IBM Secure Perspective bridges the gap between data security policy and practice

IBM United States Software Announcement 208-126
May 27, 2008

 
 ENUS208-126.PDF (108KB)

Table of contents   Document options  
At a glance At a glance Publications Publications
Overview Overview Technical information Technical information
Key prerequisites Key prerequisites Software Services Software Services
Planned availability dates Planned availability dates Ordering information Ordering information
Description Description Terms and conditions Terms and conditions
Program number Program number Prices Prices
Offering Information Offering Information Order now Order now
 
Printable version Printable version

 
Top rule
At a glance
Bottom rule

Secure Perspective offers these features and benefits:

  • Enables multiplatform security control of the IBM� i, IBM AIX, and Microsoft� Windows operating systems, and IBM DB2� databases
  • Creates well-structured natural language security policies
  • Facilitates the mapping of policy to digital assets
  • Performs policy application or compliance check with the click of a button
  • Keeps a record of policy application and compliance activity
  • Lets you see how applying a policy affects business processes
  • Enables a policy to be undone if undesired consequences occur

For ordering, contact your IBM representative, or IBM Americas Call Centers at 800-IBM-CALL (Reference: YE001).


 
Back to topBack to top
 
Top rule
Overview
Bottom rule

IBM Secure Perspective is a revolutionary new tool that enables you to create and manage enforceable security policies using natural language. Based on the idea that the number one priority of a business is to protect critical data, Secure Perspective employs a data-centric security approach, defining who has access to which data for what purposes.

IBM Secure Perspective is an effective tool for enterprises with the following needs:

  • Defining a security policy easily understood by business leaders, IT staff, and auditors
  • Applying a security policy across single systems or entire system groups
  • Showing compliance to nontechnical entities in a way that is easy to read

Business leaders who know how information should be protected can create security policies without needing to know where that information is stored. Data owners and system administrators can map terms from the policy to digital assets. The organization's policy can then be enforced or compliance checked with the click of a button across single systems or entire system groups running the IBM i, IBM AIX, or Microsoft Windows operating system, and IBM DB2 databases.

Secure Perspective includes the tools you need to create organizationally appropriate security. Because of the natural language approach, the policy that defines security is understandable and meaningful to all parties. You can verify compliance with the policy automatically. Reports are easily understood by internal and external parties, including business leaders and auditors. Changes to the security policy in response to an auditor's request can be applied instantly to computers in the organization, avoiding a costly change process.

You can also communicate IT security policy to all parties in an organization and directly apply that policy to protect your organization's most critical data.

For more information, visit

http://www-03.ibm.com/systems/i/advantages/security/rethink_secur ity_policy.html

 
Back to topBack to top
 
Top rule
Key prerequisites
Bottom rule

For information on prerequisites, refer to the Hardware requirements and Software requirements sections.


 
Back to topBack to top
 
Top rule
Planned availability dates
Bottom rule

June 3, 2008 (electronic software delivery).

June 27, 2008 (media and documentation).


 
Back to topBack to top
 
Top rule
Description
Bottom rule

IBM Secure Perspective is a cross-platform tool that truly revolutionizes security and compliance. Using Secure Perspective, you create and manage enforceable data-centric security policy using nontechnical language. By automatically converting the nontechnical language policy into an enforceable set of system-level commands, the tool configures target systems to that policy after informing you of potential problems. The tool also generates a compliance report to show an auditor that the data-centric security implementation represents the policy. Data-centric security is the most rigorous type of security, but it is also the most difficult to deploy and maintain. IBM Secure Perspective solves this problem, enabling you to secure your system to the object or folder level.

Secure Perspective features:

  • Natural language interface that enables business leaders and data owners to define a security policy as it pertains to securing business assets
  • Tool to apply the policy or check compliance against the policy across single systems or entire system groups with the click of a button
  • Historical records of policy application and compliance activity
  • Meaningful reports that are easily understood by internal and external parties, including business leaders and auditors

Secure Perspective structure:

  • Secure Perspective is a web application that you access with a web browser to create and manage enforceable security policies
  • The server component is installed on IBM Power Systems servers running i5/OS V5R3 or IBM i 5.4, or later, or on computer systems running Microsoft Windows operating system
  • Security policy may be applied to systems running the IBM i, IBM AIX,, and Microsoft Windows� operating systems, and IBM DB2 databases

Secure Perspective is the all-in-one security solution that enables you to create and apply a data-centric security policy across your entire business and helps ensure proof of compliance with security policy in an efficient and straightforward manner.


