IBM Security Systems Support

Size: px
Start display at page:

Download "IBM Security Systems Support"

Transcription

1 IBM Security Systems Support Dave Milburn European Customer Support Manager Security Systems - Identity & Access Management (dave_milburn@uk.ibm.com) 23 rd May IBM Corporation

2 Remote Technical Support Suspected product defects Short duration issues involving: Installation Usage (how-to) Specific usage/installation questions for documented functions Product compatibility and interoperability questions Technical references to publications, such as redbooks or manuals Assistance with interpretation of publications Providing available configuration samples Planning information for software fixes IBM database searches Subscription and Support is not structured to address everything -- the following are examples of areas that are beyond its scope: Analyzing performance Writing, troubleshooting or customizing code for a client Answering extensive configuration questions Recovering a database, or data recovery Consulting Most of these types of situations require a Services engagement. **Documented in the IBM Software Support Handbook 2

3 IBM Support Portal 3

4 IBM Support Portal 4

5 Problem Severity and Response Objectives IBM Support Center hours cover the prevailing business hours in the country where your product is licensed and/or your contract is registered IBM will use commercially reasonable efforts to respond to service requests from your authorized contacts within two hours during normal country business hours. Our initial response may result in resolution of your request, or it will form the basis for determining what additional actions may be required to achieve technical resolution of your request. Depending on the complexity of your request, the next response may take days. Be sure you and your support rep agree on what the next action is and when the next checkpoint will be. Note that severity 2, 3, and 4 problems reported offshift will be queued for the next business day. Severity Level Impact Response Goal 1 Critical Business Impact Within two hours 2 Significant Business Impact Within two business hours 3 Some Business Impact Within two business hours 4 Minimal Business Impact Within two business hours 5

6 Software Support Handbook Consolidated includes support information for software and hardware Software Support Handbook displays in easy-to-view format Includes electronic support information Detailed description of support at IBM and includes support contact information 6

7 Increasing Focus on Your PMR Be certain to explain the business impact of your problem and any deadlines to the support engineer. Raise the Severity Level of the problem Ask to speak to the person s manager - Escalations to an IBM manager will receive prompt attention and management focus. You can find contact numbers for your geographic area in the IBM Directory of worldwide contacts. Ask for a Duty Manager The Duty Manager or field manager will work with our technical staff to ensure your request is being handled appropriately. Escalate by opening a Complaint or nominate as a Critical Situation or ( Crit Sit ), if warranted. 7

8 Problem Handling Best Practices For Fastest Resolution Submit problems electronically PMRs routed to engineers faster through automation You document the problem description in writing so the right people are assigned to quickly and accurately focus on the core problem Follow up Severity 1 problems with a phone call, especially during weekends Keep the questions/issues separate provides better service One problem per Service Request/PMR Select the appropriate severity and state the business impact Will help to get the right focus on your problem Keep support informed of major upgrades/implementations Stay current on product release levels Have a QA or test environment equivalent to production Duplicate issues Validate test /ifixes, FixPacks etc. Provide timely data/feedback on recommendations and close the Service Request / PMR Discuss any concerns about collecting data or following recommendations PMRs are closed only with customer permission or if we have attempted to contact you three times and haven t received a response If the problem recurs you may reopen the original Service Request / PMR by resubmitting the problem electronically 8

9 Customer Satisfaction Surveys How satisfied were you with the support you received from remote technical support (i.e., via /web/phone/fax) on this request? How satisfied were you with the time required to reach a technical support representative after opening this support request? How satisfied were you with the communication skills of the remote technical support representative(s)? How satisfied were you with the technical knowledge of the remote technical support representative(s)? How satisfied were you with how well you were kept advised of the problem status for this support request? How satisfied were you with the time it took to receive an answer, resolution, or workaround to your problem? How satisfied were you with the effectiveness of the answer, resolution or workaround Were there any other reasons that you were <rating> with remote technical support on this request, or are there any further comments you would like to make about the support you received? We appreciate and value your feedback we want you to be very satisfied! However, if you are dissatisfied during the life of a PMR please contact the support manager at the earliest opportunity. 9

