IBM Security Identity Governance and Intelligence V5.2 delivers integrated identity management with access intelligence to ensure appropriate user access is maintained to minimize risks and ensure compliance

IBM United States Software Announcement 215-328
October 27, 2015


Table of contents
OverviewOverviewTechnical informationTechnical information
Key prerequisitesKey prerequisitesOrdering informationOrdering information
Planned availability datePlanned availability dateTerms and conditionsTerms and conditions
DescriptionDescriptionPricesPrices
Program numberProgram numberOrder nowOrder now
PublicationsPublications 

 


(Corrected on December 15, 2015)
Updates made in the Ordering information section.



Top rule
At a glance
Bottom rule

IBM® Security Identity Governance and Intelligence V5.2 delivers:

  • Identity management to enable full identity lifecycle in the organization from self-service access requests through access provisioning and fulfillment to target systems and applications.
  • Access governance to help organizations comply with security and audit requirements and to help control user access in enterprise environments.
  • Access risk analytics and intelligence to provide risk insights and to help optimize role, attribute, and context based access policies and practices.
  • Broad integration capabilities with existing identity management and access governance hubs, such as IBM Security Identity Manager, IBM Security zSecure™, IBM RACF®, SAP GRC (governance, risk and compliance), and service desk portals, such as ServiceNow.


Back to topBack to top

Top rule
Order now
Bottom rule

For ordering, contact your IBM representative or an IBM Business Partner. For more information, contact the Americas Call Centers at: 800-IBM-CALL (426-2255).

Reference: YE001



Back to topBack to top

Top rule
Overview
Bottom rule

IBM Security Identity Governance and Intelligence V5.2 helps organizations create an identity governance infrastructure to help ensure enforcement of security policies in addition to automating existing IT identity management processes. Identity Governance and Intelligence connects IT staff, compliance auditors, and business perspectives for a clear picture of identities and their access. This approach helps simplify the user access and roles design, review, and certification processes while automating processes and simplifying decision making.

Identity Governance and Intelligence combines three core functions of identity management, access governance, and access analytics into one comprehensive offering with the addition of these new key capabilities:

  • Risk analytics and intelligence to analyze, model, and accurately represent complex role, entitlement, and permission data from enterprise resource planning (ERP), IBM z/OS® mainframe, and enterprise applications (SAP GRC) in order to perform access policy and segregation of duties validation across the entire organization.
  • Direct integration with systems and applications to provision and control access through an advanced and feature rich adapters framework.
  • Access governance and compliance on the mainframe through integration with IBM Security zSecure and IBM z/OS mainframe RACF to identify access policy violations and help to remediate excessive user access.
  • Access request self-service extensions to integrate segregation of duties and access policy validations into service desk portals, such as ServiceNow, to deliver seamless and secure user experience.
  • External access request authorization through third-party service desk applications, such as ServiceNow.
  • Enhanced integration with existing identity management deployments, such as IBM Security Identity Manager to provide strong support for role and user access management, access policies, and segregation of duties validations.


Back to topBack to top

Top rule
Key prerequisites
Bottom rule

Refer to the Hardware requirements and Software requirements sections.



Back to topBack to top

Top rule
Planned availability date
Bottom rule

October 30, 2015: For electronic availability

November 30, 2015: For physical availability



Back to topBack to top

Top rule
Description
Bottom rule

IBM Security Identity Governance and Intelligence helps organizations mitigate access risks and access policy violations by using intelligent business-driven identity governance integrated with end-to-end user lifecycle management.

Identity Governance and Intelligence provides functionality to help cover the key enterprise user needs:

  • Visualizing and certifying user access
  • Verifying context and attribute-based policies and providing insight into access risks
  • Providing the ability to prove compliance with auditor-friendly secure compliance reports
  • Automating user access provisioning with self-service access support
  • Delivering application access governance for complex application environments, such as SAP, IBM Security Identity Manager, IBM z/OS mainframe running RACF, and others
  • Role modeling and mining, including full role lifecycle management

Integration of these key identity governance and provisioning functions allows enforcement of access policies and segregation of duties rules while speeding up the process of requesting and approving access. In addition, Identity Governance and Intelligence helps organizations increase user efficiency, reduce IT administration costs, measure and enforce security policies, and manage regulatory compliance.

Identity Governance and Intelligence is offered as a single product with modular options that can be purchased separately to support incremental adoption of various customer use cases from integrating governance capabilities with existing provisioning platforms, extending third-party service desks, for example, ServiceNow, or implementing a complete end to end governance and intelligence solution. Optional modules:

  • IBM Security Identity Governance Compliance helps address extensive regulatory and access governance requirements for user access audit, especially on key systems such as SAP and IBM z/OS mainframe running RACF. It provides:
    • Access review and certification, including violations remediation.
    • Sensitive access and access visibility policies configuration and validation.
    • Segregation of duties policies configuration and validation.
    • Auditor-friendly secure compliance reporting.
  • IBM Security Identity Governance Lifecycle enables basic provisioning for organizations transitioning from manual processes, including key systems, such as SAP and z/OS mainframe running RACF or adding provisioning to service desk applications, such as ServiceNow. It provides:
    • Policy-based and context-based provisioning.
    • Applications and users on-boarding.
    • Request-based provisioning for employee (self-service or supervisor).
    • Audit reporting to show the history of user access.
    • Full entitlement to Identity Manager to extend the support for most advanced and complex access provisioning use cases and password management functions.
  • IBM Security Identity Governance Analytics enables a business centric user access delivery model to identify and prioritize areas of risk. It provides:
    • Role management, modeling, and mining.
    • Role lifecycle management.
    • User access and role model optimization.
    • Risk-based access classification and risk scoring.
  • IBM Security Identity Governance and Intelligence Enterprise Edition is an enterprise-level offering of Compliance, Lifecycle, and Analytics modules with the addition of application adapters in one unified part number

