Earlier this week, Microsoft introduced two additional software-as-a-service subscription plans to the partners who will try to sell them.
The pair join an increasing number of subscription deals that the Redmond, Wash. company has modeled on the Office 365 pattern. The new plans even carry the “365” label, which Microsoft sees as a unifying identifier.
Microsoft 365 is, as CEO Satya Nadella introduced it Monday, “a fundamental departure in how we think about product creation,” composed of, initially at least, two plans. The more expensive, Microsoft 365 Enterprise, is simply a new name for a year-old, two-tier product titled “Secure Productive Enterprise E3” and “Secure Productive Enterprise E5.” Those SKUs (stock-keeping units) were introduced at Microsoft’s 2016 partner conference. Like SPE, M365 Enterprise tosses Windows 10 Enterprise, Office 365 and Enterprise Mobility + Security into a bucket.
But “Microsoft 365 Business,” or M365 Business for short, is the more interesting of the two plans because it is actually new. Nadella thought the same. “I’m so excited about the product innovation that you will see today around small and medium-sized businesses,” he said during a two-hour keynote before partners.
So, what’s Microsoft 365 Business? That’s the new deal Microsoft will push later this year after an unspecified time in preview, which will start Aug. 2.
M365 Business includes:
Office 365 Business Premium, a software-and-service plan that includes all the Office applications, hosted Exchange email, OneDrive storage service and more. Alone, Office 365 Business Premium costs $12.50 per user per month when billed on an annual basis.
Windows 10 Pro: Devices currently running Windows 7 Professional or Windows 8.1 Pro may be upgraded to Windows 10 Pro under M365 Business.
Windows 10 Business: According to Microsoft, “Windows 10 Business is a set of cloud-[based] services and device management capabilities that complement Windows 10 Pro and enable the centralized management and security controls of Microsoft 365 Business.” The services and tools include a subset of those from Intune, Microsoft’s enterprise mobility management (EMM) platform, as well as Windows AutoPilot, an automated deployment service bundled with Windows 10’s March 2017 feature upgrade, aka 1703 and Creators Update.
How much does M365 Business cost? $20 per user per month when it launches later this year.
That’s $7.50 per user per month more than Office 365 Business Premium, or an extra $90 per user annually. For that amount, customers receive the difference between the two plans: the upgrade to Windows 10 Pro and the various management service components.
Who is Microsoft 365 Business for? According to Microsoft, the plan is “built for small and midsize customers that have little to no IT resources on staff.”
Although companies of any size can purchase M365 Business licenses, any one customer can buy no more than 300 subscriptions, another signal that it aims at small and medium-sized organizations.
The limited management tools also play to that theme. They’re designed to be easy to use and offer only basic functionality, and are accessed via simple control panels similar to what they may have already used for Office 365.
What’s the Windows 10 upgrade all about in M365 Business? Good question.
Microsoft’s descriptions of this component are sketchy thus far. An extensive company Q&A on the subscription plan had the most information, saying, “If you have devices that are licensed for Windows 7, 8 and 8.1 Professional, Microsoft 365 Business provides an upgrade to Windows 10 Pro.” (The “Professional” label holds for Windows 7, but 8 and 8.1 are dubbed “Pro” instead, as is Windows 10.)
Computerworld was unable to unearth additional details of the upgrade, specifically what happens when a customer cancels a M365 Business subscription or lets one expire. Do devices that were upgraded from Windows 7 Professional to Windows 10 Pro retain the latter license? Or is the Windows 10 license revoked, forcing customers to reinstall the previous OS?
Microsoft declined to answer questions about that scenario, and analysts who had been briefed by the company said that licensing issues were not discussed in Microsoft’s presentation.
The matter of expiring subscriptions requires context. Generally, when customers exit a subscription, say, Office 365, the applications and services will retreat into a reduced functionality mode or stop working entirely. Something similar happens after a subscription to Windows 10 Enterprise E3 or E5 lapses. “When a subscription license expires … the Windows 10 Enterprise device seamlessly steps back down to Windows 10 Pro,” Microsoft states in a support document.
In other instances, Microsoft doesn’t strip away an upgrade. Customers who have subscribed to Windows 10 Enterprise E3 or E5 may upgrade devices equipped with Windows 7 Professional or 8.1 Pro, to Windows 10 Pro; if they later depart the E3 or E5 plan, the Windows 10 license permanently remains in place.
Which of these options remains — cancellation or retention — is what’s unclear in the case of M365 Business.
What management tools does M365 Business include? Enough, says Microsoft, to adequately serve small and mid-sized businesses.