10 developerworks community 10

11 IBM Security Forums 11

12 What is the Accelerated Value Program? Focus is on maximizing client value from our software and solutions! Proactive Provides advisory assistance, acts as a Trusted Advisor Removes barriers to software adoption Delivers technical knowledge & expertise Researches and communicates new technotes, skills and product features applicable to your business Preventive Reduces technical problems Performs advanced analysis and provides best practices on usage Minimizes implementation errors Provides fix advice and diagnostic coaching Provides customized reporting 12 Personalized Applies knowledge of your environment Pushes client filtered content Builds team competencies Provides continuity of service as a virtual team member and single point of contact

13 Questions? 13

14 Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Software Support Handbook

Software Support Handbook Software Support Handbook Welcome to Ricoh Production Print (RPP) Software Support We have produced this guide with the following objectives in mind: Introduce you to RPP Software Support Share information

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

Addressing Security for Hybrid Cloud

Addressing Security for Hybrid Cloud Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : sreek.iyer@in.ibm.com Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly

More information

Security Intelligence

Security Intelligence IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1 PARADIGM SHIFT in crime Sophistication is INCREASING Attacks are More Targeted Attackers

More information

Post-sales Software Technical Support Overview. This presentation is an overview of Post-Sales Software Technical Support.

Post-sales Software Technical Support Overview. This presentation is an overview of Post-Sales Software Technical Support. IBM Software Support Post-sales Software Technical Support Overview 2012 IBM Corporation This presentation is an overview of Post-Sales Software Technical Support. CustV_PostSalesSupport.pptCustV_PostSalesSupport.ppt

More information

IBM Security Intelligence Strategy

IBM Security Intelligence Strategy IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational

More information

The webinar will begin shortly

The webinar will begin shortly The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security

More information

StorageCraft Technical Support Guide

StorageCraft Technical Support Guide StorageCraft Technical Support Guide StorageCraft Technical Support Services 2014 StorageCraft Technology Corporation. All Rights Reserved. This brochure is for informational purposes only. STORAGECRAFT

More information

Let s talk about assets in QRadar

Let s talk about assets in QRadar QRadar Open Mic Webcast #7 January 28, 2015 Let s talk about assets in QRadar Panelists Dwight Spencer Principal Solutions Architect & Co-founder of Q1 Labs Adam Frank Principal Solutions Architect Brad

More information

Application Security from IBM Karl Snider, Market Segment Manager March 2012

Application Security from IBM Karl Snider, Market Segment Manager March 2012 Application Security from IBM Karl Snider, Market Segment Manager March 2012 1 2012 IBM Corporation Helping Solve Customer Challenges Application Security Finding Application Vulnerabilities GlassBox scanning

More information

Society Protection Best Practices from Industry

Society Protection Best Practices from Industry Society Best Practices from Industry The Nuts and Bolts of the Dynamic Attack Chain 1 October 2015 1 2015 IBM Corporation You are an... IT Security Manager (and a father of three teenagers his wife is

More information

APPLIANCES AT IBM! Version 2.1.4 September 2014

APPLIANCES AT IBM! Version 2.1.4 September 2014 APPLIANCES AT IBM! At IBM, appliances are not new. IBM has had many offerings that fall into the definition of an appliance. Some are traditional hardware-based appliances while others are software-only

More information

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Data Security: Fight Insider Threats & Protect Your Sensitive Data Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand

More information

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Securing the Cloud infrastructure with IBM Dynamic Cloud Security Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: hiepnd@vn.ibm.com 12015 IBM Corporation Cloud is rapidly transforming

More information

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the

More information

Mobile Security. Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

Mobile Security. Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015. Mobile Security Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015 12015 IBM Corporation Where I Started: Blackberry Migration BYOD Bring Your Own

More information

The Current State of Cyber Security

The Current State of Cyber Security The Current State of Cyber Security Bob Kalka, Vice President, IBM Security PARADIGM SHIFT in crime ORGANIZED COLLABORATIVE AUTOMATED 2 Cyber criminals use BUSINESS INTELLIGENCE 3 NOBODY IS IMMUNE 2012

More information

Under the Hood of the IBM Threat Protection System

Under the Hood of the IBM Threat Protection System Under the Hood of the System The Nuts and Bolts of the Dynamic Attack Chain 1 Balazs Csendes IBM Security Intelligence Leader, CEE balazs.csendes@cz.ibm.com 1 You are an... IT Security Manager at a retailer

More information

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Mobile, Cloud, Advanced Threats: A Unified Approach to Security Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or

More information

IBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager.

IBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager. IBM Security Managed Security Services SOC Poland / GSOC Damian Staroscic Security Operations Center (SOC) Manager IBM Security Damian.Staroscic@pl.ibm.com +48-727-036-464 November 27, 2015 Why setting

More information

Technical Support Service Description

Technical Support Service Description Technical Support Service Description www.ipanematech.com Application Performance Guarantee Ipanema Technical Support 01/10/2013 TABLE OF CONTENTS Introduction... 4 A. Technical Support Gold Service overview...

More information

Increased Agility with Integration Testing

Increased Agility with Integration Testing Increased Agility with Integration Testing Monica Luke (mluke@us.ibm.com) Scenario Designer IBM Rational Agenda ALM Community Office Hours Increased Agility with Integration Testing 2 Application Lifecycle

More information

Best Practices with IBM Cognos Framework Manager & the SAP Business Warehouse Agnes Chau Cognos SAP Solution Specialist

Best Practices with IBM Cognos Framework Manager & the SAP Business Warehouse Agnes Chau Cognos SAP Solution Specialist Best Practices with IBM Cognos Framework Manager & the SAP Business Warehouse Agnes Chau Cognos SAP Solution Specialist 2008 IBM Corporation Agenda Objective Interoperability Prerequisites Where to model

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM SECURITY QRADAR INCIDENT FORENSICS IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise

More information

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing

More information

IBM Kenexa Lead Manager can help you source top talent, build strong relationships and generate qualified applications

IBM Kenexa Lead Manager can help you source top talent, build strong relationships and generate qualified applications IBM United States Software Announcement 215-480, dated December 15, 2015 IBM Kenexa Lead Manager can help you source top talent, build strong relationships and generate qualified applications Table of

More information

BigData Analytics per la sicurezza delle Infrastrutture Critiche

BigData Analytics per la sicurezza delle Infrastrutture Critiche BigData Analytics per la sicurezza delle Infrastrutture Critiche Vincenzo Conti IBM Security Sales Consultant Energy and utility organizations are at the forefront of attacks Utilities are among the most

More information

IBM Security Privileged Identity Manager helps prevent insider threats

IBM Security Privileged Identity Manager helps prevent insider threats IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged

More information

IBM United States Software Announcement 215-403, dated October 27, 2015

IBM United States Software Announcement 215-403, dated October 27, 2015 IBM United States Software Announcement 215-403, dated October 27, 2015 IBM Performance Management on Cloud adds a new offering, IBM Website Monitoring on Cloud, as well as new capabilities that extend

More information

How to Choose the Right Security Information and Event Management (SIEM) Solution

How to Choose the Right Security Information and Event Management (SIEM) Solution How to Choose the Right Security Information and Event Management (SIEM) Solution John Burnham Director, Strategic Communications and Analyst Relations IBM Security Chris Meenan Director, Security Intelligence

More information

IBM WebSphere Application Server Communications Enabled Applications

IBM WebSphere Application Server Communications Enabled Applications IBM WebSphere Application Server Communications Enabled Applications Configuring a CEA environment 2011 IBM Corporation This presentation describes how to configure a WebSphere Application Server environment

More information

Introduction to PCI DSS

Introduction to PCI DSS Month-Year Introduction to PCI DSS March 2015 Agenda PCI DSS History What is PCI DSS? / PCI DSS Requirements What is Cardholder Data? What does PCI DSS apply to? Payment Ecosystem How is PCI DSS Enforced?

