Support Policies

Follow

(Updated October 10, 2018)

Introduction 

SecureAuth Corporation and its affiliates (collectively, Company, we or us) will provide our customers (customer, you or your) with support and maintenance services (Support) as described in this Standard Global Support and Maintenance Policy (Policy). We may update or revise this policy from time to time and will use commercially reasonable efforts to limit material revisions to once annually. The current version of the policy can be found at www.secureauth.com/support/terms.

Eligibility

You must pay all applicable fees and have one of the following to qualify for Support under this Policy:

  • Current maintenance and support plan for a premise or perpetual licensed Product;
  • Current subscription license for a Product; or
  • Current subscription for a cloud, hosted or SaaS Product.

“Product” as used in this Policy refers to Company software, subscription service or hardware or equipment covered under warranty or a Support plan. 

Support will be provided for the applicable Support period set forth in the order document and pursuant to the terms and conditions in this Policy and commences as follows: (a) for premise, perpetual and subscription licensed Products, on delivery (as defined in your license agreement with us); or for subscription for a cloud, hosted or SaaS Products, on the effective service date (as defined in your subscription or cloud agreement with us).

 

Obtaining Support

You must be a registered user and have the following information available when contacting us for Support (failure to have this information may delay Support): 

  • Your company contact information and the caller’s contact information
  • Problem description
  • Problem details
  • Business impact
  • Problem severity
  • Exact error messages
  • Log information
  • Date and time problem was encountered
  • Changes made to the configuration/environment prior to the problem
  • Changes made to the configuration/environment after the problem
  • Actions taken to isolate and resolve before contacting us
  • Hardware configuration type
  • Appliance version release level (for IdP Products)
  • System configuration parameters
  • Information about other products and systems interacting with the Product

You can open a support ticket using our Support portal at http://www.secureauth.com/support(Portal). You can also call the Support Center using the numbers listed on the Portal.  All Severity Level 1 matters must be reported via phone. 

For the best routing, logging a ticket through the Portal is preferred for Severity Levels 2 – 4. You can always follow up by phone to get an update on your ticket.

Product

Support Portal Access

Severity Level 1 Issues

Access Management Products

https://support.secureauth.com

866-859-1526

SecureAuth IdP – all deployment modes (including Secure, Protect and Prevent Packages)

Identity Governance (Identity Products)

https://support.coresecurity.com

678-304-4485

Core Access Assurance Suite (AAS)

Core Password

Core Access

Core Provisioning

Core Compliance

Core Role Designer

Secure Reset

Core PAM

Core DAG

Standard Connectors/Custom Connectors/Collectors

Core Access Insight (AI)

Core Visual Identity Suite (VIS)

Pen Testing Products

https://support.coresecurity.com

678-304-4485

Core Impact

 

 

Network Products

https://support.coresecurity.com

678-304-4485

Core Network Insight (NI)

Core Network Insight Hardware

Core Communications Service Provider (CSP)

Core PassiveDNS (PDNS)

Core Threat Intelligence

Vulnerability Assessment Products

https://support.coresecurity.com

678-304-4485

Core Vulnerability Insight (VI)

 

 

 

Prior to Opening a Support Ticket

Prior to requesting Support, you must use commercially reasonable efforts to comply with our published operating and troubleshooting procedures. You should also review these helpful tips:

  • Search the online help and self-service Knowledge Base solutions by reviewing relevant documents on the Portal at http://www.secureauth.com/support.
  • See if the problem is reproducible.
  • Check to see if the problem is isolated to one machine or more.
  • Note any recent changes to your systems and environment.
  • Note the version of your software and environment details, such as operating system, database, etc.

Case Registry Contacts

You must appoint one (1) or more individuals within your organization who are reasonably knowledgeable in the operation of the Product to serve as primary contact between you and the Company regarding the registry and report of Support tickets (the Case Registry Contacts). All of your Support inquiries should be initialized through your Case Registry Contact(s) when possible. As a security precaution, our Support hotline analyst may request further information to verify the identity of the caller. If at any point, our Support hotline analyst believes that the requesting party is not authorized, as a security precaution, we may deny the Support request until a Case Registry Contact is reached. Additionally, any request for improper assistance will be reported to your Case Registry Contact(s).