Identity Governance and Intelligence key features and capabilities

Identity intelligence

Identity Governance and Intelligence empowers compliance managers, auditors, and risk managers to govern access and evaluate regulatory compliance across enterprise applications and services using business-driven rules, activities, and processes. Identity intelligence highlights areas of higher access risk, areas for access optimization, and consolidation through visualizations of user access through graphical heat maps. This unique feature simplifies service catalog choices for users requesting access to help assure only compliant options are available to enable seamless day-to-day access provisioning across the enterprise.

Access governance integration into existing processes

Identity Governance and Intelligence enables organizations to more quickly and smoothly integrate access governance capabilities into existing processes rather than changing or implementing them again in a different platform. External access policy validation is designed to integrate with third-party access request and approval workflows implementation, such as ServiceNow, to enable segregation of duties validation before final approval of the request. This service also integrates with dedicated access policy management applications, such as SAP GRC, to consolidate access policy validations into one platform while the application team can continue managing and defining the polices in the application to help ensure proper entitlements are given to the right users.

Insight into user access risks

Identity Governance and Intelligence offers advanced support for segregation of duties modeling through business activities, rather than roles. This approach helps manage access policy separately from user access management and provisioning. Using business activities simplifies policy modeling, and reduces the amount of constraints and toxic access combinations to manage across applications. In addition, access visibility and sensitive access rules can be defined across multiple sets of attributes to allow only compliant access combinations to be visible to users requesting access. And finally, these rules can be combined to define even more complex access policies, for example, purchase order creation and purchase order approval is only allowed in the accounts payable department, but forbidden in the sales department.

During the user access review and certification campaign, these policies allow deeper insight into user access risks. Alternatively, a dedicated campaign can be launched to detect and remediate access policy violations. Access policy adherence is also validated within the self-service access request process to prevent policy violations and ensure appropriate access privileges are given to the users in the organization.

This capability provides greater benefits for organizations with large and complex environments such as IBM z/OS mainframe running RACF, SAP, enterprise resource planning (ERP) platforms, and other enterprise applications. Segregation of duties policies can be validated using application specific objects and models, for example, SAP Transaction and Authorization objects, directly imported and mapped into Identity Governance and Intelligence platform or validated externally through integration with these environments (for example, SAP GRC).

Visualize user access with role mining

Identity Governance and Intelligence lets organizations translate complex access rights into business readable, easy-to-manage and maintain roles. Traditionally, there are two approaches to role modeling: top down and bottom up. Top-down role modeling reflects the organizational structure while bottom-up role modeling reflects access rights through the entitlements assigned to users. Identity Governance and Intelligence allows an organization to set role quality criteria, such as minimum number of constituents in a role and minimum number of entitlements in a role, and to create the right quality roles through a combined optimization of top-down and bottom-up approaches.

Access request management and access provisioning

Identity Governance and Intelligence implements business processes for requesting access and approving access requests using self-service shopping cart-like functions while enforcing access policies. This easy-to-use design allows users to request access to needed roles or entitlements from an application catalog. These requests automatically trigger approval workflows that vary according to the risk level of the requested access from no approval needed to simple, parallel, or very complex approval workflows.

Identity Governance and Intelligence includes a broad set of system, application, and network adapters developed and proven through years of use in IBM Security Identity Manager. These adapters lets organizations exchange data about users and their entitlements with a variety of managed endpoints. These adapters enable Identity Governance and Intelligence to integrate with other products as well as allowing custom written adapters to extend this support.

Access review and certification

Identity Governance and Intelligence enables creation of access review and certification campaigns. A campaign can be scheduled and monitored to help ensure that users only have entitlements justified by their job role and the business activities they need to perform within that role. In addition, access visibility and risk insights campaigns can be launched to identify and remediate segregation of duties violations or validate whether the users are given proper access according to the context they perform their duties within, such as organizational unit, geographical location, or any combination of these and other attributes.



Back to topBack to top

Top rule
Reference information
Bottom rule

Refer to Software Announcement 214-457, dated November 11, 2014.



Back to topBack to top

Top rule
Availability of national languages
Bottom rule
Description Availability date Language
IBM Security Identity Governance and Intelligence and IBM Security Governance and Administration October 30, 2015 Brazilian Portuguese, English, French, German Italian, Japanese, Spanish, Simplified Chinese, Traditional Chinese.


Back to topBack to top

Top rule
Program number
Bottom rule
Program number VRM Program name
5725-T18 5.2 IBM Security Identity Governance and Intelligence
5725-T19 7.1 IBM Security Identity Governance and Administration


Back to topBack to top

Top rule
Education support
Bottom rule

IBM training provides education to support many IBM offerings. Descriptions of courses for IT professionals and managers are on the IBM training website

http://www.ibm.com/services/learning/

Call IBM training at 800-IBM-TEACH (426-8322) for catalogs, schedules, and enrollments.



Back to topBack to top

Top rule
Offering Information
Bottom rule

Product information is available via the Offering Information website

http://www.ibm.com/common/ssi

Also, visit the Passport Advantage® website

http://www.ibm.com/software/passportadvantage



Back to topBack to top

Top rule
Publications
Bottom rule

English documentation for IBM Security Identity Governance and Intelligence V5.2 is available at electronic general availability. National language documentation will be available one week after electronic general availability.

