IBM Security Guardium Data Protection 11.4 extends real-time analytics on user access to sensitive data to reinforce zero trust principles, supports new data sources for monitoring, and enhances ease of use

IBM United States Software Announcement 221-344
September 14, 2021

Table of contents
OverviewOverviewTechnical informationTechnical information
Key requirementsKey requirementsOrdering informationOrdering information
Planned availability datePlanned availability dateTerms and conditionsTerms and conditions
DescriptionDescriptionPricesPrices
Program numberProgram numberOrder nowOrder now
PublicationsPublicationsWhere availableWhere available


Overview

Top rule

IBM Security™ Guardium® Data Protection helps organizations protect their sensitive data, wherever it resides. It helps promote zero trust principles to tackle key security initiatives, such as addressing data privacy, insider threat, and cloud security. With its data activity monitoring, real-time alerting, actionable data threat insights, and automated compliance workflows, Security Guardium Data Protection makes it easier for organizations to protect their data and evolve their data security program as they modernize their IT landscape.

With Security Guardium Data Protection 11.4, organizations experience smarter alerting, greater usability, and broader data source support. Benefits of Security Guardium Data Protection:

  • Real-time trust evaluation and alerting of potentially untrustworthy user connections to data sources to provide additional context and to promote zero trust security
  • Real-time sensitive object identification in response data of monitored data sources that matches predefined regular expressions for enhanced visibility and to better understand overall risk level
  • HashiCorp Vault integration to streamline connections to data sources and enable cloud-native security automation
  • Support for Remote Authentication Dial-In User Service (RADIUS) integration for secure user access (two-factor authentication) to data sources
  • Continued enhancements and support across data protection capabilities:
    • Enhancements to S-TAPs and External S-TAPs with query rewrite support for Oracle 12c and Oracle 19c to enable data masking and redaction
    • Support for monitoring of AWS RDS for Oracle using Database Streams
    • New Universal Connector (UC) plugins for monitoring Hadoop Distributed File System, AWS RDS for Postgre SQL, and other data sources in an agentless way. Note: Support for these UC plugins is not release dependent, UC plugins are supported with Security Guardium Data Protection 11.3.
    • Support for data classification of Microsoft™ Azure SQL Server, Microsoft Azure SQL Database, and Microsoft Azure SQL Data Warehouse
    • Support for entitlement reporting of Cassandra, Neo4j and Microsoft Azure SQL Database
    • Vulnerability Assessments support for Neo4j and Amazon Redshift
  • Enhancements to increase usability:
    • Improvements to the "to-do list” to let users select, sign, and comment on multiple audit processes
    • Additional capabilities to customize and create tables, and bring in external data for reports, such as IBM® Db2® for z/OS® SQL data
    • Option to compare classification results from separate runs of the same classification process
    • Custom table builder support for data source groups to upload data
    • Simplified deployment experience for external S-TAPs
    • Automatic S-TAP reallocation to facilitate enterprise load balancing needs
    • Support for Simple Network Management Protocol (SNMP) v3
    • Improvements to manage user accounts and streamline authentication workflow while using smard card technology
    • More effective asset management for IBM Security Guardium Vulnerability Assessment with new user-defined dynamic fields and groups for easier sorting of databases
    • Security test synchronization for Security Guardium Vulnerability Assessment to ease the manual effort required to manage and update tests per data source, and test results normalization for easier analysis


Back to topBack to top

Key requirements

Top rule

Security Guardium solution consists of a modular software suite that is built on a hardened Linux® kernel and deployed as a series of preconfigured hardware and software appliances.

For detailed requirements information, see the Software requirements section.



Back to topBack to top

Planned availability date

Top rule

September 17, 2021

See the Availability of national languages section for national language availability.



Back to topBack to top

Description

Top rule

Security Guardium Data Protection secures your data, wherever it resides, with a modern, adaptive, intelligent and connected solution. With Security Guardium Data Protection, organizations gain visibility and enforce consistent security policies across hybrid multicloud environments to help secure their data, and with additional context and integration support, helps align with zero trust principles. Security Guardium Data Protection powers workflows for automated compliance, real-time alerting and response, and advanced analytics to prioritize threats. Security Guardium Data Protection helps to address increasingly complex data security and privacy regulations, while helping to prevent threats and risky users in their tracks.