Support Ticket Management Process

We assign a unique Support request number (Support ID) to all Support tickets. These Support IDs allow us to prioritize and track all Support tickets through to resolution and allow you to get a status update on your case via our Portal.

All Support tickets are assigned a Severity Level and are placed in a queue to be processed by the next available
Support Engineer. Support Engineers take ownership of your Support ticket and see it through to successful resolution. 

The Support Engineer will contact you, gather any additional information needed, and investigate to determine the proper course of action. This may require the Support Engineer to re-create the issue, work with our development team, and/or help you with configuration of the Product.

An administrator from your company is required to have access to the application administrative interface, command line interface and base operating system. Your administrator must have the ability to request additional resources from your company as needed to assist with troubleshooting the environment or application.

If our Support Engineer and development team determine that the issue is a product defect, please see the “Product Defects” section in this policy for specific request handling information. 

Escalation Guidelines

Our goal is to resolve all Support tickets in a satisfactory and timely manner; however, we realize that some situations may require increased attention and focus within our team. You can raise the severity of a Support ticket through the Portal or call us and request to speak with a Support Manager. Upon your request, the Support Manager will evaluate the case and create an action plan. If you are not satisfied with the plan or with the progress of the case after the plan has been implemented, you can contact our Director of Technical Support, who will review the Support ticket with the Support Manager and determine if different or additional actions are required.

Closing a Support Ticket

Support tickets remain open until the issue has been resolved or addressed. Exceptions apply to requests for product enhancements, product defects and where the customer fails to respond to request for information for 5 business days or longer. You also can close requests via our Portal.

Re-Opening a Support Request

You can re-open your closed Support ticket from the Portal.

 

Severity Levels and Response Times

All Support tickets are assigned a severity level from 1 to 4 based on the technical and business impact of the reported problem. As troubleshooting progresses, we will work with you to reassess the technical and business impact of the problem and, if appropriate, adjust the case severity level.

Severity Levels

Basic Support is available for purchase with premise perpetual licenses and is included with all subscription licenses and cloud (SaaS) subscriptions. Premier Support and Mission Critical Support are available for an additional cost for certain Products.

The tables below define the severity levels and the targeted initial response time for our Support offerings.

 

Note: The Response Time is the time between when we are notified of the problem and when we acknowledge the problem by assigning it a Support ID number.

 

Basic Support

Severity

Description

Response Time

Resolution Target

If not resolved, escalated to Tier 3 Support

If not resolved, escalated to Support Director

 

Sev 1 - Urgent[1]

 

Coverage: 24 x 7

 

Failure in the production operation of the covered Product that causes cessation of or severe impact on your operations. For example, a Product application or function is completely unavailable, severely corrupted or degraded for all or most users.

 

Note: You must call to report a Severity Level 1 matter.

 

1 Hour

 

N/A

 

24 hours

 

24 hours

 

Sev 2 - High

 

Failure in the production operation of the covered Product that causes moderate impact on your operations. For example, a Product application or function is partially unavailable, corrupted or degraded for some or multiple users.

 

Note: For the best routing, logging a ticket through the Portal is preferred for Severity 2, 3, and 4. You can always follow up by phone to get an update on your ticket.

 

3 Hours

 

N/A

 

5 business days

 

7 business days

 

Sev 3 - Normal

 

 

 

Severity Level 3 is the default severity setting.

 

Failure or disruption in the production or non-production operation of the covered Product that causes impact on your operations. For example, the issue is intermittent, or has been resolved but has a chance of recurrence.

4 Hours

N/A

7 business days

15 business days

 

Sev 4 - Low

 

A user level fault affecting an authorized user, but not affecting ability to perform business functions. This may also include feature or enhancement requests, basic inquiries, requests for information or documentation, or general questions.

