Support Policy HOPEX V4 & V5

Support Policy HOPEX V4 & V5

Last updated: October 10, 2023

Software Support HandBook

The MEGA Software Support HandBook gives a description of the services provided by MEGA Support and a guideline to interaction with the MEGA Support team.

This Handbook is available in English.

  

Version/Release Lifecycle

Description of Maintenance Phases

Full SupportSupport on Deployment, Issues, Bugs (errors)
  • Functional changes 
  • New functional features and products
  • Error fixes.
Limited SupportSupport on Bugs (errors)
  • Fix provided ONLY on critical incident.

CP are delivered only for supported Releases (Full/Limited Support).

 

Release

Lifecycle

Start Date

Full Support

End Date

Limited Support

End Date

Custom Support

End Date

Notes
HOPEX V514/09/202131/12/202430/09/2025(*) 
HOPEX V424/06/202030/09/202231/01/2024(*) 
HOPEX V318/07/201930/09/202130/06/2022Not AvailableNot Supported
HOPEX V2R1 U317/10/201730/09/202030/06/2021Not AvailableNot Supported
HOPEX V213/07/201631/03/201931/09/2019Not AvailableNot Supported
HOPEX V1R302/04/201431/03/201831/09/2018Not AvailableNot Supported
HOPEX V1R202/04/201430/06/201631/12/2016Not AvailableNot Supported
HOPEX V1R115/07/201330/06/201631/12/2016Not AvailableNot Supported
MEGA 200908/04/201131/12/201430/06/2015Not AvailableNot Supported

(*) Contact your local Sales Rep.

 

NOTE: Custom support may be available for some Releases and/or solutions only and it’s subject to case by case approval from MEGA. Customers with a valid Maintenance and Support agreement might request Custom Support through their account managers. The intent of Custom Support is to provide Customers with additional time to plan and complete the upgrade to a fully supported HOPEX Release. Being on the latest available CP of the Release is a prerequisite for Custom Support.

 

Integrated libraries with High or Medium known vulnerability will be fixed on HOPEX supported version, last CP.

Severity of vulnerability is based on CVSS v2 scoring calculated by NVS (National Vulnerability Database) ; https://nvd.nist.gov/