 
Back to topBack to top
 
Top rule
Program number
Bottom rule

Program    VRM                          Program name
number
 
5724-PS1   1.2.0                        IBM Secure Perspective

 
Back to topBack to top
 
Top rule
Offering Information
Bottom rule

Product information is available via the Offering Information Web site

http://www.ibm.com/common/ssi

Also, visit the Passport Advantage� Web site

http://www.ibm.com/software/passportadvantage

 
Back to topBack to top
 
Top rule
Publications
Bottom rule

No publications are shipped with this product.

The IBM Publications Center

http://www.ibm.com/shop/publications/order

The Publications Center is a worldwide central repository for IBM product publications and marketing material with a catalog of 70,000 items. Extensive search facilities are provided. Payment options for orders are via credit card (in the U.S.) or customer number for 20 countries. A large number of publications are available online in various file formats, and they can all be downloaded by all countries.


 
Back to topBack to top
 
Top rule
Technical information
Bottom rule

Specified operating environment

Hardware requirements

IBM Secure Perspective is a J2EE Web application that clients access with a web browser to create and manage enforceable security policies. The server component of the web application is installed on IBM Power Systems servers running i5/OS� V5R3 or IBM i 5.4, or later, or on computer systems running Microsoft Windows 2000 operating system, or later. Systems managed by Secure Perspective are called end points. End points include systems running i5/OS V5R3, IBM i, AIX�, Windows, and DB2.

To install the server component of Secure Perspective on systems running i5/OS V5R3 or IBM i 5.4, or later, use the IBM Systems Workload Estimator to estimate hardware requirements.

To install the server component on systems running the Windows operating system, you need the following hardware:

  • Intel� Pentium� 4 processor, or higher, and at least 2 GB of RAM
  • 300 MB of available disk space

End points running the Windows operating system need the following hardware:

  • Intel Pentium 3 processor, or higher, and at least 1 GB of RAM
  • 300 MB of available disk space

End points running the AIX operating system need the following hardware:

  • IBM Power Systems server running the AIX operating system
  • 300 MB of available disk space

End points running i5/OS V5R3 or IBM i 5.4, or later, and IBM DB2 have no special hardware requirements.

Software requirements

IBM Secure Perspective manages security policy from IBM Power Systems servers running i5/OS V5R3 or IBM i 5.4, or later, or from computer systems running Microsoft Windows 2000 operating system, or later.

Systems managed by Secure Perspective are called end points. End points include systems running i5/OS V5R3, IBM i, AIX, Windows, and DB2. To support this function, you can install software components called agents on systems running AIX or Windows operating systems.

To install the server component on systems running i5/OS V5R3 or IBM i 5.4, or later, you need the following software:

  • i5/OS V5R3 or IBM i 5.4, or later, with the current maintenance package
  • IBM HTTP Server
  • IBM Developer Kit for Java

To install the server component on systems running the Windows operating system, you need the following software:

  • Windows server operating system at current service pack level
  • DB2 V8, or later
  • Java™ 1.5, or later

The following software is required for managing end points:

  • Systems running i5/OS V5R3 or IBM i 5.4, or later, require the IBM Toolbox for Java.
  • Systems running IBM AIX V5.3, or later, require the Secure Perspective agent installation. On AIX systems, only enhanced journaled file system (JFS2) using Extended Attributes format Version 2 can be controlled by Secure Perspective.
  • Systems running Microsoft Windows operating systems require the Secure Perspective agent installation
  • Stand-alone DB2 databases installed on UNIX�, Windows, and Linux� operating systems require accessibility by the Java Database Connectivity (JDBC) universal driver.

The client environment requires one of the following browsers:

  • Internet Explorer V6.0, or later, with the Scalable Vector Graphics (SVG) plug-in installed
  • Firefox V1.5, or later

The Program's specifications and specified operating environment information may be found in documentation accompanying the Program, if available, such as a read-me file, or other information published by IBM, such as an announcement letter. Documentation and other Program content may be supplied only in the English language.