 

24 Hours

 

N/A

 

14 business days

 

21 business days

 

Premier Support

Severity

Description

Response Time

Resolution Target

If not resolved, escalated to Tier 3 Support

If not resolved, escalated to Support Director

 

Sev 1 - Urgent

 

Coverage: 24 x 7

 

Failure in the production operation of the covered Product that causes cessation of or severe impact on your operations. For example, a Product application or function is completely unavailable, severely corrupted or degraded for all or most users.

 

Note: You must call to report a Severity Level 1 matter.

 

1 Hour

 

N/A

 

24 hours

 

24 hours

 

Sev 2 - High

 

Failure in the production operation of the covered Product that causes moderate impact on your operations. For example, a Product application or function is partially unavailable, corrupted or degraded for some or multiple users.

 

Note: For the best routing, logging a ticket through the Portal is preferred for Severity 2, 3, and 4. You can always follow up by phone to get an update on your ticket.

 

2 Hours

 

N/A

 

5 business days

 

7 business days

 

Sev 3 - Normal

 

 

 

Severity Level 3 is the default severity setting.

 

Failure or disruption in the production or non-production operation of the covered Product that causes impact on your operations. For example, the issue is intermittent, or has been resolved but has a chance of recurrence.

3 Hours

N/A

7 business days

15 business days

 

Sev 4 - Low

 

A user level fault affecting an authorized user, but not affecting ability to perform business functions. This may also include feature or enhancement requests, basic inquiries, requests for information or documentation, or general questions.

 

24 Hours

 

N/A

 

14 business days

 

21 business days

 

Mission Critical Support

Severity

Description

Response Time

Resolution Target

If not resolved, escalated to Tier 3 Support

If not resolved, escalated to Support Director

 

Sev 1 - Urgent

 

Coverage: 24 x 7

 

Failure in the production operation of the covered Product that causes cessation of or severe impact on your operations. For example, a Product application or function is completely unavailable, severely corrupted or degraded for all or most users.

 

Note: You must call to report a Severity Level 1 matter.

 

30 Minutes

 

24 hours

 

5 hours

 

8 hours

 

Sev 2 - High

 

Failure in the production operation of the covered Product that causes moderate impact on your operations. For example, a Product application or function is partially unavailable, corrupted or degraded for some or multiple users.

 

Note: For the best routing, logging a ticket through the Portal is preferred for Severity 2, 3, and 4. You can always follow up by phone to get an update on your ticket.

 

1 Hour

 

7 business days

 

3 business days

 

5 business days

 

Sev 3 - Normal

 

 

 

Severity Level 3 is the default severity setting.

 

Failure or disruption in the production or non-production operation of the covered Product that causes impact on your operations. For example, the issue is intermittent, or has been resolved but has a chance of recurrence.

2 Hours

15 business days

7 business days

15 business days

 

Sev 4 - Low

 

A user level fault affecting an authorized user, but not affecting ability to perform business functions. This may also include feature or enhancement requests, basic inquiries, requests for information or documentation, or general questions.

 

24 Hours

 

On agreed upon schedule

 

On agreed upon schedule

 

On agreed upon schedule

Product Updates

In accordance with this Policy, you have access to all updates, version releases, upgrades, and enhancements to the Products that are not designated by us as new products or modules for which we charge a separate fee.

If you are eligible for Support and have a current perpetual license and a current Support plan, subscription license or subscription access for the Product then you may install and use all Product upgrades, updates and enhancements and we strongly encourage you to do so, provided, however, that you may be required to install the current or future version in order to resolve your Support issue. Failure to install the upgrades, updates and enhancements may result in ineligibility to receive Support under this Policy. 

If you have a current subscription for a cloud or SaaS Product then we will be responsible for upgrading, updating and enhancing the cloud platform. 