The Quick Start Guide is delivered on a separate DVD.

Product documentation for IBM Security Identity Governance and Intelligence V5.2 is available at electronic general availability at

http://www.ibm.com/support/knowledgecenter/SSGHJR_5.2.0


Back to topBack to top

Top rule
Services
Bottom rule

Software Services

IBM Software Services has the breadth, depth, and reach to manage your services needs. You can leverage the deep technical skills of our lab-based, software services team and the business consulting, project management, and infrastructure expertise of our IBM Global Services team. Also, we extend our IBM Software Services reach through IBM Business Partners to provide an extensive portfolio of capabilities. Together, we provide the global reach, intellectual capital, industry insight, and technology leadership to support a wide range of critical business needs.

To learn more about IBM Software Services or to contact a Software Services sales specialist, visit

http://www.ibm.com/software/sw-services/



Back to topBack to top

Top rule
Technical information
Bottom rule

Specified operating environment

Hardware requirements

Hardware requirements can be found at electronic availability at

http://www.ibm.com/support/knowledgecenter/SSGHJR_5.2.0/com.ibm.igi.doc/installing/cpt/ c_hardware_reqs.html
Software requirements

Software requirements can be found at electronic availability at

http://www.ibm.com/support/knowledgecenter/SSGHJR_5.2.0/com.ibm.igi.doc/installing/cpt/ c_hardware_reqs.html

The program's specifications and specified operating environment information may be found in documentation accompanying the program, if available, such as a readme file, or other information published by IBM, such as an announcement letter. Documentation and other program content may be supplied only in the English language. Such information is provided subject to the following Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and, response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated, or misused, or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service, or security measure can be completely effective in preventing improper use or access. IBM systems, products, and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective.

Important: IBM does not warrant that any systems, products, or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

IBM Electronic Support

The IBM Support Portal is your gateway to technical support. This includes IBM Electronic Support tools and resources, for software and hardware, to help save time and simplify support. The Electronic Support tools can help you find answers to questions, download fixes, troubleshoot, automate data collection, submit and track problems through the Service Request online tool, and build skills. All these tools are made available through your IBM support agreement. Read about the Electronic Support portfolio of tools

http://www.ibm.com/electronicsupport
Access the IBM Support Portal
https://www.ibm.com/support/entry/portal/support
Access the online Service Request tool
http://www.ibm.com/support/servicerequest

Planning information

Packaging

IBM Security Identity Governance and Intelligence is distributed with:

  • International Program License Agreement (Z125-3301)
  • License Information document
  • DVDs
  • Publications (refer to the Publications section)

This program, when downloaded from a website, contains the applicable IBM license agreement and License Information, if appropriate, and will be presented for acceptance at the time of installation of the program. For future reference, the license and License Information will be stored in a directory such as LICENSE.TXT.

Direct customer support

Software Subscription and Support (also referred to as Software Maintenance) is included with licenses purchased through Passport Advantage and Passport Advantage Express®. Product upgrades and technical support are provided by the Software Subscription and Support (Software Maintenance) offering as described in the Agreements. Product upgrades provide the latest versions and releases to entitled software, and technical support provides voice and electronic access to IBM support organizations, worldwide.

IBM includes one year of Software Subscription and Support (also referred to as Software Maintenance) with each program license acquired. The initial period of Software Subscription and Support (Software Maintenance) can be extended by the purchase of a renewal option, if available.



Back to topBack to top

Top rule
Ordering information
Bottom rule

This product is only available via Passport Advantage. It is not available as shrinkwrap.

These products may only be sold directly by IBM or by authorized IBM Business Partners for Software Value Plus.

For more information about IBM Software Value Plus, visit

http://www.ibm.com/partnerworld/page/svp_authorized_portfolio
To locate IBM Business Partners for Software Value Plus in your geography for a specific Software Value Plus portfolio, visit
http://www.ibm.com/partnerworld/wps/bplocator/

Product group: Security

Product:

  • IBM Security Identity Governance and Intelligence: 5725-T18
  • IBM Security Identity Governance and Administration: 5725-T19

Product category: Identity and Access Management


Passport Advantage

Program name/Description Part number
IBM Security Identity Governance Lifecycle (5725-T18)  
IBM Security Identity Governance Lifecycle UVU MONTHLY LICENSE D1K0JLL
IBM Security Identity Governance Analytics (5725-T18)  
IBM Security Identity Governance Analytics UVU Lic + SW S&S 12 Mo D1K0MLL
IBM Security Identity Governance Analytics UVU Annual SW S&S Rnwl E0M54LL
IBM Security Identity Governance Analytics UVU SW S&S Reinstate 12 Mo D1K0NLL
IBM Security Identity Governance Analytics UVU MONTHLY LICENSE D1K0TLL
IBM Security Identity Governance and Intelligence Enterprise Edition ((5725-T18)  
IBM Security Identity Governance and Intelligence Enterprise Edition UVU Lic + SW S&S 12 Mo D1K1GLL
IBM Security Identity Governance and Intelligence Enterprise Edition UVU Annual SW S&S Rnwl E0M5HLL
IBM Security Identity Governance and Intelligence Enterprise Edition UVU SW S&S Reinstate 12 Mo D1K1HLL
IBM Security Identity Governance and Intelligence Enterprise Edition UVU MONTHLY LICENSE D1K1ZLL
IBM Security Identity Governance and Intelligence Enterprise Edition User Value Unit Trade Up License + SW Subscription & Support 12 Months D1K1ILL
IBM Security Identity Governance and Intelligence Enterprise Edition for z Systems User Value Unit from IBM Security Identity Manager Trade Up License + SW Subscription & Support 12 Months D1K1LLL
IBM Security Identity Governance and Intelligence Enterprise Edition PVU Lic + SW S&S 12 Mo D1K25LL
IBM Security Identity Governance and Intelligence Enterprise Edition PVU Annual SW S&S Rnwl E0M5LLL
IBM Security Identity Governance and Intelligence Enterprise Edition PVU SW S&S Reinstate 12 Mo D1K26LL
IBM Security Identity Governance and Intelligence Enterprise Edition PVU MONTHLY LICENSE D1K2HLL

