BMC Helix Cloud Security service

This topic provides an overview of the BMC Helix Cloud Security offering. For BMC Helix Cloud Security product-specific information, see BMC Helix Cloud Security overview Open link .

The following items are documented for this service:

Roles and responsibilities

Support information

Integration with Remedy for Incident and Change creation Open link


BMC Helix Cloud Security is available with the purchase of any of the following line items from your ordering document:


Unit of Measurement

BMC Helix Cloud Securityper asset - SaaS

Please refer to Service locations for available datacenter locations.  

With the "per asset - SaaS" unit of measurement, a subscription is required for the highest monthly average of Assets monitored, managed or discovered by the Subscription Services. “Assets” include Server Endpoints or Cloud Resources. A “Server Endpoint” is any virtual or physical Computer that provides a service for other Computers or users connected to it via the Internet, extranet, intranet, or other networked technologies. A “Cloud Resource” means an instance of a cloud infrastructure that provides a service for other Cloud Resources, Computers or Users connected to it.

License entitlements

The following applications, features and utilities are available with the purchase of BMC Helix Cloud Cost:

Entitlements - BMC Helix Cloud Security applications, features and utilities

Standard environments

Your purchase of BMC Helix Cloud Security provides the following environment:

  • Production


If your IT Operations Management subscription services are accompanied by any IT Service Management subscription services, you will also receive a standard QA environment, in addition to Development and a Production environment. 

Add-on services

The following optional add-on is also available for an additional fee:

  • Truesight Cloud Operations - ITSM Automation Pack


The Truesight Cloud Operations - ITSM Automation Pack is a module that must installed on the customer's premises and purchased under a separate licensing agreement. It allows the customer to create incidents and changes for security violations in the customer's Remedy ITSM system from automation workflow.

Was this page helpful? Yes No Submitting... Thank you