Security Guardium Data Protection makes it easier for organizations to protect sensitive data and IT infrastructure as they change and grow. It can help protect on-premises and cloud data sources, while reducing costs. Security Guardium Data Protection can quickly assess and harden the highest risk areas and vulnerabilities. It can easily integrate with existing tools to accelerate an incident response and streamline compliance.

Highlights of Security Guardium Data Protection:

  • Protects structured and unstructured data, whether on-premises or cloud data sources, with agent-based and agentless monitoring
  • Identifies sensitive data and assesses data security and privacy risk through classification, data activity monitoring, advanced analytics, and vulnerability assessments
  • Provides detailed threat and user insights through at-a-glance risk views with click-through and drill-down features to investigate further
  • Accelerates compliance auditing and reporting through prebuilt templates, quick starts, and automated reporting workflows
  • Streamlines responses to threats with the ability to block access and redact data in real time, open tickets efficiently, and share insights with other security tools and teams

Security Guardium Data Protection provides the following suite of solutions, including components and modules:

  • IBM Security Guardium Appliances
  • IBM Security Guardium Data Security and Compliance
    • Security Guardium Data Protection
    • Security Guardium Vulnerability Assessment
    • IBM Security Guardium Standard and Advanced Activity Monitor
    • IBM Security Guardium Central Management and Aggregation Pack
    • IBM Security Guardium Data Protection for Files
    • IBM Security Guardium Data Protection for NAS
    • IBM Security Guardium Data Protection for SharePoint

Security Guardium Data Protection is a suite of solutions that provide customizable data protection capabilities for various data source types as identified below:

  • IBM Security Guardium Data Protection for Databases
  • IBM Security Guardium Data Protection for Data Warehouses
  • IBM Security Guardium Data Protection for Database Services
  • IBM Security Guardium Data Protection for SAP HANA
  • IBM Security Guardium Data Protection for Big Data
  • Security Guardium Data Protection for Files
  • IBM Security Guardium Data Protection for z/OS
  • Security Guardium Data Protection for NAS
  • Security Guardium Data Protection for SharePoint

Section 508 of the US Rehabilitation Act

Security Guardium products are capable as of September 17, 2021, when used in accordance with associated IBM documentation, of satisfying the applicable standards, including the Worldwide Consortium Web Content Accessibility Guidelines, European Standard EN 301 349, and US Section 508, provided that any assistive technology used with the product properly interoperates with it. An Accessibility Conformance Statement can be requested on the Product accessibility information website.



Back to topBack to top

Reference information

Top rule

For more information about IBM Security Guardium, see Software Announcement 221-120, dated May 11, 2021.



Back to topBack to top

Availability of national languages

Top rule

Translation information, if available, can be found at the Translation Reports website.



Back to topBack to top

Program number

Top rule

Program number VRM Program name
5737-M13 11.4 IBM Security Guardium Appliances
5725-I12 11.4 IBM Security Guardium Data Security and Compliance
5725-V56 11.4 IBM Security Guardium for Files
5737-H30 11.4 IBM Security Guardium Data Protection for NAS
5737-H31 11.4 IBM Security Guardium Data Protection for SharePoint


Back to topBack to top

Education support

Top rule

IBM training provides education to support many IBM offerings. Descriptions of courses for IT professionals and managers can be found on the IBM Skills Gateway website.

Call IBM training at 800-IBM-TEACH (426-8322) for catalogs, schedules, and enrollments.



Back to topBack to top

Offering Information

Top rule

Product information is available on the IBM Offering Information website.

More information is also available on the Passport Advantage® and Passport Advantage Express website.



Back to topBack to top

Publications

Top rule

No publications are shipped with these programs.

Security Guardium documentation is published in IBM Documentation, electronically downloaded formats, and in IBM Publications Center.



Back to topBack to top

Services

Top rule

Software Services

IBM Software Services has the breadth, depth, and reach to manage your services needs. You can leverage the deep technical skills of the lab-based software services team and the business consulting, project management, and infrastructure expertise of the IBM Global Services team. Also, IBM extends the reach of IBM Software Services through IBM Business Partners to provide an extensive portfolio of capabilities. IBM provides the global reach, intellectual capital, industry insight, and technology leadership to support a wide range of critical business needs.