The following part numbers have not changed. Only the description of the following part numbers has changed.

Program name /Description Part number
IBM Security Identity Governance Compliance UVU LIC + SW S&S 12 MO D1B41LL
IBM Security Identity Governance Compliance UVU ANNUAL SW S&S RNWL E0KIYLL
IBM Security Identity Governance Compliance UVU SW S&S REINSTATE 12 MO D1B42LL
IBM Security Identity Governance Compliance UVU MONTHLY LICENSE D1IZGLL
IBM Security Identity Governance Compliance PVU LIC + SW S&S 12 MO D1B4ILL
IBM Security Identity Governance Compliance PVU ANNUAL SW S&S RNWL E0KJ6LL
IBM Security Identity Governance Compliance PVU SW S&S REINSTATE 12 MO D1B4JLL
IBM Security Identity Governance Compliance PVU MONTHLY LICENSE D1IZJLL
IBM Security Identity Governance Lifecycle UVU LIC + SW S&S 12 MO D1B36LL
IBM Security Identity Governance Lifecycle UVU ANNUAL SW S&S RNWL E0KIKLL
IBM Security Identity Governance Lifecycle UVU SW S&S REINSTATE 12 MO D1B37LL


Passport Advantage customer: Media pack entitlement details

Customers with active maintenance or subscription for the products listed are entitled to receive the corresponding media pack.

Media packs description Part number
IBM Security Identity Governance Compliance V5.2 Virtual Appliance, Media Pack BJ00HEN
IBM Security Identity Governance Analytics V5.2 Virtual Appliance, Media Pack BJ00IEN
IBM Security Identity Governance Lifecycle V5.2 Virtual Appliance, Media Pack BJ00JEN
IBM Security Identity Governance and Intelligence Enterprise Edition V5.2 Virtual Appliance, Media Pack BJ00KEN
IBM Security Identity Governance and Administration V7.1, Media Pack BJ00LEN


Cross-platform product for use on z Systems™ Integrated Facility for Linux™ (IFL) engines or zEnterprise® BladeCenter Extension

Order the part numbers that follow when the product is intended to run on zEnterprise BladeCenter Extension or the Linux operating system on z Systems IFL engines. If the product is not intended to run in these environments, order from the other set of part numbers in this announcement. This set of part numbers provides the identical supply and authorization as the other set in this announcement.

Program name/Description Part number
IBM Security Identity Governance Lifecycle (5725-T18)  
IBM Security Identity Governance Lifecycle UVU Linux on z Systems MONTHLY LICENSE D1K0LLL
IBM Security Identity Governance Lifecycle UVU z Systems MONTHLY LICENSE D1K0KLL
IBM Security Identity Governance Analytics (5725-T18)  
IBM Security Identity Governance Analytics UVU z Systems Lic + SW S&S 12 Mo D1K0PLL
IBM Security Identity Governance Analytics UVU z Systems Annual SW S&S Rnwl E0M55LL
IBM Security Identity Governance Analytics UVU z Systems SW S&S Reinstate 12 Mo D1K0QLL
IBM Security Identity Governance Analytics UVU z Systems MONTHLY LICENSE D1K0ULL
IBM Security Identity Governance Analytics UVU for Linux on z Systems Lic + SW S&S 12 Mo D1K0RLL
IBM Security Identity Governance Analytics UVU for Linux on z Systems Annual SW S&S Rnwl E0M56LL
IBM Security Identity Governance Analytics UVU for Linux on z Systems SW S&S Reinstate 12 Mo D1K0SLL
IBM Security Identity Governance Analytics UVU for Linux on z Systems MONTHLY LICENSE D1K1BLL
IBM Security Identity Governance and Intelligence Enterprise Edition (5725-T18)  
IBM Security Identity Governance and Intelligence Enterprise Edition UVU z Systems Lic + SW S&S 12 Mo D1K1JLL
IBM Security Identity Governance and Intelligence Enterprise Edition UVU z Systems Annual SW S&S Rnwl E0M5ILL
IBM Security Identity Governance and Intelligence Enterprise Edition UVU z Systems SW S&S Reinstate 12 Mo D1K1KLL
IBM Security Identity Governance and Intelligence Enterprise Edition UVU z Systems MONTHLY LICENSE D1K20LL
IBM Security Identity Governance and Intelligence Enterprise Edition Linux on z Systems Lic + SW S&S 12 Mo D1K1NLL
IBM Security Identity Governance and Intelligence Enterprise Edition for Linux on z Systems Annual SW S&S Rnwl E0M5JLL
IBM Security Identity Governance and Intelligence Enterprise Edition for Linux on z Systems SW S&S Reinstate 12 Mo D1K1PLL
IBM Security Identity Governance and Intelligence Enterprise Edition UVU for Linux on z Systems MONTHLY LICENSE D1K23LL
IBM Security Identity Governance and Intelligence Enterprise Edition UVU Linux on z Systems from ISIM Trdup Lic + SW S&S 12 Mo D1K1QLL
IBM Security Identity Governance and Intelligence Enterprise Edition PVU z Systems Lic + SW S&S 12 Mo D1K29LL
IBM Security Identity Governance and Intelligence Enterprise Edition PVU z Systems Annual SW S&S Rnwl E0M5MLL
IBM Security Identity Governance and Intelligence Enterprise Edition PVU z Systems SW S&S Reinstate 12 Mo D1K2ALL
IBM Security Identity Governance and Intelligence Enterprise Edition PVU z Systems MONTHLY LICENSE D1K2JLL
IBM Security Identity Governance and Intelligence Enterprise Edition PVU for Linux on z Systems Lic + SW S&S 12 Mo D1K2DLL
IBM Security Identity Governance and Intelligence Enterprise Edition PVU for Linux on z Systems Annual SW S&S Rnwl E0M5NLL
IBM Security Identity Governance and Intelligence Enterprise Edition PVU for Linux on z Systems SW S&S Reinstate 12 Mo D1K2ELL
IBM Security Identity Governance and Intelligence Enterprise Edition PVU for Linux on z Systems MONTHLY LICENSE D1K2KLL