Any corrections to the Product will be made to the current generally available release of the Product. After the introduction of a new and generally available release of the Product, we will support the prior Product versions as follows:

  • For Access Management Products, as identified on the Support Lifecycle Policy and End of Life Dates available at https://support.secureauth.com/hc/en-us/articles/115001377647/ or as otherwise communicated to customers.
  • For Identity Governance (Identity Products), Pen Testing Products, Network Products, and Vulnerability Assessment Products the newest or previous two (2) versions of the software will be supported (provided, however, that customer may be required to install the current or future functional version in order to effectuate a solution for a reported problem) or as otherwise communicated to customers.

If you have a premise perpetual licensed Product (e.g., Core Impact) and your Support either lapses, expires or is terminated, then your license and right to use the premise perpetual licensed Product after the lapse, expiration or termination date is limited to the then current release of that premise perpetual licensed Product on the date of the lapse, expiration or termination of the Support. After the lapse, expiration or termination of Support, we are no longer obligated to provide Support, including any activation or reactivate of the license. In the event your Support lapses, expires or is terminated, you may later reinstate Support subject to our then current Policy, our reinstatement requirements, and any applicable reinstatement fees.

Product Enhancements

If you are interested in submitting a Product enhancement request, you can do so by creating a Support request. Product enhancement requests can be submitted by logging into the Portal and creating a Support request. Once documented, the request will be submitted into the enhancement review system, the identification number will be provided to the submitter, and the Support case will be closed.

Our Product Management team will review the open enhancement requests on a periodic basis and consider them for inclusion in a future Product release. Product enhancements will not be considered or implemented in current or prior Product releases. There is no guarantee that a specific enhancement request will be implemented in a future version of the Product. At our discretion, we may determine that certain enhancements to functionality in the Product can be offered for an additional charge. 

Product Defects

If we determine that your issue is a defect, it will be logged in our defect tracking system, and we will provide you with a unique identifier (Defect ID) within the Support case. If we determine that a hot fix is required, then the Support case will remain open until the hot fix has been applied and tested. For non-critical defects, the Defect ID will be provided, and the case will be closed. You can check the release notes or knowledge base when a new release comes out to see if the issue has been fixed. 

Release Notes

Release notes for new releases of Products will contain the list of Defect IDs that were addressed in the release. You can review the release notes on our Support portal using your Defect ID to see if the issue has been addressed. Release notes can be searched via the Product documentation on our Portal. We do not guarantee that all defects identified will be fixed in a future release of the Product.

Product Upgrades

SecureAuth IdP (Premise) Product Upgrades 

IdP appliance upgrades can be complex or relatively simple depending upon the number of customizations which have been incorporated. For this reason, code upgrades require our Support Engineer assistance.  

IdP appliance replacements are available at no cost for IdP customers’ appliances running operating system versions that are within two (2) years of their respective Microsoft Extended Support End Dates and for customers who are eligible for Support. Currently published Microsoft Extended Support End Dates: 

  • Windows 2008 R2 Web Edition - 7/10/2018 
  • Windows 2008 R2 Standard Edition - 1/14/2020  

See the Microsoft Support Lifecycle for specific version Extended Support End Dates -  http://support2.microsoft.com/lifecycle/?p1=14134

All upgrade requests must start with a Support ticket and contain the information listed below (this request will cover only configuration and code changes necessary to upgrade the IdP appliance): 

  • Customer’s company name and address 
  • Customer’s support contact person’s phone, email address and preferred contact method 
  • Contact hours when the customer’s support contact person is available 
  • The running IdP code version and appliance operating system version 

The next step is the Upgrade Assessment. A Support Engineer will schedule a 20-minute online meeting with your support contact to gather information about your entire IdP environment. This will include running a Customization Check utility on the IdP appliance(s). We recommend that your support contact be knowledgeable about your entire IdP infrastructure or have other staff members on the call who are. After this information is collected, we will analyze the data and schedule a time with you to perform the IdP upgrade. After the Upgrade Assessment meeting concludes, we request that you freeze your existing IdP configuration to help ensure a trouble free upgrade.