To learn more about IBM Software Services, contact your Lab Services Sales or Delivery Leader.



Back to topBack to top

Technical information

Top rule

Specified operating environment

Hardware requirements

For information about Security Guardium hardware requirements, see the Software requirements section.

Security Guardium Data Protection continues to support Oracle Exadata as a monitored data source, including installation of Security Guardium agents on the database nodes of the Exadata appliances.

Software requirements

For information about software and system requirements for Security Guardium products, see the IBM Guardium System Requirements and Supported Platforms website.

Such information is provided subject to the following terms. IT system security involves protecting systems and information through prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated, or misused, or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service, or security measure can be completely effective in preventing improper use or access. IBM systems, products, and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective.

Important: IBM does not warrant that any systems, products, or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

IBM Support

IBM Support is your gateway to technical support tools and resources that are designed to help you save time and simplify support. IBM Support can help you find answers to questions, download fixes, troubleshoot, submit and track problem cases, and build skills. Learn and stay informed about the transformation of IBM Support, including new tools, new processes, and new capabilities, by going to the IBM Support Insider.

Planning information

Packaging

These offerings are delivered through the internet. There is no physical media.

Security, auditability, and control

Security Guardium products are installed as a hardened Linux appliance (physical or virtual). The appliance includes various security, audit, and compliance functions to help ensure the availability of the solution, confidentiality of the data stored on the appliance, and accountability for any configuration changes.

The client is responsible for evaluation, selection, and implementation of security features, administrative procedures, and appropriate controls in application systems and communication facilities.



Back to topBack to top

Ordering information

Top rule

For ordering information, consult your IBM representative or IBM Business Partner, or go to the Passport Advantage website.

These programs are available only through Passport Advantage.

These products may only be sold directly by IBM or by IBM Business Partners.

To locate IBM Business Partners in your geography, see the Find a Business Partner page.


Passport Advantage

For ordering information about IBM Security Guardium Data Security and Compliance committed term license (5725-I12) , see Software Announcement 220-445, dated October 20, 2020.

For ordering information for IBM Security Guardium for Files (5725-V56), IBM Security Guardium Data Protection for NAS (5737-H30), IBM Security Guardium Data Protection for SharePoint (5737-H31), and IBM Security Guardium Data Security and Compliance (5725-I12), see Software Announcement 219-507, dated October 22, 2019.

Charge metric

The charge metrics for these licensed products can be found in the following License Information documents:

Program identifier License Information document title License Information document number
5737-H30 IBM Security Guardium Data Protection for NAS L-TESX-C4PRZM
5737-H31 IBM Security Guardium Data Protection for SharePoint L-TESX-C4PS3P
5725-V56 IBM Security Guardium Standard Activity Monitor for Files L-TESX-C4PRD4
5725-V56 IBM Security Guardium Advanced Activity Monitor for Files L-TESX-C4QQQA
5725-V56 IBM Security Guardium Data Protection for Files L-TESX-C4QR5U
5737-M13 IBM Security Guardium Collector x2364 Appliance L-TESX-C54PS3
5737-M13 IBM Security Guardium Collector x3264 Appliance L-TESX-C54PS3
5737-M13 IBM Security Guardium Aggregator x2364 Appliance L-TESX-C54PWR
5737-M13 IBM Security Guardium Aggregator x3264 Appliance L-TESX-C54PWR
5725-I12 IBM Security Guardium Collector Software Appliance L-TESX-C4HPWD
5725-I12 IBM Security Guardium Aggregator Software Appliance L-TESX-C4HQ82
5725-I12 IBM Security Guardium Data Protection for SAP HANA L-TESX-C4QRLW
5725-I12 IBM Security Guardium Data Protection for Database Services L-TESX-C4QRHX
5725-I12 IBM Security Guardium Standard Activity Monitor for Databases L-TESX-C4QRPY
5725-I12 IBM Security Guardium Advanced Activity Monitor for Databases L-TESX-C4QRS6
5725-I12 IBM Security Guardium Standard Activity Monitor for z/OS L-TESX-C4QRUH
5725-I12 IBM Security Guardium Central Management and Aggregation Pack L-TESX-C4HPQ8
5725-I12 IBM Security Guardium Central Management and Aggregation Pack for z/OS L-TESX-C4QRZQ
5725-I12 IBM Security Guardium Advanced Activity Monitor for z/OS L-TESX-C4QS8Y
5725-I12 IBM Security Guardium Standard Activity Monitor for Big Data L-TESX-C4QSBQ
5725-I12 IBM Security Guardium Central Management and Aggregation Pack for Big Data L-TESX-C4QSEF
5725-I12 IBM Security Guardium Advanced Activity Monitor for Big Data L-TESX-C4QSHD
5725-I12 IBM Security Guardium Advanced Activity Monitor for Data Warehouses L-TESX-C4QSLD
5725-I12 IBM Security Guardium Central Management and Aggregation Pack for Data Warehouses L-TESX-C4QSPJ
5725-I12 IBM Security Guardium Vulnerability Assessment for Databases L-TESX-C4QSS6
5725-I12 IBM Security Guardium Standard Activity Monitor for Data Warehouses L-TESX-C4QSUH
5725-I12 IBM Security Guardium Data Protection for Databases L-TESX-C4QRCS
5725-I12 IBM Security Guardium Data Protection for Data Warehouses L-TESX-C4QSXB
5725-I12 IBM Security Guardium Data Protection for Big Data L-TESX-C4QT3Q
5725-I12 IBM Security Guardium Data Protection for z/OS L-TESX-C4QT63

