiring IT solutions. Offerings include financing for IT acquisition, including hardware, software, and services, from both IBM and other manufacturers or vendors. Offerings (for all customer segments: small, medium, and large enterprise), rates, terms, and availability can vary by country. Contact your local IBM Global Financing organization or go to the IBM Global Financing website for more information.

IBM Global Financing offerings are provided through IBM Credit LLC in the United States, and other IBM subsidiaries and divisions worldwide to qualified commercial and government customers. Rates are based on a customer's credit rating, financing terms, offering type, equipment type, and options, and may vary by country. Other restrictions may apply. Rates and offerings are subject to change, extension, or withdrawal without notice.



Back to topBack to top

Top rule
Order now
Bottom rule

To order, contact your Americas Call Centers, local IBM representative, or your IBM Business Partner. To identify your local IBM representative or IBM Business Partner call 800- IBM -4YOU (426-4968). For more information, contact the Americas Call Centers.

Phone: 800- IBM -CALL (426-2255)

Fax: 800-2IBM-FAX (242-6329)

For IBM representative: callserv@ca.ibm.com

For IBM Business Partner: pwcs@us.ibm.com

Mail:
IBM Teleweb Customer Support
ibm.com® Sales Execution Center, Americas North
3500 Steeles Ave. East, Tower 3/4
Markham, Ontario
Canada L3R 2Z1
Reference:
YE001

The Americas Call Centers, our national direct marketing organization, can add your name to the mailing list for catalogs of IBM products.


Note: Shipments will begin after the planned availability date.


IBM Software Value Plus

These products are available under IBM Software Value Plus, either directly from IBM or through authorized Business Partners who invest in skills and high-value solutions. IBM customers may benefit from the industry-specific or horizontal solutions, skills, and expertise provided by these Business Partners.

Additions to Software Value Plus will be communicated through standard product announcements. For a current list of IBM software available under Software Value Plus, go to the IBM Software Value Plus website.

For questions regarding Software Value Plus, go to the IBM Software Value Plus website.

Trademarks

Electronic Service Agent is a trademark of IBM Corporation in the United States, other countries, or both.

IBM, Guardium, Express, Passport Advantage, System i, System z, z/OS, AIX and ibm.com are registered trademarks of IBM Corporation in the United States, other countries, or both.

Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Additional terms of use are located at

Terms of use

For the most current information regarding IBM products, consult your IBM representative or reseller, or visit the IBM worldwide contacts page

http://www.ibm.com/planetwide/us/

Share this page

Digg Linked In

Contact IBM

Feedback

-->