More information

IBM Rational Software

IBM Rational Software IBM Rational Software Development Conference 2008 A Guided Tour of Jazz.net Bill Higgins Jazz.net and Jazz Web UI Foundation Lead, IBM Rational bhiggins@us.ibm.com SDP 20 2008 IBM Corporation. All rights

More information

Security strategies to stay off the Børsen front page

Security strategies to stay off the Børsen front page Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the

More information

QRadar SIEM 7.2 Windows Event Collection Overview

QRadar SIEM 7.2 Windows Event Collection Overview QRadar Open Mic Webcast #3 August 26, 2014 QRadar SIEM 7.2 Windows Event Collection Overview Panelists Aaron Breen QRadar World-wide Support Leader Adam Frank Principal Solutions Architect Jonathan Pechta

More information

Memory-to-memory session replication

Memory-to-memory session replication Memory-to-memory session replication IBM WebSphere Application Server V7 This presentation will cover memory-to-memory session replication in WebSphere Application Server V7. WASv7_MemorytoMemoryReplication.ppt

More information

and Security in the Era of Cloud

and Security in the Era of Cloud Re-imagine i Enterprise Mobility and Security in the Era of Cloud Brendan Hannigan General Manager, IBM Security Systems Leverage Cloud as a growth engine for business Exploit Mobile to build customer

More information

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to

More information

Enhance visibility into and control over software projects IBM Rational change and release management software

Enhance visibility into and control over software projects IBM Rational change and release management software Enhance visibility into and control over software projects IBM Rational change and release management software Accelerating the software delivery lifecycle Faster delivery of high-quality software Software

More information

Magento Enterprise Edition Technical Support Guide

Magento Enterprise Edition Technical Support Guide Magento Enterprise Edition Technical Support Guide AUGUST 2013 Thank you for using Magento Enterprise Edition. Technical support is a vital part of the total Magento Enterprise Edition customer experience.

More information

IBM Sterling Order Management

IBM Sterling Order Management IBM Sterling Order Management Manage orders and grow revenue across your extended enterprise Overview In this Solution Overview, you will learn: How to obtain cross-channel excellence by efficiently orchestrating

More information

DS Customer Support Team will make reasonable effort to provide high quality Support Service and comply with these Support Policies.

DS Customer Support Team will make reasonable effort to provide high quality Support Service and comply with these Support Policies. CUSTOMER SUPPORT SERVICES POLICIES FOR ONLINE SERVICES FOR DASSASYSTEMES ONLINE 1. At a Glance These Support Policies describe the Support Services applicable to Online Services ordered by Customer pursuant

More information

Magento Technical Support Guide

Magento Technical Support Guide Magento Technical Support Guide April 2012 Thank you for using Magento products and services. Technical support is a vital part of the total Magento customer experience. We want you to get the most from

More information

Securing the Cloud: Making Cloud an Opportunity to Enhance Security

Securing the Cloud: Making Cloud an Opportunity to Enhance Security Securing the Cloud: Making Cloud an Opportunity to Enhance Security February 2016 Greg Coughlin Director, IBM Security @JGCoughlin 1 The rise of Shadow IT? 2 Security reality we have all been compromised

More information

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns

More information

How to reach IBM for support

How to reach IBM for support How to reach IBM for support Lotus Customer Support Gareth Greenwood IBM CEEMEA Lotus Technical Sales & Services Leader Customer support and contact information Support can be called on for all business

More information

Gain a competitive edge through optimized B2B file transfer

Gain a competitive edge through optimized B2B file transfer Gain a competitive edge through optimized B2B file transfer Contents: 1 Centralized systems enable business success 2 Business benefits of strategic file transfer that you can experience for yourself 2

More information

Module 3 Licensed Software TABLE OF CONTENTS. Version 3.0

Module 3 Licensed Software TABLE OF CONTENTS. Version 3.0 1 Module 3 Licensed Software Version 3.0 TABLE OF CONTENTS 1. AGREED TERMS AND INTERPRETATION... 2 2. LICENCE TERMS... 3 3. SUPPLY OF... 8 4. UPDATES AND NEW RELEASES... 9 5. OPEN SOURCE SOFTWARE... 10

More information

Module 5 Software Support Services TABLE OF CONTENTS. Version 3.1

Module 5 Software Support Services TABLE OF CONTENTS. Version 3.1 1 Module 5 Software Support Services TABLE OF CONTENTS Version 3.1 1. AGREED TERMS AND INTERPRETATION... 2 2. SUPPORT PERIOD... 3 3. SCOPE OF SUPPORT SERVICES... 4 4. RESELLER PROVISION OF... 8 5. ANCILLARY

More information

IBM Marketing Cloud adds enterprise packages and offers new capabilities for all packages

