Windows 365 allows you to scale your resources. You will be able to reduce or increase the number of vCPU cores, RAM, and disk capacity as needed. Thanks to the simplicity of use, you can log in and return to the state in which you finished your work, regardless of the device on which you last […]
ADDON - Helps automate and manage subject rights requests at scale. The purchase of this SKU allows you to create 100 subject rights request (listed as an add-on license). Each subject rights request costs 5200 bringing the total amount to 520,000 (100 x 5200 / request). These 100 subject rights requests can be used anytime within one year from the date of purchase.
Part no: FKL-00001 12.3 inches PixelSense 10-Point Touchscreen Display 2.5GHz Intel Core i7 Quad Core Processor 8MP Rear and 5MP Front Camera 16GB RAM, 1TB SSD Intel UHD Graphics 620, Media Card Reader, No Pen, Wifi, Bluetooth Windows 10 Pro
NON-SPECIFIC - Microsoft Defender For Endpoint P2 is a comprehensive endpoint security solution and enables enterprise customers to protect, detect, investigate, and respond to advanced attacks and data breaches. It includes leading capabilities for end point detection and response, automated response and remediation and vulnerability management capabilities.
NON-SPECIFIC - Windows 365 Business is for smaller organizations vCPU, 4 GB, 256 GB - that want a simple way to buy, deploy, and manage Cloud PCs, for Annually up to 300 users. With your Windows 365 Cloud PC, you can securely stream your Windows experience -- including your personalized apps, content, and settings -- from the Microsoft cloud to any device.
ADDON - A cloud-based telephony solution that enables users to make and receive PSTN calls in Microsoft Teams. It includes a phone system, domestic calling plan, and audio conferencing.
NON-SPECIFIC - The online versions of Office with email, instant to messaging, HD video conferencing, plus 1 TB personal file storage and sharing. Does not include the Office suite for PC or Mac.
ADDON - Enables online users to place and receive Domestic calls through the Public Switched Telephone Network (PSTN). There are base pre-requisites required to purchase this offering.
Intel Core i7 7th Gen 7660U (2.50 GHz) 16 GB Memory 512 GB SSD Intel Iris Plus Graphics 640 12.3" Touchscreen 2736 x 1824 Detachable Windows 10 Pro 64-bit 11.50" x 7.90" x 0.33" 1.73 lbs. Surface Pen, Mouse, and Type Cover Sold Separately
ADDON - With a data loss prevention (DLP), you can identify, monitor, and automatically protect sensitive information across Office 365. Identify sensitive information across many locations, such as Exchange Online, SharePoint, and OneDrive for business.
NON-SPECIFIC - Viva Learning creates a central hub for learning in to Teams where people can discover, share, assign, and learn from content libraries across an organization. It includes access to select Microsoft and Linkedln Learning content.
NON-SPECIFIC - The Office suite for PC and Mac with apps for tablets and phones, plus email, instant messaging, HD video conferencing, 1 TB personal file storage and sharing, and available add-ons like PSTN calling.
– This per-user offer enables customers to get access to topic cards/pages/knowledge centers and advanced search features including Microsoft Graph Connectors.
NON-SPECIFIC - Enable secured and compliant collaboration with data loss prevention policies that help avoid leaks and restrict external sharing of sensitive data. Configure protection and governance labels and locate your sensitive data and understand how it is being used.
ADDON - For organizations that need call management capabilities (make, receive and transfer calls) in the cloud and use the Office 365 admin center to manage users.
NON-SPECIFIC - Power Apps Portals allow organizations to extend business processes to employees and external audiences. Each unit includes 100 daily log ins by external users per month.
NON-SPECIFIC - Manage eDiscovery communications using tools to send and track custodian responses and escalate with reminders and manager notifications. Investigate data leakage, examine associated user activities, and take actions to remediate such as deleting associated data