BMC Helix Cloud Security service
This topic provides an overview of the BMC Helix Cloud Security offering. For BMC Helix Cloud Security product-specific information, see
BMC Helix Cloud Security overview
.
The following items are documented for this service:
Licensing
BMC Helix Cloud Security is available with the purchase of any of the following line items from your ordering document:
License | Unit of Measurement |
---|---|
BMC Helix Cloud Security | per asset - SaaS |
Please refer to Service locations for available datacenter locations.
With the "per asset - SaaS" unit of measurement, a subscription is required for the highest monthly average of Assets monitored, managed or discovered by the Subscription Services. “Assets” include Server Endpoints or Cloud Resources. A “Server Endpoint” is any virtual or physical Computer that provides a service for other Computers or users connected to it via the Internet, extranet, intranet, or other networked technologies. A “Cloud Resource” means an instance of a cloud infrastructure that provides a service for other Cloud Resources, Computers or Users connected to it.
License entitlements
The following applications, features and utilities are available with the purchase of BMC Helix Cloud Cost:
Entitlements - BMC Helix Cloud Security applications, features and utilities |
---|
|
Standard environments
Your purchase of BMC Helix Cloud Security provides the following environment:
- Production
Important
If your IT Operations Management subscription services are accompanied by any IT Service Management subscription services, you will also receive a standard QA environment, in addition to Development and a Production environment.
Add-on services
The following optional add-on is also available for an additional fee:
- Truesight Cloud Operations - ITSM Automation Pack
Note:
The Truesight Cloud Operations - ITSM Automation Pack is a module that must installed on the customer's premises and purchased under a separate licensing agreement. It allows the customer to create incidents and changes for security violations in the customer's Remedy ITSM system from automation workflow.
Comments
Log in or register to comment.