These contracts are for Finland clients only. View other country contracts (US).
- IBM Client Relationship Agreement (CRA)
- IBM Standard Terms and Conditions and Attachment for IBM Internet Security Systems (ISS) Products and Services
- Agreement for Exchange of Confidential Information
- IBM Support and Maintenance Policy for IBM Internet Security Systems (ISS) Products and Services
- IBM Managed Security Services SOW
- IBM Managed Security Services General Provisions
- IBM Managed Security Services - Cloud Computing
- Service Descriptions and Service Level Agreements
- Infrastructure Security Services - Managed Network Security Services
- Hosted Application Security Services
- Managed DDoS Protection
- Infrastructure Security Services - Managed Security Information and Event Management
- Services Description for Vulnerability Scanning Services
- Third Party End User License Agreements (EULA)
IBM Client Relationship Agreement (CRA)
IBM Client Relationship Agreement (CRA)
IBM Standard Terms and Conditions and Attachment for IBM Internet Security Systems (ISS) Products and Services
The IBM Standard Terms and Conditions (the "Agreement") and the The IBM Standard Terms and Conditions Attachment for IBM Internet Security Systems ("IBM ISS") Products and Services (the "Attachment") govern specific transactions by which you acquire IBM ISS Products and Services from IBM. You may print these documents, sign them, and return them to your IBM sales representative. As an alternative, although the Agreement and the Attachment each specify both of us must sign, you may agree to accept the terms of the Agreement and the Attachment, without modification, by signing a Transaction Document that incorporates the Agreement and the Attachment by reference. If you are incorporating these agreements by reference into a Transaction Document:
- You also agree that you are authorized to accept the terms of the Agreement and the Attachment on behalf of the legal entity you represent.
- The terms of the Agreement and the Attachment are applicable only for each individual transaction. Future transactions will be governed by the terms of the Agreement and the Attachment applicable at the time the transaction occurs.
- Please retain a copy of the Agreement and the Attachment for each of your transactions.
IBM Standard Terms and Conditions
Agreement for Exchange of Confidential Information
The IBM Agreement for Exchange of Confidential Information provides the terms that apply when one of us discloses confidential information to the other. You may print this document, sign it, and return it to your IBM sales representative.
IBM Agreement for Exchange of Confidential Information
IBM Support and Maintenance Policy for IBM Internet Security Systems (ISS) Products and Services
Attachment for Support and Maintenance of IBM Security Products (33KB)
IBM Managed Security Services SOW
IBM Managed Security Services SOW (FI_INTC-8453-01) (78KB)
Service Descriptions and Service Level Agreements
Infrastructure Security Services- Managed Protection Services for Networks - Premium (216KB)
Infrastructure Security Services - Managed Protection Services for Servers - Standard (132KB)
Non-IBM Products Provided by IBM- Out of Band Modems (12KB)
Infrastructure Security Services - Managed Network Security Services
Infrastructure Security Services - Managed Network Security Services (Z126-5942) (Eng) (785KB)
Hosted Application Security Services
Hosted Application Security Services - Compliance Scanning (FI_INTC-8841-02) (Eng) (183KB)
Managed DDoS Protection
Managed DDoS Protection (Z126-6241) (Eng) (548KB)
Infrastructure Security Services - Managed Security Information and Event Management
Managed Security Services General Provisions - Services Description
Managed Security Services General Provisions - Services Description - I126-8484-EN-04 (749KB)
Managed Network Security Services
Managed Network Security Services - Services Description - I126-5942-EN-04 (307KB)
Services Description for Vulnerability Scanning Services
Services Description for Vulnerability Scanning Services (I126-7714-EN) (176KB)
Third Party End User License Agreements (EULA)
THIRD PARTY END USER LICENSE AGREEMENTS (“EULA”) ARE MANAGED AND MAINTAINED BY EACH VENDOR AND ARE IN ADDITION TO THE SPECIFIC TERMS AND CONDITIONS PROVIDED IN MANAGED SECURITY SERVICES - SERVICES DESCRIPTIONS.
As applicable, you agree to be bound by the terms and conditions set forth in the EULA(s), which are made available for review at:
Check Point Products:
https://www.checkpoint.com/support-services/software-license-agreement-limited-hardware-warranty/
Palo Alto Products:
For Juniper Products:
http://www.juniper.net/support/eula.html
For Cisco Products:
For Fortinet Products:
https://www.fortinet.com/doc/legal/EULA.pdf (PDF, 80KB)
For FireEye Products:
https://www.fireeye.com/company/legal
For Trend Micro Products:
Trend Micro - EN- ENGLISH MULTICOUNTRY - SMB-ENTERPRISE EULA (MAY 2015).pdf (95KB)
For Websense Products:
For Qualys Products:
www.qualys.com/docs/eula.pdf (182KB)
For Kali Products:
For Intel Products:
Such EULA(s) are solely between you and the third party services vendor.