The following part numbers have not changed. Only the description has changed for the following part numbers.

Program name/Description Part number
IBM Security Identity Governance Compliance z Systems UVU LIC + SW S&S 12 MO D1B4ELL
IBM Security Identity Governance Compliance z Systems UVU ANNUAL SW S&S RNWL E0KJ4LL
IBM Security Identity Governance Compliance z Systems UVU SW S&S REINSTATE 12 MO D1B4FLL
IBM Security Identity Governance Compliance Linux on z Systems UVU LIC + SW S&S 12 MO D1B4GLL
IBM Security Identity Governance Compliance Linux on z Systems UVU ANNUAL SW S&S RNWL E0KJ5LL
IBM Security Identity Governance Compliance Linux on z Systems UVU SW S&S REINSTATE 12 MO D1B4HLL
IBM Security Identity Governance Compliance z Systems User Value Unit Monthly License D1IZHLL
IBM Security Identity Governance Compliance Linux on z Systems User Value Unit Monthly License D1IZILL
IBM Security Identity Governance Compliance z Systems PVU LIC + SW S&S 12 MO D1B4LLL
IBM Security Identity Governance Compliance z Systems PVU ANNUAL SW S&S RNWL E0KJ7LL
IBM Security Identity Governance Compliance z Systems PVU SW S&S REINSTATE 12 MO D1B4MLL
IBM Security Identity Governance Compliance Linux on z Systems PVU LIC + SW S&S 12 MO D1B34LL
IBM Security Identity Governance Compliance Linux on z Systems PVU ANNUAL SW S&S RNWL E0KIJLL
IBM Security Identity Governance Compliance Linux on z Systems PVU SW S&S REINSTATE 12 MO D1B35LL
IBM Security Identity Governance Compliance for z Systems Processor Value Unit (PVU) Monthly License D1IZKLL
IBM Security Identity Governance Compliance for Linux on z Systems Processor Value Unit (PVU) Monthly License D1IZLLL
IBM Security Identity Governance Lifecycle z Systems UVU LIC + SW S&S 12 MO D1B39LL
IBM Security Identity Governance Lifecycle z Systems UVU ANNUAL SW S&S RNWL E0KILLL
IBM Security Identity Governance Lifecycle z Systems UVU SW S&S REINSTATE 12 MO D1B3ALL
IBM Security Identity Governance Lifecycle Linux on z Systems UVU LIC + SW S&S 12 MO D1B3BLL
IBM Security Identity Governance Lifecycle Linux on z Systems UVU ANNUAL SW S&S RNWL E0KIMLL
IBM Security Identity Governance Lifecycle Linux on z Systems UVU SW S&S REINSTATE 12 MO D1B3CLL

Charge metric

Program name PID number Charge metric
IBM Security Identity Governance and Intelligence V5.2 5725-T18 Processor Value Unit, User Value Unit
IBM Security Identity Governance and Administration V7.1 5725-T19 Processor Value Unit, User Value Unit

IBM is clarifying the definitions for establishing the number of User Value Unit that must be licensed, when counting Infrequent and External users.

These definitions are updated as follows.

The Users for the purposes of UVU calculation are the sum of all Internal Users, External Users, and Infrequent Users given access to the program or whose access is managed by the program.

  • An Internal User is a unique person that is given access to the program or whose access is managed by the program and is an employee of the licensee or a contractor performing work on behalf of the licensee. Each Internal User equals one User for the purpose of calculating User Value Units.
  • An External User is a unique person that is given access to the program or whose access is managed by the program and is not an employee of the Licensee or a contractor performing work on behalf of the licensee. A ratio of 15 External Users equals 1 User for the purpose of calculating User Value Units.
  • An Infrequent Internal User is an Internal User who accesses the program or whose access is managed by the program less than five times a year. A ratio of 15 Infrequent Internal Users equals 1 User for the purpose of calculating User Value Units.
  • Each Internal, External and Infrequent Internal User must be trackable and auditable.