Upon completion of the Upgrade Assessment, we may require up to two (2) business weeks to schedule an appointment (requests to perform upgrades after normal hours of operation or on weekends must be processed through our Project Management Department and will require additional costs for resources to accommodate this request.)   

Note: We uses Citrix ShareFile to securely distribute Support files to our customers. To download the updater, you will need access to https://secureauth.sharefile.com. If your corporate IT Security policies do not allow for access to ShareFile please alert the Support Engineer prior to the upgrade so we may arrange for an alternative download method. 

Once the Upgrade Assessment is complete we recommend and encourage you to back up your IdP appliance in case an unanticipated event occurs during the upgrade. In the case of a virtual machine (VM) we recommend a snapshot be taken as it offers the fastest way to fall back. If you are running a hardware appliance or your IT policies do not allow for a snapshot we recommend using the Backup Utility included with the IdP product. If assistance is needed with the Backup Utility, please contact our Support team and we will gladly assist with the process. 

At a previously scheduled and agreed upon time a Company representative will perform the upgrade process with your support contact via an online/remote session. Immediately after the upgrade, testing will be performed with your support contact to ensure the upgrade process was completed successfully. Once you sign-off on the upgrade process by closing the upgrade request a Company representative will contact your support contact within two (2) business days to discuss any follow up issues. 

Core Security Network Insight (NI) and CSP Product Upgrades 

Network Insight or CSP product upgrades can be complex or relatively simple depending upon the number of Sensors and Microsensors which have been configured for use in an environment, how many version updates and upgrades need to occur to bring the environment current, as well as a number of pre-upgrade requirements that need to be met before upgrade occurs. For this reason, NI and CSP upgrades require our Support Engineer assistance.  

All NI and CSP upgrade requests must be requested with a Support ticket and contain the information listed below. The upgrade request will cover only upgrade of the NI or CSP product and no appliance upgrades or updates. 

  • Customer’s company name and address
  • Customer’s support contact person’s phone, email address and preferred contact method 
  • Contact hours when the customer’s support contact person is available 
  • Whether the NI or CSP Master Controller (MC), Sensors, and Microsensors are dark

Note: Your NI or CSP systems will need to be remotely accessible by Support (not dark) in order for upgrades to be completed. NI deployments that are dark will need to be made accessible temporarily for the Upgrade Assessment, upgrade, and post-upgrade checks.

  • The current version of the customer’s NI deployment
  • Whether the requested upgrade is for a production or testing environment 

Note: Once a Support ticket is received with this information for a request to upgrade, a Support Engineer will reach out to gather any additional basic information we may need.  

The next step is the Upgrade Assessment. A Support Engineer will schedule a timeframe with your support contact to gather information about your entire NI or CSP environment. This will include running checks on the MC and all Sensors or Microsensors to ensure they meet the upgrade prerequisites for the most current released version. It is important that your support contact be knowledgeable about the entire NI or CSP environment and the systems which the product is installed. After this information is collected, we will analyze the data and schedule a time with you to perform the NI or CSP upgrade. 

Upon completion of the Upgrade Assessment with all prerequisites satisfactorily met, we may require up to two (2) business weeks to schedule the upgrade session. Upgrades requiring more than one major or minor version upgrade to bring the environment current may require multiple upgrade sessions. Requests to perform upgrades on offline (dark) deployments, after normal hours of operation or on weekends will need to be processed through Project Management and will require additional costs for resources to accommodate this request. After the Upgrade Assessment meeting concludes, we request that you freeze your existing NI configuration to help ensure a trouble free upgrade.    

At a previously scheduled and agreed upon time a Company representative will perform the upgrade process. Immediately after the upgrade, post-upgrade checks and review of the NI or CSP environment will be performed to ensure the upgrade process was completed successfully and confirmation of the upgrade will be reported to your support contact.