Limitations

IBM Secure Perspective is available only in English.

For additional information, refer to Usage restrictionin the Terms and conditions section of this announcement, or to the license information document that is available on the IBM Software License Agreement Web site

http://www.ibm.com/software/sla/sladb.nsf

Planning information

Customer responsibilities

The customer is responsible for evaluation, selection, and implementation of security features, administrative procedures, and appropriate controls in application systems and communication facilities

Software Maintenance is included with licenses purchased through Passport Advantage and Passport Advantage Express. Product upgrades and technical support are provided by the Software Maintenance offering as described in the Agreements. Product upgrades provide the latest versions and releases to entitled software, and technical support provides voice and electronic access to IBM support organizations, worldwide.

IBM includes one year of Software Maintenance with each program license acquired. The initial period of Software Maintenance can be extended by the purchase of a renewal option, if available.

Packaging

The Secure Perspective package includes two CDs with the product code and a Quick start CD.

Security, auditability, and control

IBM Secure Perspective uses the security and auditability features of the IBM i operating system.

The customer is responsible for evaluation, selection, and implementation of security features, administrative procedures, and appropriate controls in application systems and communication facilities.


 
Back to topBack to top
 
Top rule
Software Services
Bottom rule

IBM Software Services has the breadth, depth, and reach to manage your services needs. You can leverage the deep technical skills of our lab-based, software services team and the business consulting, project management, and infrastructure expertise of our IBM Global Services team. Also, we extend our IBM Software Services reach through IBM Business Partners to provide an extensive portfolio of capabilities. Together, we provide the global reach, intellectual capital, industry insight, and technology leadership to support a wide range of critical business needs.

To learn more about IBM Software Services or to contact a Software Services sales specialist, visit

http://www.ibm.com/software/sw-services/

To locate an IBM Business Partner, visit:

http://www.ibm.com/software/solutions/isv

 
Back to topBack to top
 
Top rule
Ordering information
Bottom rule

This product is only available via Passport Advantage. It is not available as shrinkwrap.

Product information

Licensed function title             Product group   Product
                                                    category
 
IBM Secure Perspective              IBM Other       IBM Secure
                                                    Perspective
Program name                          PID        Charge unit
                                      number     description
 
IBM Secure Perspective                5724-PS1   Processor Value
                                                  Unit (PVU)
IBM Secure Perspective                5724-PS1   Processor Day

Charge metrics definitions

Value Unit

A Value Unit is a pricing charge metric for program license entitlements which is based upon the quantity of a specific designated measurement used for a given program. Each program has a designated measurement. The most commonly used designated measurement is a processor core. However, for select Programs, there are other designated measurements such as users or resources which may include servers, client devices, and messages. The number of Value Unit entitlements required for a program depends on how the program is deployed in your environment and must be obtained from a Value Unit table. You must obtain a PoE for the calculated number of Value Unit entitlements for your implementation. The Value Unit entitlements are specific to a program and may not be exchanged, interchanged, or aggregated with Value Unit entitlements of another program.

Processor (Value Unit)

A processor core is a functional unit within a computing device that interprets and executes instructions. A processor core consists of at least an instruction control unit and one or more arithmetic or logic unit. With multicore technology, each core is considered a processor. Not all processor cores require the same number of Processor Value Unit entitlements. To calculate the number of Processor Value Unit entitlements required, refer to the Processor Value Unit table on the following Web site

http://www-142.ibm.com/software/sw-lotus/services/cwepassport.nsf/ wdocs/pvu_table_for_customers

With full capacity licensing, a PoE must be acquired for the appropriate number of Processor Value Units based on all activated processor cores available for use on the server.

Passport Advantage program licenses

IBM Secure Perspective

Part description                                         Part
                                                         number
 
IBM Secure Perspective
IBM Secure Perspective Processor Value Unit (PVU)        D03TMLL
 License & Software Subsc
IBM Secure Perspective Processor Value Unit (PVU)        E04PILL
 Software Subscription an
IBM Secure Perspective Processor Value Unit (PVU)        D03TNLL
 Software Subscription an

Passport Advantage supply

Program name/description                                 Part
                                                         number
 
IBM Secure Perspective V1.2.0
IBM Secure Perspective multiplatform                    BH03JEN

Passport Advantage customer: Media pack entitlement details

Customers with active maintenance or subscription for the products listed are entitled to receive the corresponding media pack.

