SlideShare a Scribd company logo
1 of 3
Download to read offline
Additional License Authorizations
For HPE Security Atalla software products
Products and suites covered
PRODUCTS E-LTU OR E-MEDIA
AVAILABLE *
NON-PRODUCTION
USE CATEGORY**
Bloombase StoreSafe Yes N/A
HP Atalla Information Protection and Control Yes Class 3
HP Atalla Network Security Processor Yes*** N/A
HP Atalla Secure Configuration Assistant No N/A
HP Boxcar Software Yes Class 3
HPE Enterprise Secure Key Manager (previously called HP Enterprise Secure Key Manager) Yes N/A
HP Network Security Processor Enhanced Yes Class 3
*
Any product sold as E-LTU or E-Media shall be delivered electronically regardless of any contrary designation in a purchase order.
**
Non-production use rights, if any, can be found at hpe.com/software/SWlicensing.
***
Only applicable to HP Atalla Network Security Processor Variant software.
Definitions
Capitalized terms not otherwise defined in this ALA document are defined in the governing agreement.
TERM DEFINITION
AKB means Atalla Key Block which is a key management system.
Appliance or Appl means an Instance of software loaded and pre-configured on a Server.
Application means any software program that performs specific functional tasks other than the operation of the software system upon which the software
program runs.
Application Server means software that executes business or application logic that is made available to a web server for processing requests. Application Servers are
typically J2EE application servers or .Net application servers.
Application User means a single User authorized to use the functionality of the licensed software as integrated with a single unique Application.
Business Application means a class of cloud applications that helps the enterprise run their business and business operations (e.g., HR, Supply Chain etc.)
Client means any applications or systems which provide functionality separate from that of the software and/or Appliance while providing for the facility
to connect to and interact with the software and/or Appliance.
Client Class means any ESKM Applications or systems as defined by its value basis for the customer environment by tier level (A – I).
Cluster means a group of servers or other resources that act like a single system and enable high availability and in some cases, load balancing and
parallel processing.
Additional License Authorizations for HPE Security Atalla software products Page 2
TERM DEFINITION
Core means a single computing component processing unit which reads and executes instructions to perform specific actions as part of a CPU.
CPU means a system in a single integrated circuit package with one or more discrete processing Cores.
E-LTU and
E-Media
means products which are electronically delivered only, and as such any reference to FOB Destination or delivery methods that are stated on your
purchase order other than electronic shall be null and void with respect to these E-LTU or E-Media products.
IBE means Identity Based Encryption; simplifying key management based on identity for encryption.
Implementation means an installation of the software on a single Server or installed on a cluster of Servers which work together as a single installation of the
software.
Instance means each implementation of the application installed on a Server.
Interceptor means a single integration of an Application via API or software development kit (SDK) implemented via a single Instance of the HP Atalla IPC
Classification and Protection Server.
IT Application means software that provides a specified set of functions to support an information technology infrastructure, for example antivirus, indexing,
search, or archiving. Each application may run on one or more Servers or Clients
LTU means License To Use.
Mailbox means one Microsoft Exchange mailbox, or enabled email address.
MFK means Master File Key which is the root cryptographic key.
Non-Stop System means an HPE high-end server.
NSP means Network Security Processor.
Platform means software that provides a base level of functionality to the User, upon which additional functionality may be added.
Platform User means a single User authorized to use the applicable licensed Platform, to which multiple Applications may integrate.
Protected Data means data which has had granular permissions applied to individual users or groups providing assignment of rights such as view, edit, print, copy
or save , etc., and enforced via an information rights management system with encryption technology such as Microsoft Active Directory Rights
Management Services (Microsoft AD RMS)
Server or Svr means any designated computer system in which an Instance or Instances of the software is installed.
Term License to Use or
Term LTU
means a software license to use (LTU) which indicates in its license description that the license is valid for a specific period of time such as One
Month (1M), One Year (1Y), Three Year (3Y), etc. Term LTU’s are not perpetual licenses.
Term Support means a fixed period support offering that is only valid during the time period of the associated Term LTU.
User means a user whose Use is restricted to the type of software that is being licensed.
User Pack means a predetermined number of Users.
Variant means legacy key wrapping technology software for NSP Appliance
Virtual Appliance means Virtual Machine image designed to run on a virtualization platform (e.g., VirtualBox, Xen, VMware Workstation, Parallels Workstation).
Virtual Machine(s) or VM(s) means a computer that does not physically exist but is simulated by another computer.
Software specific license terms
Software products with software specific license terms are described below. Software products covered by this ALA document (as listed above)
and not covered in this section do not have software specific license terms.
Bloombase StoreSafe
Bloombase StoreSafe is licensed per CPU Core across all Virtual Appliance Instances deployed.
HP Atalla Information Protection and Control
HP Atalla Information Protection and Control Enterprise is licensed per User.
HP Atalla Information Protection and Control Express is licensed per User.
HP Atalla Information Protection and Control Mobile is licensed per User.
Additional License Authorizations for HPE Security Atalla software products Page 3
hpe.com/software/SWLicensing
Latest version of software licensing documents
© Copyright 2013-2016 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without
notice. The only warranties for HPE products and services are set forth in the express warranty statements accompanying such products
and services or in your mutually executed license and/or consulting services agreement(s) with HPE. Nothing herein should be construed
as constituting an additional warranty. HPE shall not be liable for technical or editorial errors or omissions contained herein.
5200-0625, September 2016; replaces 5200-0598 (May 16, 2016)
HP Atalla Information Protection and Control Data Interceptors is licensed per User and Interceptor. A license is required for each User for
each specific type of Interceptor.
HP Atalla Information Protection and Control Scanner is licensed per User.
HP Atalla Information Protection and Control Bridge is licensed per User.
HP Boxcar
HP Boxcar is licensed per CPU for Non-Stop Systems for the purpose of managing multiple NSP systems.
HPE Enterprise Secure Key Manager (previously called Hp Enterprise Secure Key Manager)
HPE Enterprise Secure Key Manager (ESKM) is licensed by Appliance and per ESKM Client Class for Applications and systems (i.e: Storage, Tape
Library, SAN Switch, Nonstop VLE, etc). A separate license is required for each Client accessing the ESKM Cluster.
HP Atalla Network Security Processor (Hardware Security Module – HSM)
HP Atalla Network Security Processor is licensed by Appliance for either AKB or Variant.
HP Network Security Processor Enhanced is licensed by Appliance for either AKB or Variant.
HP Atalla Network Security Processor One Master File Key (MFK) is licensed by Appliance for AKB only.
HPE Atalla Additional Function is licensed by Appliance for either AKB or Variant.
HPE Atalla Custom Command is licensed by Appliance for either AKB or Variant.
HPE Atalla Remote Key Support is licensed by Appliance for AKB only.
HPE NSP Ax160 Enhanced AKB IBE is licensed as part of a HPE SecureData solution that is deploying HPE Atalla NSP.
Additional license terms
TERM
A. Any licensing terms designated as being part of Secure Islands, Ltd that may be embedded in the HP Atalla Information Protection and Control software products are
inapplicable in their entirety.