What Microsoft calls “a simplified management console” controls device and user management functions. The tools bundled in M365 Business include:
•Auto-install (and easy uninstall) Office
•Wipe company data from devices, both company- and employee-owned
•Enforce user settings on devices, including access to Windows Store or use of Cortana
•Force users to save all work to OneDrive for Business
•Configure new PCs as well as existing systems running Windows 10 Pro 1703 (Creators Update) or later using AutoPilot
•Automatically update and upgrade Windows 10 PCs using Windows Update for Business
We heard there’s a preview of M365 Business. What’s that deal? Yes, there will be a preview available starting, Microsoft’s said, on Wednesday, Aug. 2. The preview will be accessible from this website. Users may, in fact, sign up now for the preview on that page.
Although there is no charge for the preview, Microsoft recommended that potential customers contact their preferred Microsoft Partner — or locate one — to handle the M365 Business deployment.
Interestingly, Microsoft said, “Devices running Windows 7 [Professional] or 8.1 Pro are eligible for an upgrade to Windows 10 Pro within the Microsoft 365 Business preview.” It was unclear whether that upgrade would be retained or retracted at the end of the preview.
What does M365 Business require? According to Microsoft, Windows 7 Professional PCs “likely meet the minimum requirements.” However, only Windows 10 devices can be managed in M365 Business, a powerful motivator for equipping as many systems as possible with the newer OS.
The other major precondition for the subscription — Azure Active Directory (AAD) — is necessary to enforce user and device policies set in the management console, and for other tasks, such as AutoPilot set-up. Microsoft acknowledged that on-premises Active Directory works with M365 Business, but “it is not recommended.”
By Gregg Keizer
Senior Reporter, Computerworld |
Jul 13, 2017 3:12 AM PT
Maximize employee productivity and mobility with…..
The Class Computing SyncedFolder – Business Class Cloud.
File “Storage + Sharing + Syncing” with administrative console
and robust access policies.
Class Computing brings you another tool to save you money so you can allocate resources to areas that make money and incubate growth.
We live in a fast-paced, mobile world. How are your employees accessing and sharing files on the go? Many of our customers do not use a dedicated server. They are companies with 10-20 employees and they utilize the SyncedFolder.
File sync technology has made it possible for employees to access and share files from virtually anywhere. Unfortunately, the use of consumer-grade file sync services, such as Dropbox, Microsoft OneDrive, and Google Drive, jeopardizes corporate data and is not appropriate for the workplace. It is imperative that organizations adopt business-grade file sync solution that is both easy to use and secure.
Our solution syncs corporate data, allowing users to access and share critical files and folders from their computers and mobile devices. Executives and employees are able to work from virtually anywhere.
Our tool is full of features that make it easy for users to securely collaberate with others. Users have various sharing options with internal and external parties, control over files and folders that they have shared, and set policies for the ways in which they are accessed. All of this combines to form an intuitive and seamless user experience.
Finally, the Class SyncedFolder gives administrators total control over their corporate data. A comprehensive dashboard, rich reporting, and granular controls makes it easy to manage an entire instance of Your Private Cloud SyncedFolder. Coupled with military-grade encryption, custom or unlimited retention, remote wipes, continuous backups, and rapid restores, SyncedFolder sets the standard for business-grade file sync.
For current pricing call (312) 262-3930 or email email@example.com.
“We have a mission to save the web by increasing browsing speed and safety for users, while growing ad revenue share for content creators.”
I have been using it for a few weeks and am ready to replace everything else for my personal use. I recommend you try it.
We already know “Microsoft has its own impressively resilient processes for backing up Office 365 services.” MS employs the 3-2-1 backup rule; three copies of the data on two different media with one copy off-site. Microsoft does more than the minimum to cover itself.
From what I have read: Exchange Online Data is stored at data centers in Quicy, WA; Chicago, IL; San Antonio, TX; and Des Moines, IA. Microsoft allegedly stores data in at least two of the data centers for availability at all times. This is in addition to whatever processes they do not tell you publicly.
Now move the responsibility to yourself: The data is in the cloud, but what is YOUR second backup option? Relying soley on Microsoft to keep a copy of your data is only one media. And the files stored locally on your Outlook client are incomplete, because you have deleted email / files over time.
CLASS COMPUTING HAS EXCELLENT SOLUTIONS.
The Deleted Items Folder can have a retainage policy of: 14 Days, 30 Days, 60 Days, etc; this comes with limited functionality. Third-party solutions are more robust and easier to use. Class Computing has a complete back-up offering.
MAXIMUM SPEED AND SECURITY. JUST THE RIGHT SIZE.
The award-winning F110 is a true revolution in rugged tablet
computing. The F110 combines best-in-class performance,
industry-leading security, a large 11.6” widescreen display and
a thin and light design that redefines rugged mobility.
GET A QUOTE (312) 262-3930 or SALES@classcomputing.com
THE BEST CONVERTIBLE GETAC® HAS EVER MADE!