IBM Secure Perspective V1.2.0

Entitled maintenance        Media packs description     Part
offerings description                                   number
 
IBM Secure Perspective PVU  IBM Secure Perspective      BH03JEN
                            multiplatform

On/Off CoD

IBM Secure Perspective

Part description                                         Part
                                                         number
 
IBM Secure Perspective Processor Day Per Use-Day OOCoD   D03TCLL

 
Back to topBack to top
 
Top rule
Terms and conditions
Bottom rule

The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the IBM International Program License Agreement, IBM International Passport Advantage Agreement, and the IBM Agreement for Acquisition of Software Maintenance.

Licensing

IBM International Program License Agreement including the License Information document and Proof of Entitlement (PoE) govern your use of the Program. PoEs are required for all authorized use.

Part number products only, offered outside of Passport Advantage, where applicable, are license only and do not include Software Maintenance.

This software license includes Software Maintenance, previously referred to as Software Subscription and Technical Support.

License Information form numbers
Program name                              Program    Form number
                                          number
 
IBM Secure Perspective                    5724-PS1   L-BDON-7CHQRL

The program's License Information will be available for review on the IBM Software License Agreement Web site

http://www.ibm.com/software/sla/sladb.nsf
Limited warranty applies

Yes

Warranty

IBM warrants that when the Program is used in the specified operating environment, it will conform to its specifications. The warranty applies only to the unmodified portion of the Program. IBM does not warrant uninterrupted or error-free operation of the Program or that IBM will correct all Program defects. You are responsible for the results obtained from the use of the Program.

IBM provides you with access to IBM databases containing information on known Program defects, defect corrections, restrictions, and bypasses at no additional charge. Consult the IBM Software Support Handbook for further information at

http://techsupport.services.ibm.com/guides/handbook.html

IBM will maintain this information for at least one year after the original licensee acquires the program (warranty period).

Money-back guarantee

If for any reason you are dissatisfied with the program and you are the original licensee, you may obtain a refund of the amount you paid for it, if within 30 days of your invoice date you return the program and its PoE to the party from whom you obtained it. If you downloaded the program, you may contact the party from whom you acquired it for instructions on how to obtain the refund.

  • For programs acquired under the IBM International Passport Advantage Agreement, this term applies only to your first acquisition of the program.
  • For programs acquired under any of IBM's On/Off CoD software offerings, this term does not apply since these offerings apply to programs already acquired and in use by you.
Authorization for use on home/portable computer

The program may be stored on the primary machine and another machine, provided that the program is not in active use on both machines at the same time. You may not copy and use this program on another computer without paying additional license fees.

Product name
 
IBM Secure Perspective                                        No
Volume orders (IVO)

No

Passport Advantage applies

Yes, and through the Passport Advantage Web site at

http://www.ibm.com/software/passportadvantage

This product is only available via Passport Advantage. It is not available as shrinkwrap.

Usage restriction

Yes

These terms apply to the programs and optionally installable parts ("options") of the programs identified above.

Transfer of program rights and obligations

You may not transfer the Program to another party. You may move the program, subject to your PoE, to another machine within Your Enterprise. An Enterprise is any legal entity (such as a corporation) and the subsidiaries it owns by more than 50 percent.

Upgrade

If the program is an upgrade, you are authorized to use the program only if you are an authorized user of a previous version or release of the program that qualifies you for the upgrade (the "qualifying product"), and provided you either destroy the qualifying product or install the new program on the same machine as the qualifying product and do not transfer the qualifying product to any other person or use it on any other machine.