More Related Content

What's hot

Virtualization
VirtualizationVirtualization
Virtualization
jworth
 
At8000 s configurando_8021x
At8000 s configurando_8021xAt8000 s configurando_8021x
At8000 s configurando_8021x
NetPlus
 
Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15  Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15
Suraj Kumar.A.S
 
Bo sa nova enterprise_pres_8
Bo sa nova enterprise_pres_8Bo sa nova enterprise_pres_8
Bo sa nova enterprise_pres_8
home
 
Comptia server presentation
Comptia server presentationComptia server presentation
Comptia server presentation
NNAH KENNETH
 
802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast
Sithideth Banavong
 

What's hot (14)

Virtualization
VirtualizationVirtualization
Virtualization
 
Installing Aix
Installing AixInstalling Aix
Installing Aix
 
At8000 s configurando_8021x
At8000 s configurando_8021xAt8000 s configurando_8021x
At8000 s configurando_8021x
 
e-DMZ Products Overview
e-DMZ Products Overviewe-DMZ Products Overview
e-DMZ Products Overview
 
Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15  Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15
 
Bo sa nova enterprise_pres_8
Bo sa nova enterprise_pres_8Bo sa nova enterprise_pres_8
Bo sa nova enterprise_pres_8
 
Ultima 14th March
Ultima 14th MarchUltima 14th March
Ultima 14th March
 
Insight into Oracle licensing
Insight into Oracle licensingInsight into Oracle licensing
Insight into Oracle licensing
 
Thin Clients webex
Thin Clients webexThin Clients webex
Thin Clients webex
 
Xeon E5 Making the Business Case PowerPoint
Xeon E5 Making the Business Case PowerPointXeon E5 Making the Business Case PowerPoint
Xeon E5 Making the Business Case PowerPoint
 
Ali shahbazi khojasteh dot1X
Ali shahbazi khojasteh dot1XAli shahbazi khojasteh dot1X
Ali shahbazi khojasteh dot1X
 
Comptia server presentation
Comptia server presentationComptia server presentation
Comptia server presentation
 
802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast802.1x Implementation Plan for Seacoast
802.1x Implementation Plan for Seacoast
 
ClearPass 6.4.0 Release Notes
ClearPass 6.4.0 Release NotesClearPass 6.4.0 Release Notes
ClearPass 6.4.0 Release Notes
 

Similar to HPE - Additional license authorizations - Ala atalla sep2016_5200-0625

Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)
rajsandhu1989
 
Cs seminar 20061207
Cs seminar 20061207Cs seminar 20061207
Cs seminar 20061207
Todd Deshane
 

Similar to HPE - Additional license authorizations - Ala atalla sep2016_5200-0625 (20)

Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_onlineAsecurity-guidelines_and_best_practices_for_retail_online_and_business_online
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
 
3 additional dpdk_theory(1)
3 additional dpdk_theory(1)3 additional dpdk_theory(1)
3 additional dpdk_theory(1)
 
Clear Linux OS - Introduction
Clear Linux OS - IntroductionClear Linux OS - Introduction
Clear Linux OS - Introduction
 
Open security controller security orchestration for openstack
Open security controller security orchestration for openstackOpen security controller security orchestration for openstack
Open security controller security orchestration for openstack
 
Open Virtualization Format - Detailed
Open Virtualization Format - DetailedOpen Virtualization Format - Detailed
Open Virtualization Format - Detailed
 
Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)Virtualization and Open Virtualization Format (OVF)
Virtualization and Open Virtualization Format (OVF)
 
FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite Cloud
 
ESM High Availability Module User's Guide
ESM High Availability Module User's GuideESM High Availability Module User's Guide
ESM High Availability Module User's Guide
 
Upgrade ESM Express License to ESM 6.11.0
Upgrade ESM Express License to ESM 6.11.0Upgrade ESM Express License to ESM 6.11.0
Upgrade ESM Express License to ESM 6.11.0
 
Unified threat management software 21 july 17
Unified threat management software 21 july 17Unified threat management software 21 july 17
Unified threat management software 21 july 17
 
Unified threat management software 15 july 17
Unified threat management software 15 july 17Unified threat management software 15 july 17
Unified threat management software 15 july 17
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Hetergeneous Compute with Standards Based OFI/MPI/OpenMP Programming
Hetergeneous Compute with Standards Based OFI/MPI/OpenMP ProgrammingHetergeneous Compute with Standards Based OFI/MPI/OpenMP Programming
Hetergeneous Compute with Standards Based OFI/MPI/OpenMP Programming
 
Study notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security PractitionerStudy notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security Practitioner
 
Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques
 
Arch overview
Arch overviewArch overview
Arch overview
 
FlexNet Manager for VMware
FlexNet Manager for VMwareFlexNet Manager for VMware
FlexNet Manager for VMware
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing Security
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
Cs seminar 20061207
Cs seminar 20061207Cs seminar 20061207
Cs seminar 20061207
 