Hardware & Equipment Support

Only hardware that has been provided by and warranted by the Company is eligible for Support. Computer equipment and appliances obtained, licensed or purchased by you (either directly or through us) from third party vendors are not eligible for Support. For hardware covered under warranty, you may return non-working hardware after obtaining a Return Materials Authorization (RMA) number from us. The issuance of an RMA is not an admission that the hardware is defective. We will repair or replace defective hardware, at our discretion. You are responsible for all costs of shipping and insurance for the return of the hardware to us, and we will pay all costs of shipping and insurance for the return of the hardware to you. You agree that we may perform remote testing on hardware, where applicable, prior to the issuance of an RMA number.

 If you have customized hardware appliances from us, then the annual fee for continuously upgrading the customized hardware appliances to the latest software release is twenty percent (20%) of the original development cost of each customized hardware appliance.

Hardware not under a warranty or current support plan is not eligible for Support under this Policy.  Additional charges will apply if we agree (at our sole discretion) to repair or replace such hardware.

Company responsibilities

We have employees in offices worldwide to provide Support. We use follow-the-sun practices to provide 24 x 7 x 365 Support for Severity 1 issues and IdP products. We will provide Support for Severity 2, 3 and 4 issues and for all other products from 7:00 AM to 7:00 PM EST, Monday through Friday, excluding our recognized holidays. 

We will:

  1. Deliver Support in English (we may offer limited assistance in languages other than English based on resource availability).
  2. Deliver Support by our staff or other qualified and authorized partner personnel.
  3. Use reasonable efforts to determine if a Product problem exists based on the information you provide, and the information generally known to us.
  4. Investigate and remediate known problems for the Products as available.
  5. Provide technical assistance and troubleshooting to resolve problems or defects when the covered Product does not function substantially as described in the published technical specifications.
  6. Remotely troubleshoot issues to determine the cause of a technical problem relating to the functionality or disruption of the Product.
  7. Provide problem management and reporting using our Support case tracking system.
  8. Use best efforts to respond to reported problems within the targeted time frames and provide status updates during the resolution process.
  9. Resolve defects on supported Product releases and provide Product updates, which may contain code fixes, improvements or enhancements to existing functionality.
  10. Defect fixes can be delivered as an immediate code fix or as part of a future Product update or upgrade release at our discretion.
  11. Ensure that third-party software embedded in a Product functions with the Product as described in the applicable technical specifications and make commercially reasonable efforts to maintain the embedded third-party software at a version supported by the vendor. As a general practice, third-party software patches and upgrades will be tested and included with Product upgrades.
  12. Provide Support for Product releases until the published End of Life (EOL) date.
  13. Interface with vendors to provide support for vendor supported products.
  14. Subject to your responsibility for data protection in accordance with this Policy and any provisions of the agreement between you and the Company or any separate agreement on data protection, we will maintain administrative, physical, and technical safeguards to ensure the security, confidentiality and integrity of data we may process as a result of providing you Support. We will:
    • limit our collection and storage of your data to the minimal amount necessary to provide Support for an incident;
    • store collected data in secure encrypted locations;
    • limit access to authorized employees based on their job function;
    • ensure all authorized employees complete security training;
    • maintain Company employee access rights using our HR provided employee status data;
    • ensure access to all data storage locations complies with our password maintenance and update policies; and
    • maintain card key access to all Company managed data storage locations and Support offices.

Your Rights and Obligations

You must:

  1. Provide accurate and complete contact information at all times to enable us to send email or other notifications from time to time, and such other information as is required by us under this Policy to enable us to respond to your requests for Support.
  2. Before production use of the Product, provide us with an operational architecture document which describes how the Product is being used in your environment. Documents created as part of your internal support processes and which provide all relevant information needed for us to help troubleshoot problems are acceptable
  3. Maintain currency with supported versions of the Product releases.
  4. Select, purchase, configure, operate and maintain your equipment, hardware, facilities, network and Internet, data and telephone connections necessary for use and support of the Product.
  5. Maintain proper Product environment in accordance with Product technical specifications or as may be reasonably expected in accordance with industry standards.
  6. Maintain a current backup copy of the Product and all of your data and keep backup copies in a safe location reasonably accessible to Company personnel if we require access to maintain the Products.
  7. Payment of any additional third party licensing fees associated with third-party software as part of Product updates and upgrades.
  8. Provide us with reasonably necessary access to your personnel and equipment required to resolve the Support issue; including, if required by us, remote access to your systems as necessary to enable us to perform Support.
  9. Provide supervision, control and management of the use of the Product.
  10. Implement procedures for the protection of information and the implementation of backup facilities in the event of errors or malfunction of the Product or related equipment.
  11. Maintain a current backup copy of all of your programs and data.
  12. Take all steps reasonably necessary to carry out procedures for the rectification of errors or malfunctions within a reasonable time after you receive the procedures from us.
  13. Properly train your personnel in the use and application of the Product.
  14. Report all detected errors or malfunctions of the Product to us.
  15. Request Support as outlined in this Policy.
  16. Cooperate with us to enable the troubleshooting of reported incidents.
  17. Use the Product in accordance with the Product documentation.

Customer Data

You are aware that access to login data, employee contact information, application log files, or data files may be required by us in order to provide Support. Such files may contain personal data, including, but not limited to, names of individuals, email addresses or other personal data. You are solely responsible for complying with any data protection laws, including using principles of data avoidance and data minimization, by taking measures to mask, strip or anonymize personal data when providing us access to original or copies of data files. You will use reasonable efforts to prevent disclosure to us of any personal information. We, our affiliates, licensors and agents are not responsible for compliance with such laws and do not assume any liability with respect to any infringements of any laws in relation to the use of our Support services by you. The provisions of the license or subscription agreement between you and the Company or any separate agreement on data protection remains unaffected.

Data Sharing

Customer understands that certain Products (i.e., Core Network Insight and Core Network Insight CSP) collect various data including, but not limited to, DNS or network traffic patterns and other data or information relating to malicious or potentially malicious activity within the customer network environment (Data Sharing) as further detailed in the applicable Product documentation. You acknowledge and agree to participate in Data Sharing. You may notify us in writing if at any time you elect to either commence or discontinue Data Sharing and you agree to pay the associated fees for not participating in Data Sharing. You expressly agree that we may use all Data Sharing information and any derivative thereof in order to analyze, assess and respond to malware and other threats, including in the course of providing services to other customers; provided, however, that we will not disclose any Data Sharing information to other customers. You represent, warrant and covenant that your participation in Data Sharing does not violate any law or regulation and that you have provided any required notices to and/or obtained any required consents from your end-users for the collection, use and processing of information provided to us pursuant to the Data Sharing arrangement.

Support Exclusions

The following items are not included in Support. If you request assistance for, or as a result of, any of these items, we may offer to provide assistance at our then current time and materials rates by issuing a quotation or statement of work. Further, if the occurrence or existence of any of the following causes us to be unable to fulfill our Support obligations to you, we will not be responsible for meeting those obligations. 