Authorization

Your authorization to use the program is based on the total number of Processor Value Units (PVU) You have lawfully acquired. IBM defines a "processor" as a core, thus a dual core chip is considered two processor cores. You must have PVU authorizations for each activated processor core controlled by the program's security policy. Any fraction of a processor core must be rounded up to a full processor core in the final aggregation. The PVUs required for each processor family may be found at URL:

http://www.ibm.com/software/lotus/passportadvantage/pvu_licensing_for_ customers.html

If You move the program to a machine which has a processor family with higher PVU requirements or upgrade the machine to activate more processor cores, You must acquire the number of authorizations to cover the additional PVU requirements.

For additional information refer to the License Information Document that is available on the IBM Software License Agreement Web site

http://www.ibm.com/software/sla/sladb.nsf
International Passport Agreement
Agreement for Acquisition of Software Maintenance

The following agreement applies for maintenance and does not require Customer signatures:

IBM Agreement for Acquisition of Software Maintenance (Z125-6011)
Software Maintenance applies

Yes. Software Maintenance is included with licenses purchased through Passport Advantage and Passport Advantage Express. Product upgrades and technical support are provided by the Software Maintenance offering as described in the Agreements. Product upgrades provide the latest versions and releases to entitled software and Technical Support provides voice and electronic access to IBM support organizations, worldwide.

IBM includes one year of Software Maintenance with each program license acquired. The initial period of Software Maintenance can be extended by the purchase of a renewal option, if available.

While your Software Maintenance is in effect, IBM provides you assistance for your routine, short duration installation and usage (how-to) questions, and code-related questions. IBM provides assistance via telephone and, if available, electronic access, to your information systems (IS) technical support personnel during the normal business hours (published prime shift hours) of your IBM support center. (This assistance is not available to your end users.) IBM provides Severity 1 assistance 24 hours a day, 7 days a week. For additional details, consult your IBM Software Support Handbook at

http://techsupport.services.ibm.com/guides/handbook.html

Software Maintenance does not include assistance for the design and development of applications, your use of programs in other than their specified operating environment, or failures caused by products for which IBM is not responsible under the applicable agreements.

For additional information about the International Passport Advantage Agreement and the IBM International Passport Advantage Express Agreement, visit the Passport Advantage Web site at

http://www.ibm.com/software/passportadvantage
System i Software Maintenance applies

No

Educational allowance available

Not applicable.


 
Back to topBack to top
 
Top rule
Prices
Bottom rule

Passport Advantage

For Passport Advantage information and charges, contact your IBM representative or authorized IBM Business Partner. Additional information is also available at

http://www.ibm.com/software/passportadvantage

Business Partner information

If you are an IBM Business Partner -- Distributor for Workstation Software acquiring products from IBM, you may link to Passport Advantage Online for resellers where you can obtain Business Partner pricing information. An IBM ID and password are required.

https://www.ibm.com/software/howtobuy/passportadvantage/paoreseller
https://www.ibm.com/software/howtobuy/passportadvantage/paoreseller/ emea/channelannouncement

 
Back to topBack to top
 
Top rule
Order now
Bottom rule

To order, contact the Americas Call Centers, your local IBM representative.

Identify your local IBM representative, call 800-IBM-4YOU (426-4968).

Phone:      800-IBM-CALL (426-2255)
Fax:        800-2IBM-FAX (242-6329)
Internet:   callserv@ca.ibm.com
Mail:       IBM Teleweb Customer Support
            ibm.com Sales Execution Center, Americas North
            3500 Steeles Ave. East, Tower 3/4
            Markham, Ontario
            Canada
            L3R 2Z1

Reference: YE001

The Americas Call Centers, our national direct marketing organization, can add your name to the mailing list for catalogs of IBM products.


Note: Shipments will begin after the planned availability date.
Trademarks

IBM, DB2, Passport Advantage, i5/OS and AIX are registered trademarks of IBM Corporation in the United States, other countries, or both.

Microsoft and Windows are registered trademarks of Microsoft Corporation in the United States, other countries, or both.

Intel and Pentium are registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.

Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.

UNIX is a registered trademark of The Open Group in the United States and other countries.

Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Additional terms of use are located at:

http://www.ibm.com/legal/us/en/

For the most current information regarding IBM products, consult your IBM representative or reseller, or visit the IBM worldwide contacts page

http://www.ibm.com/planetwide/us/

 

Back to topBack to top
 
Bottom grey rule
 
Printable version Printable version