More from Bloombase

More from Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 

HPE - Additional license authorizations - Ala atalla sep2016_5200-0625

  • 1. Additional License Authorizations For HPE Security Atalla software products Products and suites covered PRODUCTS E-LTU OR E-MEDIA AVAILABLE * NON-PRODUCTION USE CATEGORY** Bloombase StoreSafe Yes N/A HP Atalla Information Protection and Control Yes Class 3 HP Atalla Network Security Processor Yes*** N/A HP Atalla Secure Configuration Assistant No N/A HP Boxcar Software Yes Class 3 HPE Enterprise Secure Key Manager (previously called HP Enterprise Secure Key Manager) Yes N/A HP Network Security Processor Enhanced Yes Class 3 * Any product sold as E-LTU or E-Media shall be delivered electronically regardless of any contrary designation in a purchase order. ** Non-production use rights, if any, can be found at hpe.com/software/SWlicensing. *** Only applicable to HP Atalla Network Security Processor Variant software. Definitions Capitalized terms not otherwise defined in this ALA document are defined in the governing agreement. TERM DEFINITION AKB means Atalla Key Block which is a key management system. Appliance or Appl means an Instance of software loaded and pre-configured on a Server. Application means any software program that performs specific functional tasks other than the operation of the software system upon which the software program runs. Application Server means software that executes business or application logic that is made available to a web server for processing requests. Application Servers are typically J2EE application servers or .Net application servers. Application User means a single User authorized to use the functionality of the licensed software as integrated with a single unique Application. Business Application means a class of cloud applications that helps the enterprise run their business and business operations (e.g., HR, Supply Chain etc.) Client means any applications or systems which provide functionality separate from that of the software and/or Appliance while providing for the facility to connect to and interact with the software and/or Appliance. Client Class means any ESKM Applications or systems as defined by its value basis for the customer environment by tier level (A – I). Cluster means a group of servers or other resources that act like a single system and enable high availability and in some cases, load balancing and parallel processing.
  • 2. Additional License Authorizations for HPE Security Atalla software products Page 2 TERM DEFINITION Core means a single computing component processing unit which reads and executes instructions to perform specific actions as part of a CPU. CPU means a system in a single integrated circuit package with one or more discrete processing Cores. E-LTU and E-Media means products which are electronically delivered only, and as such any reference to FOB Destination or delivery methods that are stated on your purchase order other than electronic shall be null and void with respect to these E-LTU or E-Media products. IBE means Identity Based Encryption; simplifying key management based on identity for encryption. Implementation means an installation of the software on a single Server or installed on a cluster of Servers which work together as a single installation of the software. Instance means each implementation of the application installed on a Server. Interceptor means a single integration of an Application via API or software development kit (SDK) implemented via a single Instance of the HP Atalla IPC Classification and Protection Server. IT Application means software that provides a specified set of functions to support an information technology infrastructure, for example antivirus, indexing, search, or archiving. Each application may run on one or more Servers or Clients LTU means License To Use. Mailbox means one Microsoft Exchange mailbox, or enabled email address. MFK means Master File Key which is the root cryptographic key. Non-Stop System means an HPE high-end server. NSP means Network Security Processor. Platform means software that provides a base level of functionality to the User, upon which additional functionality may be added. Platform User means a single User authorized to use the applicable licensed Platform, to which multiple Applications may integrate. Protected Data means data which has had granular permissions applied to individual users or groups providing assignment of rights such as view, edit, print, copy or save , etc., and enforced via an information rights management system with encryption technology such as Microsoft Active Directory Rights Management Services (Microsoft AD RMS) Server or Svr means any designated computer system in which an Instance or Instances of the software is installed. Term License to Use or Term LTU means a software license to use (LTU) which indicates in its license description that the license is valid for a specific period of time such as One Month (1M), One Year (1Y), Three Year (3Y), etc. Term LTU’s are not perpetual licenses. Term Support means a fixed period support offering that is only valid during the time period of the associated Term LTU. User means a user whose Use is restricted to the type of software that is being licensed. User Pack means a predetermined number of Users. Variant means legacy key wrapping technology software for NSP Appliance Virtual Appliance means Virtual Machine image designed to run on a virtualization platform (e.g., VirtualBox, Xen, VMware Workstation, Parallels Workstation). Virtual Machine(s) or VM(s) means a computer that does not physically exist but is simulated by another computer. Software specific license terms Software products with software specific license terms are described below. Software products covered by this ALA document (as listed above) and not covered in this section do not have software specific license terms. Bloombase StoreSafe Bloombase StoreSafe is licensed per CPU Core across all Virtual Appliance Instances deployed. HP Atalla Information Protection and Control HP Atalla Information Protection and Control Enterprise is licensed per User. HP Atalla Information Protection and Control Express is licensed per User. HP Atalla Information Protection and Control Mobile is licensed per User.
  • 3. Additional License Authorizations for HPE Security Atalla software products Page 3 hpe.com/software/SWLicensing Latest version of software licensing documents © Copyright 2013-2016 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without notice. The only warranties for HPE products and services are set forth in the express warranty statements accompanying such products and services or in your mutually executed license and/or consulting services agreement(s) with HPE. Nothing herein should be construed as constituting an additional warranty. HPE shall not be liable for technical or editorial errors or omissions contained herein. 5200-0625, September 2016; replaces 5200-0598 (May 16, 2016) HP Atalla Information Protection and Control Data Interceptors is licensed per User and Interceptor. A license is required for each User for each specific type of Interceptor. HP Atalla Information Protection and Control Scanner is licensed per User. HP Atalla Information Protection and Control Bridge is licensed per User. HP Boxcar HP Boxcar is licensed per CPU for Non-Stop Systems for the purpose of managing multiple NSP systems. HPE Enterprise Secure Key Manager (previously called Hp Enterprise Secure Key Manager) HPE Enterprise Secure Key Manager (ESKM) is licensed by Appliance and per ESKM Client Class for Applications and systems (i.e: Storage, Tape Library, SAN Switch, Nonstop VLE, etc). A separate license is required for each Client accessing the ESKM Cluster. HP Atalla Network Security Processor (Hardware Security Module – HSM) HP Atalla Network Security Processor is licensed by Appliance for either AKB or Variant. HP Network Security Processor Enhanced is licensed by Appliance for either AKB or Variant. HP Atalla Network Security Processor One Master File Key (MFK) is licensed by Appliance for AKB only. HPE Atalla Additional Function is licensed by Appliance for either AKB or Variant. HPE Atalla Custom Command is licensed by Appliance for either AKB or Variant. HPE Atalla Remote Key Support is licensed by Appliance for AKB only. HPE NSP Ax160 Enhanced AKB IBE is licensed as part of a HPE SecureData solution that is deploying HPE Atalla NSP. Additional license terms TERM A. Any licensing terms designated as being part of Secure Islands, Ltd that may be embedded in the HP Atalla Information Protection and Control software products are inapplicable in their entirety.