IBM Marketing Cloud adds enterprise packages and offers new capabilities for all packages IBM United States Software Announcement 215-492, dated October 27, 2015 adds enterprise packages and offers new capabilities for all packages Table of contents 1 Overview 6 Publications 2 Key prerequisites

More information

A proven 5-step framework for managing supplier performance

A proven 5-step framework for managing supplier performance IBM Software Industry Solutions Industry/Product Identifier A proven 5-step framework for managing supplier performance Achieving proven 5-step spend framework visibility: benefits, for managing barriers,

More information

IBM Software as a Service (SaaS) Support Handbook for IBM Cognos Sales Performance Management

IBM Software as a Service (SaaS) Support Handbook for IBM Cognos Sales Performance Management IBM Software as a Service (SaaS) Support Handbook for IBM Cognos Sales Performance Management Contents Overview... 1 1.0 MONITORING... 2 2.0 SCHEDULED MAINTENANCE... 2 2.1 Notification... 2 2.2 Regular

More information

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence IBM Security Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence Peter Kurfürst Vertrieb IBM Security Lösungen Enterprise-Kunden Baden-Württemberg

More information

IBM Security SiteProtector System Migration Utility Guide

IBM Security SiteProtector System Migration Utility Guide IBM Security IBM Security SiteProtector System Migration Utility Guide Version 3.0 Note Before using this information and the product it supports, read the information in Notices on page 5. This edition

More information

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic IBM Security IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic Version 3.0 Note Before using this information and the product it supports, read the information in Notices

More information

CDP Support Guide. Support Plans & Services

CDP Support Guide. Support Plans & Services CDP Support Guide Support Plans & Services V10 Date: July 2014 Background... 3 Overview... 3 CDP support team... 3 Prevailing document... 3 Supported products... 4 IBM Cognos... 4 IBM Information Management...

More information

IBM Security Intrusion Prevention Solutions

IBM Security Intrusion Prevention Solutions IBM Security Intrusion Prevention Solutions Sarah Cucuz sarah.cucuz@spyders.ca IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints

More information

Improving sales effectiveness in the quote-to-cash process

Improving sales effectiveness in the quote-to-cash process IBM Software Industry Solutions Management Improving sales effectiveness in the quote-to-cash process Improving sales effectiveness in the quote-to-cash process Contents 2 Executive summary 2 Effective

More information

Tait Support Agreement. Assured network communications. Service Description

Tait Support Agreement. Assured network communications. Service Description Tait Support Agreement Assured network communications Service Description CONTACT INFORMATION Tait Communications Corporate Head Office Tait Limited P.O. Box 1645 Christchurch New Zealand For addresses

More information

> SuperSTAR Suite. Customer Support Guide

> SuperSTAR Suite. Customer Support Guide > Customer Support Guide February 7, 2013 Table of Contents Table of Contents... i Tables Reference... ii Space-Time Research Customer Support Plan... 3 Support Policies... 4 Definition of a Support Case...

More information

Simplify security management in the cloud

Simplify security management in the cloud Simplify security management in the cloud IBM Endpoint Manager and IBM SmartCloud offerings provide complete cloud protection Highlights Ensure security of new cloud services by employing scalable, optimized

More information

Minimizing code defects to improve software quality and lower development costs.

Minimizing code defects to improve software quality and lower development costs. Development solutions White paper October 2008 Minimizing code defects to improve software quality and lower development costs. IBM Rational Software Analyzer and IBM Rational PurifyPlus software Kari

More information

Continuous integration using Rational Team Concert

Continuous integration using Rational Team Concert IBM Software Group Continuous integration using Rational Team Concert Peter Steinfeld November 4, 2009 2009 IBM Corporation Overview The importance of using continuous integration How to use Rational Team

More information

L'automazione dei test come elemento chiave delle pratiche DevOps

L'automazione dei test come elemento chiave delle pratiche DevOps L'automazione dei test come elemento chiave delle pratiche DevOps Stefano Sergi WW Solutions Manager - DevOps IBM Systems sergi@us.ibm.com 2013 IBM Corporation Digital transformation requires core capabilities

More information

HP Software Technical Support

HP Software Technical Support HP Software Technical Support HP Technology Services - Contractual Services Technical data HP Software Technical Support provides comprehensive remote software support services for HP software products