  1. Services related to hardware or software installation.
  2. Additions, configuration, or activations of new features or functionality of the covered Product.
  3. Consulting or on-site services.
  4. Training or usage assistance.
  5. Project management.
  6. Support for your network or environment.
  7. Guaranteed bug fixes for all problems.
  8. Product programs made by you or other parties under your control or direction.
  9. Problems resulting from any service or product not provided by us (we are not responsible for the maintenance, administration or support (including procurement and installation of updates, patches, defect fixes, and upgrades) of your operating system software, hardware and software).
  10. Problems resulting from customer’s modification, customization, alteration or addition or attempted modification, customization, alteration or addition to the Product undertaken by any party other than us or our agents without our written consent.
  11. Problems resulting from customer’s negligence, error or misuse of the Product.
  12. Problems with customer’s hardware, software, network infrastructure and services, or Internet access.
  13. Problems resulting from inadequate or improperly configured servers, networks, storage, and other underlying infrastructure supporting the execution of the Product.
  14. Problems arising from customer’s failure to properly use or install the Products in accordance with applicable Product documentation or customer’s license or subscription agreement with us.
  15. Problems caused by Product or telecommunication interfaces not meeting or not maintained in accordance with the manufacturer’s specifications.
  16. Problems that have been addressed in a software update that customer has elected not to apply.
  17. Problems caused by customer’s failure to maintain all software at the same software update and upgrade levels.
  18. Problems caused by customer’s data.
  19. Changes to, resolution of, or support for resolution of incidents or errors caused by network, desktop, host configurations, hardware or software other than the Product.
  20. Support limitations (e.g., standard, limited, extended, EOL) as described in this Policy in the “Product Update” section above.
  21. Third party services; including procurement and installation of any third-party software or hardware required to be provided by the customer for the implementation of Product or upgrades.
  22. Support for third-party operating system software, third-party software, hardware, or firmware not procured from us.
  23. Problems resulting from relocation or the addition of accessories, attachments or other devices to hardware procured and warranted by us.
  24. Any customer or third-party infrastructure components, including but not limited to:
    • Identity Stores, including but not limited to: Microsoft Active Directory, Microsoft Active Directory Lightweight Directory Services (LDS), OpenLDAP, Novell e-Directory, IBM LDAP, Sun One LSAP, ApacheDS, any other third-party Lightweight DirectoryAccess Protocol (LDAP) directories, Microsoft SQL Server, Oracle Server, Google Apps Datastore, and any other identity or profile store;
    • Third-party Databases, Datastores, or SIEM products (whether on-premise or cloud hosted) used for the storage and reporting of any audit, accounting, or reporting data;
    • Underlying hypervisors or hypervisor management products used to host and support a Virtual Appliance, including but not limited to: Microsoft Hyper-V, VMware ESx, and Citrix XenServer;
    • Mobile device management (MDM) solutions used to manage any endpoints or mobile devices;
    • Support of endpoint Operating Systems (including, but not limited to: Microsoft Windows, Apple OS X, Mac OS, Linux and Unix Derivatives) and Mobile Operating Systems (including, but not limited to: Apple iOS, Android, Windows Mobile/Phone, and Blackberry);
    • Underlying private or public network infrastructure - both physical and logical;
    • Cloud or third-party hosting services not provided by us;
    • Third-party hardware OTP tokens, proximity cards, smart cards and reader devices; and
    • Relying party product, such as those that accept SAML or other assertions from the Product.
  25. Proof of concept, free trial or evaluation Product environments.
  26. Support of the Product for purposes other than the purposes for which the Product was designed.
  27. Support for which you do not have a current maintenance and support plan for a premise perpetual licensed Product; a current subscription license for a Product; or a current subscription for a cloud, hosted or SaaS Product.
  28. Customer’s failure to perform its obligations under this Policy.
  29. Other problems not within our control (including internet service failures or delays; unusual physical, electrical or electromagnetic stress; failure or fluctuation of electric power, air conditioning or humidity control; excessive heating; fire and smoke damage; failure of backup/rotation media not furnished by us).

End of Availability

We may, at our discretion, decide to retire a Product from time to time (End of Life or EOL). We will publicly post for all customers notice of EOL, including the last date of general commercial availability of the affected Product and the timeline for discontinuing Support. We will have no obligation to provide Support for a Product that is outside of the applicable EOL period.

The Circle with Intersecting S Design Logo, Core Access, Core Access Insight, Core Compliance, Core Impact, Core Password, Core Provisioning, Core Security, and SecureAuth are trademarks of SecureAuth Corporation and/or its affiliates, some of which are registered in the US and/or other countries. Other names may be trademarks of their respective owners. 

[1] Severity Level 1 Support is not available for the following Products: Core Impact and Core Vulnerability Insight.

3 out of 3 found this helpful

Comments

0 comments

Article is closed for comments.