User definitions for Service Provider

If the licensee is a Service Provider as defined in the International Passport Advantage or the International Passport Advantage Express Agreement, the UVU calculation must be based upon the following:

  • For each end-user customer of the Service Provider, an Internal User is a unique person that is given access to the program or whose access is managed by the program through or as part of the Service Provider's information technology service, and is an employee of the end-user customer or a contractor performing work on behalf of the end-user customer. Each Internal User equals one User for the purpose of calculating User Value Units.
  • For each end-user customer of the Service Provider, an External User is a unique person that is given access to the program or whose access is managed by the program through or as part of the Service Provider's information technology service, and is not an employee of the end-user customer or a contractor performing work on behalf of the end-user customer. A ratio of 15 External Users equals 1 User for the purpose of calculating User Value Units.
  • For each end-user customer of the Service Provider, an Infrequent Internal User is an Internal User that is given access to the program or whose access is managed by the program through or as part of the Service Provider's information technology service less than five times per year. A ratio of 15 Infrequent Internal Users equals 1 User for the purpose of calculating User Value Units.
  • For each end-user customer of the Service Provider, each Internal, External, and Infrequent Internal User must be trackable and auditable.

Users who no longer have access to the program and whose access is no longer managed by the program, but whose identities are retained in the user registry for archival and audit purposes, are not counted for purposes of UVU calculation. User identities must be trackable and auditable.


User Value Unit (UVU)

UVU is a unit of measure by which the program can be licensed. UVU Proofs of Entitlement (PoEs) are based on the number and type of users for the given program. Licensee must obtain sufficient entitlements for the number of UVUs required for licensee's environment as specified in the program specific table. The UVU entitlements are specific to the program and type of user and may not be exchanged, interchanged, or aggregated with UVU entitlements of another program or type of user. Refer to the program specific UVU table.


Processor Value Unit (PVU)

PVU is a unit of measure by which the program can be licensed. The number of PVU entitlements required is based on the processor technology (defined within the PVU table by processor value, brand, type, and model number at the website below) and the number of processors made available to the program. IBM continues to define a processor, for the purpose of PVU-based licensing, to be each processor core on a chip (socket). A dual-core processor chip, for example, has two processor cores. The PVU table can be found at

http://www.ibm.com/software/lotus/passportadvantage/pvu_licensing_for_customers.html
Licensee can deploy the program using either full capacity licensing or virtualization capacity (sub-capacity) licensing according to the Passport Advantage Sub-Capacity Licensing Terms (refer to the web page below). If using full capacity licensing, licensee must obtain PVU entitlements sufficient to cover all activated processor cores* in the physical hardware environment made available to or managed by the program, except for those servers from which the program has been permanently removed. If using virtualization capacity licensing, licensee must obtain entitlements sufficient to cover all activated processor cores made available to or managed by the program, as defined according to the Virtualization Capacity License Counting Rules at
http://www.ibm.com/software/lotus/passportadvantage/Counting_Software_licenses_using_sp ecific_virtualization_technologies.html

* An activated processor core is a processor core that is available for use in a physical or virtual server, regardless of whether the capacity of the processor core can be or is limited through virtualization technologies, operating system commands, BIOS settings, or similar restrictions.

Notes:

  • Some programs may require licenses for the program and what is being managed. In that case, the following applies. In addition to the entitlements required for the program directly, licensee must obtain PVU entitlements for this program sufficient to cover the processor cores managed by the program.
  • Some programs may be licensed on a managed basis only. In that case, the following applies. Instead of the entitlements required for the program directly, licensee must obtain PVU entitlements for this program sufficient to cover the processor cores managed by the program.
  • A few programs on an exception basis may be licensed on a referenced basis. In that case, the following applies. Rather than obtaining entitlements for the activated processor cores available to the program, licensee must obtain PVU entitlements for this program sufficient to cover the environment made available to the referenced program as if the program itself were executing everywhere the referenced program was executing, independent of the basis on which the referenced program is licensed.



Back to topBack to top

Top rule
Terms and conditions
Bottom rule

The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the IBM International Program License Agreement, IBM International Passport Advantage Agreement, and the IBM Agreement for Acquisition of Software Maintenance.

This product is only available via Passport Advantage.

Licensing

IBM International Program License Agreement including the License Information document and PoE govern your use of the program. PoEs are required for all authorized use. Part number products only, offered outside of Passport Advantage, where applicable, are license only and do not include Software Maintenance.

This software license includes Software Subscription and Support (also referred to as Software Maintenance).

Agreement for Acquisition of Software Maintenance

These programs are licensed under the IBM Program License Agreement (IPLA) and the associated Agreement for Acquisition of Software Maintenance, which provide for support with ongoing access to releases and versions of the program. IBM includes one year of Software Subscription and Support (also referred to as Software Maintenance) with the initial license acquisition of each program acquired. The initial period of Software Subscription and Support (also referred to as Software Maintenance) can be extended by the purchase of a renewal option, if available. These programs have a one-time license charge for use of the program and an annual renewable charge for the enhanced support that includes telephone assistance (voice support for defects during normal business hours), as well as access to updates, releases, and versions of the program as long as support is in effect.