The Getac V110 fully rugged convertible notebook is Faster,
More Secure, Thinner and As Versetile As Ever. It features :
6th Gen Intel® Core™ i7 + Intel HD Graphics 520
A large 11.6” widescreen display and a design that is as thin and light as ever – at 4.36 lbs. light and 1.26” thin.
This optional protective measure disables your V110 if it detects an unauthorized or compromised entry.
Trusted Platform Module 2.0
The V110 features TPM 2.0 – a powerful anti-tampering device that checks for any signs of intrusion during system boot-up.
Authenticate your credentials via Near Field or Radio Frequency transmission.
Smart Card Reader.
The V110 supports Smart Cards for secure identity verification.
Verify your ID with ease and accuracy by simply swiping your finger.
Windows 10 Multi-Factor Authentication.
The V110’s hardware fully supports Microsoft’s latest authentication tools, including Windows Hello, Microsoft Passport and Credential Guard.
GET A QUOTE (312) 262-3930 or SALES@classcomputing.com
Setting the Standard in Semi-Rugged Computing
Raising the bar on the semi-rugged notebook class, the new S410 is
more rugged, slimmer and lighter than ever before. The all-new S410
boasts the latest computing innovations, including a significant CPU
performance boost, enhanced graphics , and multiple options for
greater flexibility. The S410 puts greater power and adaptability into
the hands of mobile professionals across a range of industries.
Less Downtime When It’s Crunch Time.
It doesn’t happen often, but if a S410 ever needs to be serviced, Getac offers unmatched coverage that will ensure you get your computer fixed and back on the job fast.
Industry’s Best 3-Year Warranty.
Nothing says quality like a manufacturer standing behind their product. We’ve designed the S410 semi-rugged notebook from the inside out to survive drops, shocks, spills, vibration and more. We’re confident in our quality and that’s why the rugged S410 comes standard with the industry’s best 3 years Pack & Collect warranty. It’s the peace-of-mind protection of knowing you’re covered1.
3 years Pack & Collect.
GET A QUOTE (312) 262-3930 or SALES@classcomputing.com
Originally from https://www.neverpaytheransom.com/ ©2017CARVIR INFOSEC®
CLASS COMPUTING (www.classcomputing.com) is thrilled to be able to offer this elite Security Service for your companies IT Infrastructure.
The CARVIR™ security team provides the first line of defense – without the noise of managing threat intelligence, research, analysis and false positives. CARVIR will:
- Kill malicious processes
- Quarantine malware and infected files
- Disconnect infected endpoints from the network to prevent lateral spread
- Alert IT Security personnel via email and SMS
- Immunize all other protected endpoints on the network against new, never-before-seen threats
- Report and escalate
Heaps of deep forensic data are transformed into an intuitive visualization in real time. The attack storyline depicts the threat execution flow in high resolution, from inception. Our team can view a specific process on the attack story line and drill down into the individual network, file, process, or data actions that occurred. This information allows our team to take decisive action towards securing your network.
If escalation is needed, we will provide an outline of the attack details. This will often include attack statistics, file information, path, machine name, IP, domain, along with information about where else on the network the attack has been seen, what we’ve done to isolate or eliminate the threat and what your team’s next step should be, if any.
In addition, we can provide cloud reputation, certificate information (if the file is signed or not), and advanced attack details (such as a list of known packers that may have been used). And lastly, we will provide a .csv or .json file of the attack providing forensic level reporting on the threat for your incident response team reporting – especially helpful in compliance driven environments.
Leverage powerful, behavior-based threat detection to protect data from the types of advanced malware, exploits, drive-bys and script-based attacks that evade outdated, signature based anti-virus technology and sandboxing solutions in Windows, Apple and Linux environments.
Our team actively detects and prevents attacks, even those using memory, PowerShell scripts, insider attacks and browser based drive-by exploits. Once detected, we automatically shut down the attack on the infected machine and prevent lateral movement across the network.
Prevention starts with silent monitoring of all user- and kernel-space activity on the endpoint. Our security agent rapidly builds a complete context of normal system activity, which serves as the backdrop for the industry’s most advanced behavior-based threat detection.
With full visibility into the endpoint, the engine pinpoints malicious activity—even by the most sophisticated, stealthy attacks.
We secure Windows, OS X, and Linux endpoint devices (servers, workstations and laptops) for full endpoint protection.
Eliminate threats the instant they are detected with fully integrated response capabilities. If something slips through, we can reverse any attack-driven file damage and restore* files back to their previous trusted states with the click of a button.
Well, technically our team says it’s two clicks. But who’s counting?
And it’s not just ransomware. We protect data from the types of advanced malware, exploits, drive-bys and script-based attacks that evade outdated, signature based anti-virus technology and sandboxing solutions.
* Requires use of Windows Shadow Copy
Contact CLASS COMPUTING for a QUOTE today!