473,799 Members | 3,101 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Mainframe software pricing, DB2, RACF, security/audit

Hi all,
I am new to mainframes and am doing some research to look for security
solutions for our mainframe environment. I appreciate any responses
that will help me out.

I have a few questions, primarily around pricing for mainframe
software and add-ons.

- How is software for mainframe priced. eg. DB2 and any add-on
products that are sold. What are typical $ figures for a database
solution.
- How is RACF sold on the z/OS, z9 and iSeries platforms. What are
typical $ figures for a security solution
- How is third party software priced for mainframe platforms.
- What are the common 3rd party audit, security and activity
monitoring solutions for DB2 on mainframe? How are they priced and
what are the typical $ figures.

Thanks in advance!
Feb 4 '08 #1
1 2601
With DB2 for i5/OS the security & auditing is an integrated part of
the i5/OS, not an additional feature [no RACF]. The DB2 itself is part
of i5/OS. Thus both DB2 for i5/OS and its security & auditing [plus
work management, scheduling, tuning, monitoring, job accounting, backup,
http, ...] are included with the price of the OS. The i5/OS is sold
with user pricing on the low-end, and tiered pricing on the mid to large
systems.

I would expect the best method to obtain pricing information is to
engage IBM sales; e.g. via:
http://www.ibm.com/systems/z
http://www.ibm.com/systems/i

Regards, Chuck
--
All comments provided "as is" with no warranties of any kind
whatsoever and may not represent positions, strategies, nor views of my
employer

sy******@gmail. com wrote:
Hi all,
I am new to mainframes and am doing some research to look for security
solutions for our mainframe environment. I appreciate any responses
that will help me out.

I have a few questions, primarily around pricing for mainframe
software and add-ons.

- How is software for mainframe priced. eg. DB2 and any add-on
products that are sold. What are typical $ figures for a database
solution.
- How is RACF sold on the z/OS, z9 and iSeries platforms. What are
typical $ figures for a security solution
- How is third party software priced for mainframe platforms.
- What are the common 3rd party audit, security and activity
monitoring solutions for DB2 on mainframe? How are they priced and
what are the typical $ figures.

Thanks in advance!
Feb 12 '08 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
383
by: Jack | last post by:
I am working on a dotnet project to write an application that can audit and write registry and local security policy entries on multiple standalone (not networked) and domain computers. Since standalone machines are involved, Active Directory and group policy may or may not be a factor, so I must assume entries are not inherited from the domain group policy. So, my question is, how can I gain access to the computer configuration settings...
0
1198
by: Mike Mahon | last post by:
The LDAP is located on the mainframe. I can successfully select records using some ASP (Classic) script. I choose to use ASP classic because there are very few examples I could find of using the directory services other than the MS AD. Anywho, as I said I can select the LDAP record using a mixture of SQL and LDAP dialects but now I am at a standstill... I have been asked to create a form to reset the passwords on both the mainframe...
2
4556
by: Justin | last post by:
I am currently working on a windows app in C# that when given a computer's name needs to check local security policies on that computer across the server. Some of the policies I would like to check are the auditing policies, such as "Audit Logon Events" and "Audit Policy Change," etc, I would like to be able to retrieve whether these policies are set to "Success" or "Failure" on the remote computer. Also I would like to check the "user...
4
5038
by: karpagam | last post by:
Since WebServices are a standardized way to invoke a method of another application over the internet, is there a way to integrate two different applications running on different platforms (Say a .NET client application, used for implementing the presentation logic, and a mainframe application that contains the business logic). Is there a way to call the .NET web service from the mainframe application / expose the buiness logic in the...
1
1598
by: ricky.fung | last post by:
I have several VBA functions in my Access Database that do not work. I have a combobox that filters my subform data however I cannot select anything when logged in with Read Only permission. The statusbar comes up with a message saying: "Recordset is not updatable" This combobox works with Admin permissions but not Read Only.
1
1648
by: Gil Lapid | last post by:
Hi, What is the recommended way to develop DB2 Mainframe application without buying this expensive hardware/software ? I'd like to develop the software for a Mainframe customer. Thanks, Gil
10
6651
by: David Thielen | last post by:
Hi; I am trying to write to the event log using: public const string EVENT_LOG_NAME = "Windward Portal"; if (!EventLog.SourceExists(EVENT_LOG_NAME)) EventLog.CreateEventSource(EVENT_LOG_NAME, "Application"); And I am getting the exception: System.ThrowHelper.ThrowSecurityException(ExceptionResource resource) +48
6
2646
by: F | last post by:
I understand at a high level database concepts and have come from SQL Server and Windows Is there any good link thats high level that compares Windows to z/os mainframe terminology ? I hear the mainframe guys talking about control blocks, DL/I,etc. etc.. Also would love DB2 comparison with SQL Server BTw, are there differences between DB2 on LUW different from DB2 on z/OS ?
2
2817
by: shiva359 | last post by:
Hi , could someone throw some light on why do default software when installed ( as root for creating an instance leaves us with some world accessable directories & some world executable files & some world readable files . I am facing this issue on how to explain to Unix Audit Team how db2 is ensuring security even after allowing such permissions at software level . if I give 750...
0
10490
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10260
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10243
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9078
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
6809
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5467
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4146
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3762
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2941
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.