Select your language of choice and scroll down to the Charge Metrics section. Follow-on releases, if any, may have updated terms. See the License Information documents website for more information.



Back to topBack to top

Terms and conditions

Top rule

The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the IBM International Program License Agreement, IBM International Passport Advantage Agreement, and the IBM Agreement for Acquisition of Software Maintenance.

Licensing

IBM International Program License Agreement including the License Information document and Proof of Entitlement (PoE) govern your use of the program. PoEs are required for all authorized use. Part number products only, offered outside of Passport Advantage, where applicable, are license only and do not include Software Maintenance.

This software license includes Software Subscription and Support (also referred to as Software Maintenance).

Software Maintenance

These programs are licensed under the IBM Program License Agreement (IPLA) and the associated Agreement for Acquisition of Software Maintenance, which provide for support with ongoing access to releases and versions of the program. IBM includes one year of Software Subscription and Support (also referred to as Software Maintenance) with the initial license acquisition of each program acquired. The initial period of Software Subscription and Support (also referred to as Software Maintenance) can be extended by the purchase of a renewal option, if available. These programs have a one-time license charge for use of the program and an annual renewable charge for the enhanced support that includes telephone assistance (voice support for defects during normal business hours), as well as access to updates, releases, and versions of the program as long as support is in effect.

License Information number

The following License Information documents apply to the offerings in this announcement:

Program identifier License Information document title License Information document number
5737-H30 IBM Security Guardium Data Protection for NAS L-TESX-C4PRZM
5737-H31 IBM Security Guardium Data Protection for SharePoint L-TESX-C4PS3P
5725-V56 IBM Security Guardium Standard Activity Monitor for Files L-TESX-C4PRD4
5725-V56 IBM Security Guardium Advanced Activity Monitor for Files L-TESX-C4QQQA
5725-V56 IBM Security Guardium Data Protection for Files L-TESX-C4QR5U
5737-M13 IBM Security Guardium Collector x2364 Appliance L-TESX-C54PS3
5737-M13 IBM Security Guardium Collector x3264 Appliance L-TESX-C54PS3
5737-M13 IBM Security Guardium Aggregator x2364 Appliance L-TESX-C54PWR
5737-M13 IBM Security Guardium Aggregator x3264 Appliance L-TESX-C54PWR
5725-I12 IBM Security Guardium Collector Software Appliance L-TESX-C4HPWD
5725-I12 IBM Security Guardium Aggregator Software Appliance L-TESX-C4HQ82
5725-I12 IBM Security Guardium Data Protection for SAP HANA L-TESX-C4QRLW
5725-I12 IBM Security Guardium Data Protection for Database Services L-TESX-C4QRHX
5725-I12 IBM Security Guardium Standard Activity Monitor for Databases L-TESX-C4QRPY
5725-I12 IBM Security Guardium Advanced Activity Monitor for Databases L-TESX-C4QRS6
5725-I12 IBM Security Guardium Standard Activity Monitor for z/OS L-TESX-C4QRUH
5725-I12 IBM Security Guardium Central Management and Aggregation Pack L-TESX-C4HPQ8
5725-I12 IBM Security Guardium Central Management and Aggregation Pack for z/OS L-TESX-C4QRZQ
5725-I12 IBM Security Guardium Advanced Activity Monitor for z/OS L-TESX-C4QS8Y
5725-I12 IBM Security Guardium Standard Activity Monitor for Big Data L-TESX-C4QSBQ
5725-I12 IBM Security Guardium Central Management and Aggregation Pack for Big Data L-TESX-C4QSEF
5725-I12 IBM Security Guardium Advanced Activity Monitor for Big Data L-TESX-C4QSHD
5725-I12 IBM Security Guardium Advanced Activity Monitor for Data Warehouses L-TESX-C4QSLD
5725-I12 IBM Security Guardium Central Management and Aggregation Pack for Data Warehouses L-TESX-C4QSPJ
5725-I12 IBM Security Guardium Vulnerability Assessment for Databases L-TESX-C4QSS6
5725-I12 IBM Security Guardium Standard Activity Monitor for Data Warehouses L-TESX-C4QSUH
5725-I12 IBM Security Guardium Data Protection for Databases L-TESX-C4QRCS
5725-I12 IBM Security Guardium Data Protection for Data Warehouses L-TESX-C4QSXB
5725-I12 IBM Security Guardium Data Protection for Big Data L-TESX-C4QT3Q
5725-I12 IBM Security Guardium Data Protection for z/OS L-TESX-C4QT63

Follow-on releases, if any, may have updated terms. See the License Information documents website for more information.

Limited warranty applies

Yes

Limited warranty

IBM warrants that when the program is used in the specified operating environment, it will conform to its specifications. The warranty applies only to the unmodified portion of the program. IBM does not warrant uninterrupted or error-free operation of the program or that IBM will correct all program defects. You are responsible for the results obtained from the use of the program.

IBM provides you with access to IBM databases containing information on known program defects, defect corrections, restrictions, and bypasses at no additional charge. For further information, see the IBM Support Guide.

IBM will maintain this information for at least one year after the original licensee acquires the program (warranty period).

Program technical support

Technical support of a program version or release will be available for a minimum of two years from the planned availability date, as long as your Software Subscription and Support (also referred to as Software Maintenance) is in effect.

This technical support allows you to obtain assistance by electronic means from IBM for product-specific, task-oriented questions regarding the installation and operation of the program product. Software Subscription and Support (Software Maintenance) also provides you with access to versions, releases, and updates (CD releases, Long Term Support Releases or fixes) of the program. You will be notified, through an announcement letter, of discontinuance of support with six months' notice.

If you require additional technical support from IBM, including an extension of support beyond the discontinuance date, contact your IBM representative or IBM Business Partner. This extension may be available for a fee.

For additional information on the IBM Software Support Lifecycle Policy, see the IBM Software Support Lifecycle Policy website.

Money-back guarantee

If for any reason you are dissatisfied with the program and you are the original licensee, you may obtain a refund of the amount you paid for it, if within 30 days of your invoice date you return the program and its PoE to the party from whom you obtained it. If you downloaded the program, you may contact the party from whom you acquired it for instructions on how to obtain the refund.

For clarification, note that (1) for programs acquired under the IBM International Passport Advantage offering, this term applies only to your first acquisition of the program and (2) for programs acquired under any of IBM's On/Off Capacity on Demand (On/Off CoD) software offerings, this term does not apply since these offerings apply to programs already acquired and in use by you.

Volume orders (IVO)

No

Passport Advantage applies

Yes. Information is available on the Passport Advantage and Passport Advantage Express website.

Software Subscription and Support applies

Yes. Software Subscription and Support, also referred to as Software Maintenance, is included with licenses purchased through Passport Advantage and Passport Advantage Express. Product upgrades and Technical Support are provided by the Software Subscription and Support offering as described in the Agreements. Product upgrades provide the latest versions and releases to entitled software, and Technical Support provides voice and electronic access to IBM support organizations, worldwide.