License Information number

  • IBM Security Identity Governance Analytics V5.2 (5725-T18): L-AFIA-A25FVL
  • IBM Security Identity Governance Compliance V5.2 (5725-T18): L-AFIA-A25FVL
  • IBM Security Identity Governance Lifecycle V5.2 (5725-T18): L-AFIA-A29CLW
  • IBM Security Identity Governance and Intelligence Enterprise Edition V5.2 (5725-T18): L-AFIA-A29D6V
  • IBM Security Identity Governance and Administration (5725-T19): L-AFIA-A2PH52

The program's License Information will be available for review on the IBM Software License Agreement website

http://www.ibm.com/software/sla/sladb.nsf

Limited warranty applies

Yes

Limited warranty

IBM warrants that when the program is used in the specified operating environment, it will conform to its specifications. The warranty applies only to the unmodified portion of the program. IBM does not warrant uninterrupted or error-free operation of the program or that IBM will correct all program defects. You are responsible for the results obtained from the use of the program.

IBM provides you with access to IBM databases containing information on known program defects, defect corrections, restrictions, and bypasses at no additional charge. For further information, consult the IBM Software Support Handbook found at

http://www.ibm.com/support/handbook
IBM will maintain this information for at least one year after the original licensee acquires the program (warranty period).

Program technical support

Technical support of a program product version or release will be available for a minimum of five years from the general availability date, as long as your Software Subscription and Support (also referred to as Software Maintenance) is in effect.

This technical support allows you to obtain assistance (via telephone or electronic means) from IBM for product-specific, task-oriented questions regarding the installation and operation of the program product. Software Subscription and Support (Software Maintenance) also provides you with access to updates (modifications or fixes), releases, and versions of the program. You will be notified, via announcement letter, of discontinuance of support with 12 months' notice. If you require additional technical support from IBM, including an extension of support beyond the discontinuance date, contact your IBM representative or IBM Business Partner. This extension may be available for a fee.

Money-back guarantee

If for any reason you are dissatisfied with the program and you are the original licensee, you may obtain a refund of the amount you paid for it, if within 30 days of your invoice date you return the program and its PoE to the party from whom you obtained it. If you downloaded the program, you may contact the party from whom you acquired it for instructions on how to obtain the refund.

For clarification, note that (1) for programs acquired under the IBM International Passport Advantage offering, this term applies only to your first acquisition of the program and (2) for programs acquired under any of IBM's On/Off Capacity on Demand (On/Off CoD) software offerings, this term does not apply since these offerings apply to programs already acquired and in use by you.

Volume orders (IVO)

No

Passport Advantage applies

Yes, and through the Passport Advantage website at

http://www.ibm.com/software/passportadvantage

Software Subscription and Support applies

Yes. Software Subscription and Support (also referred to as Software Maintenance) is included with licenses purchased through Passport Advantage and Passport Advantage Express. Product upgrades and Technical Support are provided by the Software Subscription and Support offering as described in the Agreements. Product upgrades provide the latest versions and releases to entitled software and Technical Support provides voice and electronic access to IBM support organizations, worldwide.

IBM includes one year of Software Subscription and Support with each program license acquired. The initial period of Software Subscription and Support can be extended by the purchase of a renewal option, if available.

While your Software Subscription and Support is in effect, IBM provides you assistance for your routine, short duration installation and usage (how-to) questions, and code-related questions. IBM provides assistance via telephone and, if available, electronic access, only to your information systems (IS) technical support personnel during the normal business hours (published prime shift hours) of your IBM support center. (This assistance is not available to your end users.) IBM provides Severity 1 assistance 24 hours a day, 7 days a week. For additional details, consult your IBM Software Support Handbook at

http://www.ibm.com/support/handbook
Software Subscription and Support does not include assistance for the design and development of applications, your use of programs in other than their specified operating environment, or failures caused by products for which IBM is not responsible under the applicable agreements.

For additional information about the International Passport Advantage Agreement and the IBM International Passport Advantage Express Agreement, visit the Passport Advantage website at

http://www.ibm.com/software/passportadvantage

System i Software Maintenance applies

No

Variable charges apply

No

Educational allowance available

Not applicable.



Back to topBack to top

Top rule
Statement of good security practices
Bottom rule

IT system security involves protecting systems and information through prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party.



Back to topBack to top

Top rule
IBM Electronic Services
Bottom rule

Electronic Service Agent™ and the IBM Electronic Support web portal are dedicated to providing fast, exceptional support to IBM Systems customers. The IBM Electronic Service Agent tool is a no-additional-charge tool that proactively monitors and reports hardware events, such as system errors, performance issues, and inventory. The Electronic Service Agent tool can help you stay focused on your company's strategic business initiatives, save time, and spend less effort managing day-to-day IT maintenance issues. Servers enabled with this tool can be monitored remotely around the clock by IBM Support, all at no additional cost to you.

Now integrated into the base operating system of AIX® V5.3, AIX V6.1, and AIX V7.1, Electronic Service Agent is designed to automatically and electronically report system failures and utilization issues to IBM, which can result in faster problem resolution and increased availability. System configuration and inventory information collected by the Electronic Service Agent tool also can be viewed on the secure Electronic Support web portal, and used to improve problem determination and resolution by you and the IBM support team. To access the tool main menu, simply type smitty esa_main, and select Configure Electronic Service Agent. In addition, ESA now includes a powerful web user interface, giving the administrator easy access to status, tool settings, problem information, and filters. For more information and documentation on how to configure and use Electronic Service Agent, refer to

http://www.ibm.com/support/electronic

The IBM Electronic Support portal is a single Internet entry point that replaces the multiple entry points traditionally used to access IBM Internet services and support. This portal enables you to gain easier access to IBM resources for assistance in resolving technical problems. The My Systems and Premium Search functions make it even easier for Electronic Service Agent tool-enabled customers to track system inventory and find pertinent fixes.