More information

Requirements Management im Kontext von DevOps

Requirements Management im Kontext von DevOps IBM Software Group Rational software Requirements Management im Kontext von DevOps DI Steindl Wolfgang https://www.xing.com/profiles/wolfgang_steindl Senior IT Specialist wolfgang.steindl@at.ibm.com http://lnkd.in/tpzrug

More information

Use service virtualization to remove testing bottlenecks

Use service virtualization to remove testing bottlenecks Use service virtualization to remove testing bottlenecks Discover integration faults early by pushing integration testing left in the software lifecycle Contents 1 Complex, interconnected applications

More information

IBM Tivoli Provisioning Manager V 7.1

IBM Tivoli Provisioning Manager V 7.1 IBM Tivoli Provisioning Manager V 7.1 Preparing for patch management in a small environment 2011 IBM Corporation Welcome to the training module for Tivoli Provisioning Manager version 7.1, preparing for

More information

Flexagon Support Services Policy

Flexagon Support Services Policy Flexagon Support Services Policy This Support Services Policy sets forth the terms and conditions under which Flexagon will provide Support Services for certain proprietary Software licensed to Client

More information

MyOfficePlace Business Critical Services Handbook

MyOfficePlace Business Critical Services Handbook MyOfficePlace Business Critical Services Handbook 1. Support overview Mission statement MyOfficePlace LTD. is committed to responding quickly to your inquiries. We will help you ensure that your IT environments

More information

SUPPORT SERVICE POLICIES FOR LICENSED PROGRAMS For indirect channel through VAR

SUPPORT SERVICE POLICIES FOR LICENSED PROGRAMS For indirect channel through VAR DASSAULT SYSTEMES R&D Customer Support 10, Rue Marcel DASSAULT 78140 Vélizy Villacoublay FRANCE SUPPORT SERVICE POLICIES FOR LICENSED PROGRAMS For indirect channel through VAR Date: August 6th, 2014 Summary

More information

Business Process Management IBM Business Process Manager V7.5

Business Process Management IBM Business Process Manager V7.5 Business Process Management IBM Business Process Manager V7.5 Federated task management overview This presentation gives you an overview on the federated task management feature in IBM Business Process

More information

Optimizing government and insurance claims management with IBM Case Manager

Optimizing government and insurance claims management with IBM Case Manager Enterprise Content Management Optimizing government and insurance claims management with IBM Case Manager Apply advanced case management capabilities from IBM to help ensure successful outcomes Highlights

More information

QRadar SIEM 7.2 Flows Overview

QRadar SIEM 7.2 Flows Overview QRadar SIEM 7.2 Flows Overview Panelists Dwight Spencer Principal Solutions Architect & Co-founder of Q1 Labs Aaron Breen QRadar World-wide Support Leader Adam Frank Principal Solutions Architect Dale

More information

Three significant risks of FTP use and how to overcome them

Three significant risks of FTP use and how to overcome them Three significant risks of FTP use and how to overcome them Management, security and automation Contents: 1 Make sure your file transfer infrastructure keeps pace with your business strategy 1 The nature

More information

HP Prior Software Version Support HP Mature Software Product Support

HP Prior Software Version Support HP Mature Software Product Support HP Prior Software Version Support HP Mature Software Product Support HP Technology Services - Contractual Services Technical data HP Prior Software Version Support and HP Mature Software Product Support

More information

Packet Capture Users Guide

Packet Capture Users Guide IBM Security QRadar Version 7.2.2 Packet Capture Users Guide SC27-6512-00 Note Before using this information and the product that it supports, read the information in Notices on page 9. Copyright IBM Corporation

More information

PeopleSoft HelpDesk. Maximized Operational Efficiency. Usability and Role-Based Access

PeopleSoft HelpDesk. Maximized Operational Efficiency. Usability and Role-Based Access PeopleSoft HelpDesk An organization s corporate help desk is the lifeline of the company, ensuring the systems and facilities that employees need to do their jobs are running smoothly at all times. The

More information

Web servers and WebSphere Portal

Web servers and WebSphere Portal Web servers and WebSphere Portal By default IBM WebSphere Portal uses the internal HTTP transport within IBM WebSphere Application Server to handle requests. However, because WebSphere Application Server