IBM includes one year of Software Subscription and Support with each program license acquired. The initial period of Software Subscription and Support can be extended by the purchase of a renewal option, if available.

While your Software Subscription and Support is in effect, IBM provides you assistance for your routine, short duration installation and usage (how-to) questions, and code-related questions. IBM provides assistance by telephone and, if available, electronic access, only to your information systems (IS) technical support personnel during the normal business hours (published prime shift hours) of your IBM support center. (This assistance is not available to your users.) IBM provides Severity 1 assistance 24 hours a day, 7 days a week. For additional details, see the IBM Support Guide. Software Subscription and Support does not include assistance for the design and development of applications, your use of programs in other than their specified operating environment, or failures caused by products for which IBM is not responsible under the applicable agreements.

Unless specified otherwise in a written agreement with you, IBM does not provide support for third-party products that were not provided by IBM. Ensure that when contacting IBM for covered support, you follow problem determination and other instructions that IBM provides, including in the IBM Support Guide.

For additional information about the International Passport Advantage Agreement and the IBM International Passport Advantage Express Agreement, go to the Passport Advantage and Passport Advantage Express website.

Variable charges apply

No

Educational allowance available

Not applicable



Back to topBack to top

Statement of good security practices

Top rule

IT system security involves protecting systems and information through intrusion prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a regulatory compliant, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective.

Important: IBM does not warrant that any systems, products, or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.



Back to topBack to top

Prices

Top rule

For additional information and current prices, contact your local IBM representative or IBM Business Partner.


Business Partner information

If you are an IBM Business Partner acquiring products from IBM, you may link to Passport Advantage Online for resellers where you can obtain Business Partner pricing information. An IBMid and password are required to access the IBM Passport Advantage or IBM PartnerWorld® website.


Passport Advantage

For Passport Advantage information and charges, contact your IBM representative or IBM Business Partner. Additional information is also available on the Passport Advantage and Passport Advantage Express website.

IBM Global Financing

IBM Global Financing offers competitive financing to credit-qualified clients to assist them in acquiring IT solutions. Offerings include financing for IT acquisition, including hardware, software, and services, from both IBM and other manufacturers or vendors. Offerings (for all client segments: small, medium, and large enterprise), rates, terms, and availability can vary by country. Contact your local IBM Global Financing organization or go to the IBM Global Financing website for more information.

IBM Global Financing offerings are provided through IBM Credit LLC in the United States, and other IBM subsidiaries and divisions worldwide to qualified commercial and government clients. Rates are based on a client's credit rating, financing terms, offering type, equipment type, and options, and may vary by country. Other restrictions may apply. Rates and offerings are subject to change, extension, or withdrawal without notice.



Back to topBack to top

Order now

Top rule

To order, contact the IBM Digital Sales Center, your local IBM representative, or your IBM Business Partner. To identify your local IBM representative or IBM Business Partner, call 800-IBM-4YOU (426-4968). For more information, contact the IBM Digital Sales Center.

Phone: 800-IBM-CALL (426-2255)

Fax: 800-2IBM-FAX (242-6329)

For IBM representative: askibm@ca. ibm.com®

For IBM Business Partner: pwcs@us. ibm.com



IBM Digital Sales Offices
1177 S Belt Line Rd
Coppell, TX 75019-4642, US

The IBM Digital Sales Center, our national direct marketing organization, can add your name to the mailing list for catalogs of IBM products.


Note: Shipments will begin after the planned availability date.



Back to topBack to top

Where available

Top rule

American Samoa, Guam, Marshall Islands, Federated States of Micronesia, Northern Mariana Islands, Palau, Puerto Rico, United States, and U.S. Virgin Islands

Trademarks

IBM Security is a trademark of IBM Corporation in the United States, other countries, or both.

Guardium, IBM, Db2, z/OS, PartnerWorld, Passport Advantage and ibm.com are registered trademarks of IBM Corporation in the United States, other countries, or both.

Microsoft is a trademark of Microsoft Corporation in the United States, other countries, or both.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Additional terms of use are located at

Terms of use

For the most current information regarding IBM products, consult your IBM representative or reseller, or go to the IBM worldwide contacts page

IBM United States