Support Policy HOPEX V4 & V5
Support Policy HOPEX V4 & V5
Last updated: October 10, 2023
Software Support HandBook
The MEGA Software Support HandBook gives a description of the services provided by MEGA Support and a guideline to interaction with the MEGA Support team.
This Handbook is available in English.
Version/Release Lifecycle
Description of Maintenance Phases
Full Support | Support on Deployment, Issues, Bugs (errors) |
|
Limited Support | Support on Bugs (errors) |
|
CP are delivered only for supported Releases (Full/Limited Support).
Release | Lifecycle Start Date | Full Support End Date | Limited Support End Date | Custom Support End Date | Notes |
HOPEX V5 | 14/09/2021 | 31/12/2024 | 30/09/2025 | (*) | |
HOPEX V4 | 24/06/2020 | 30/09/2022 | 31/01/2024 | (*) | |
HOPEX V3 | 18/07/2019 | 30/09/2021 | 30/06/2022 | Not Available | Not Supported |
HOPEX V2R1 U3 | 17/10/2017 | 30/09/2020 | 30/06/2021 | Not Available | Not Supported |
HOPEX V2 | 13/07/2016 | 31/03/2019 | 31/09/2019 | Not Available | Not Supported |
HOPEX V1R3 | 02/04/2014 | 31/03/2018 | 31/09/2018 | Not Available | Not Supported |
HOPEX V1R2 | 02/04/2014 | 30/06/2016 | 31/12/2016 | Not Available | Not Supported |
HOPEX V1R1 | 15/07/2013 | 30/06/2016 | 31/12/2016 | Not Available | Not Supported |
MEGA 2009 | 08/04/2011 | 31/12/2014 | 30/06/2015 | Not Available | Not Supported |
(*) Contact your local Sales Rep.
NOTE: Custom support may be available for some Releases and/or solutions only and it’s subject to case by case approval from MEGA. Customers with a valid Maintenance and Support agreement might request Custom Support through their account managers. The intent of Custom Support is to provide Customers with additional time to plan and complete the upgrade to a fully supported HOPEX Release. Being on the latest available CP of the Release is a prerequisite for Custom Support.
Integrated libraries with High or Medium known vulnerability will be fixed on HOPEX supported version, last CP. Severity of vulnerability is based on CVSS v2 scoring calculated by NVS (National Vulnerability Database) ; https://nvd.nist.gov/ |