More information

The Smart Archive strategy from IBM

The Smart Archive strategy from IBM The Smart Archive strategy from IBM IBM s comprehensive, unified, integrated and information-aware archiving strategy Highlights: A smarter approach to archiving Today, almost all processes and information

More information

Binary Tree Support. Comprehensive User Guide

Binary Tree Support. Comprehensive User Guide Binary Tree Support Comprehensive User Guide Updated: 5/14/2013 TABLE OF CONTENTS About this Guide... 4 Standard Support... 4 Advanced Support... 4 Service Level Agreement (SLA)... 5 Binary Tree Support

More information

.trustwave.com Updated October 9, 2007 TECHNICAL ASSISTANCE CENTER (TAC) SUPPORT GUIDE

.trustwave.com Updated October 9, 2007 TECHNICAL ASSISTANCE CENTER (TAC) SUPPORT GUIDE .trustwave.com Updated October 9, 2007 TECHNICAL ASSISTANCE CENTER (TAC) SUPPORT GUIDE Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright

More information

HP Foundation Care Service

HP Foundation Care Service Technical data HP Foundation Care Service HP Services HP Foundation Care Service (HP Foundation Care) is composed of comprehensive hardware and software services aimed to help increase the availability

More information

Gamified Onboarding Project

Gamified Onboarding Project Gamified Onboarding Project Notes/Scripts from the videos Table of Contents Step 1 How to obtain an IBM ID Notes from the video... 2 Step 2a Signup for Service Request Notes from the video... 2 Step 2b

More information

Extreme Networks Security Upgrade Guide

Extreme Networks Security Upgrade Guide Extreme Networks Security Upgrade Guide 9034868 Published July 2015 Copyright 2012 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in specifications and

More information

CTERA Support Policy

CTERA Support Policy CTERA Support Policy May 2015 Version 2.0 2015, CTERA Networks. All rights reserved. Contents Our Commitment to Support ------------------------------------------------------------------------ 2 Terms

More information

Contract management's effect on in house counsel

Contract management's effect on in house counsel IBM Software Industry Solutions Industry/Product Identifier Contract management's effect on in house counsel Impacting contract visibility, analysis and compliance Emptoris Contract Management Solutions

More information

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management Security Services Architect & Advisor, IBM Italia Intervento al Security Summit Milano 2016 15 aprile Autore

More information

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Getting Started Guide Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished

More information

MSC Software Standard Software Maintenance & Technical Support Usage Guide

MSC Software Standard Software Maintenance & Technical Support Usage Guide About this document: Technical Support Usage Guide is written to educate and help customers in: Clarifying the extent of technical assistance extended to the customer in return for the Maintenance service

More information

Rational Asset Manager 7.2 Editions and Licensing

Rational Asset Manager 7.2 Editions and Licensing Rational Asset Manager 7.2 Editions and Licensing Derek D. Baron, ddbaron@us.ibm.com Product Manager, Rational Asset Manager 2009 IBM Corporation IBM Corporation 200 The information contained in this presentation

More information

Security Intelligence Solutions

Security Intelligence Solutions Security Intelligence Solutions Know what is going on inside your enterprise with QRadar Joseph Skocich, WW Sales Integration Executive Q1 Labs, an IBM Company June 2012 jskocich@us.ibm.com What is Security

More information

Reducing the cost and complexity of endpoint management

Reducing the cost and complexity of endpoint management IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and

More information

IBM Innovate 2011. AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance

IBM Innovate 2011. AppScan: Introducin g Security, a first. Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance IBM Innovate 2011 Bobby Walters Consultant, ATSC bwalters@atsc.com Application Security & Compliance AppScan: Introducin g Security, a first June 5 9 Orlando, Florida Agenda Defining Application Security

More information

IBM Analytical Decision Management

IBM Analytical Decision Management IBM Analytical Decision Management Deliver better outcomes in real time, every time Highlights Organizations of all types can maximize outcomes with IBM Analytical Decision Management, which enables you

More information

Technical Support User Guide

Technical Support User Guide Technical Support User Guide Lightspeed Systems Technical Support User Guide 1 Table of Contents Welcome... 3 Technical Support Overview... 3 Lightspeed Systems Global Technical Support Program... 3 Hardware

More information