Benefits

Increased uptime: The Electronic Service Agent™ tool is designed to enhance the Warranty or Maintenance Agreement by providing faster hardware error reporting and uploading system information to IBM Support. This can translate to less wasted time monitoring the symptoms, diagnosing the error, and manually calling IBM Support to open a problem record. Its 24x7 monitoring and reporting mean no more dependence on human intervention or off-hours customer personnel when errors are encountered in the middle of the night.

Security: The Electronic Service Agent tool is designed to be secure in monitoring, reporting, and storing the data at IBM. The Electronic Service Agent tool is designed to securely transmit either via the Internet (HTTPS or VPN) or modem to provide customers a single point of exit from their site. Communication is one way. Activating Electronic Service Agent does not enable IBM to call into a customer's system.

For additional information, refer to IBM Electronic Service Agent

http://www.ibm.com/support/esa/

More accurate reporting: Because system information and error logs are automatically uploaded to the IBM Support center in conjunction with the service request, you are not required to find and send system information, decreasing the risk of misreported or misdiagnosed errors. Once inside IBM, problem error data is run through a data knowledge management system and knowledge articles are appended to the problem record.

Customized support: Using the IBM ID entered during activation, you can view system and support information in the My Systems and Premium Search sections of the Electronic Support website at

http://www.ibm.com/support/electronic

My Systems provides valuable reports of installed hardware and software using information collected from the systems by Electronic Service Agent. Reports are available for any system associated with your IBM ID. Premium Search combines the function of search and the value of Electronic Service Agent information, providing advanced search of the technical support knowledgebase. Using Premium Search and the Electronic Service Agent information that has been collected from your system, you are able to see search results that apply specifically to your systems.

For more information on how to utilize the power of IBM Electronic Services, contact your IBM Systems Services Representative, or visit

http://www.ibm.com/support/electronic



Back to topBack to top

Top rule
Prices
Bottom rule


Business Partner information

If you are an IBM Business Partner -- Distributor for Workstation Software acquiring products from IBM, you may link to Passport Advantage Online for resellers where you can obtain Business Partner pricing information. An IBM ID and password are required.

https://www.ibm.com/software/howtobuy/passportadvantage/paoreseller


Passport Advantage

For Passport Advantage information and charges, contact your IBM representative or authorized IBM Business Partner for Software Value Plus. Additional information is also available at

http://www.ibm.com/software/passportadvantage

IBM Global Financing

IBM Global Financing offers competitive financing to credit-qualified customers to assist them in acquiring IT solutions. Offerings include financing for IT acquisition, including hardware, software, and services, from both IBM and other manufacturers or vendors. Offerings (for all customer segments: small, medium, and large enterprise), rates, terms, and availability can vary by country. Contact your local IBM Global Financing organization or visit

http://www.ibm.com/financing

IBM Global Financing offerings are provided through IBM Credit LLC in the United States, and other IBM subsidiaries and divisions worldwide to qualified commercial and government customers. Rates are based on a customer's credit rating, financing terms, offering type, equipment type, and options, and may vary by country. Other restrictions may apply. Rates and offerings are subject to change, extension, or withdrawal without notice.

Financing from IBM Global Financing helps you preserve cash and credit lines, enables more technology acquisition within current budget limits, permits accelerated implementation of economically attractive new technologies, offers payment and term flexibility, and can help match project costs to projected benefits. Financing is available worldwide for credit-qualified customers.

For more financing information, visit

http://www.ibm.com/financing



Back to topBack to top

Top rule
Order now
Bottom rule

To order, contact your Americas Call Centers, local IBM representative, or your IBM Business Partner. To identify your local IBM representative or IBM Business Partner call 800-IBM-4YOU (426-4968). For more information, contact the Americas Call Centers.

Phone: 800-IBM-CALL (426-2255)

Fax: 800-2IBM-FAX (242-6329)

For IBM representative: callserv@ca.ibm.com

For IBM Business Partner: pwcs@us.ibm.com

Mail:
IBM Teleweb Customer Support
ibm.com® Sales Execution Center, Americas North
3500 Steeles Ave. East, Tower 3/4
Markham, Ontario
Canada L3R 2Z1
Reference: YE001

The Americas Call Centers, our national direct marketing organization, can add your name to the mailing list for catalogs of IBM products.


Note: Shipments will begin after the planned availability date.


IBM Software Value Plus

These products are available under IBM Software Value Plus, either directly from IBM or through authorized Business Partners who invest in skills and high-value solutions. IBM customers may benefit from the industry-specific or horizontal solutions, skills, and expertise provided by these Business Partners.

Additions to Software Value Plus will be communicated through standard product announcements. For a current list of IBM software available under Software Value Plus, visit

http://www.ibm.com/partnerworld/page/svp_authorized_portfolio_criteria
For questions regarding Software Value Plus, visit
http://www.ibm.com/partnerworld/page/svp_authorized_portfolio_contacts

Trademarks

zSecure, z Systems and Electronic Service Agent are trademarks of IBM Corporation in the United States, other countries, or both.

IBM, RACF, z/OS, Passport Advantage, System i, Express, zEnterprise, AIX and ibm.com are registered trademarks of IBM Corporation in the United States, other countries, or both.

Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Additional terms of use are located at

Terms of use

For the most current information regarding IBM products, consult your IBM representative or reseller, or visit the IBM worldwide contacts page

http://www.ibm.com/planetwide/us/

Share this page

Digg Linked In

Contact IBM

Feedback

-->