Microsoft Enterprise Mobility Suite (EMS) is a set of tools that are deeply integrated to provide you with all you need to administer, provision and secure the devices that are used in your enterprise. With EMS, you can manage smartphones, tablets, and laptops in a single system where you can also manage user credentials, applications and security from a single place.
You can use in addition with Microsoft System Center, SaVision, SolarWinds and NexThink if there is a need.
Why choose MDSC1?
MDSC1 offers you enterprise management solutions such as Microsoft system center, actionable dashboards, IT management software and IT security for end users to help accelerate the growth of your business.
Below are the plans that we sell. Click on "More Info" to view the plan details. If you are interested in buying a plan or you have questions then click here to send an email to us or you can manually send an email to khamid@mdsuae.ae and we will reply you shortly.
Choose your plan
Compare between the Enterprise Mobility Suite Plans | ||
---|---|---|
E3 | E5 | |
$7.00 user/month for commercial use
|
$11.82 user/month for commercial use
|
|
$1.50 user/month for academic use
|
$2.64 user/month for academic use
|
|
The plan includes Azure Active Directory Premium P1, Intune, Azure Information Protection P1 and Advanced Threat Analytics. | The plan includes Azure Active Directory Premium P2, Intune, Azure Information Protection P2, Advanced Threat Analytics and Cloud App Security. | |
Centrally manage single sign-on across devices, your datacenter, and the cloud | ||
Centrally manage single sign-on across devices, your datacenter, and the cloud | ✔ | ✔ |
Strengthen sign-in authentication with verification options, including phone calls, text messages, or mobile app notifications, and use security monitoring to identify inconsistencies | ||
Strengthen sign-in authentication with verification options, including phone calls, text messages, or mobile app notifications, and use security monitoring to identify inconsistencies | ✔ | ✔ |
Define policies that provide contextual controls at the user, location, device, and app levels to allow, block, or challenge user access | ||
Define policies that provide contextual controls at the user, location, device, and app levels to allow, block, or challenge user access | ✔ | ✔ |
Protect apps and critical data in real time using machine learning and the Microsoft Intelligent Security Graph to block access when risk is detected | ||
Protect apps and critical data in real time using machine learning and the Microsoft Intelligent Security Graph to block access when risk is detected | ✔ | |
Monitor suspicious activity with reporting, auditing, and alerts, and mitigate potential security issues using focused recommendations | ||
Monitor suspicious activity with reporting, auditing, and alerts, and mitigate potential security issues using focused recommendations | ✔ | ✔ |
Provide timely, on-demand administrative access to online services with access-related reporting and alerts | ||
Provide timely, on-demand administrative access to online services with access-related reporting and alerts | ✔ | |
Provide each user access to server functions from multiple devices for a single fee | ||
Provide each user access to server functions from multiple devices for a single fee | ✔ | ✔ |
Enroll corporate and personal devices to provision settings, enforce compliance, and protect your corporate data | ||
Enroll corporate and personal devices to provision settings, enforce compliance, and protect your corporate data | ✔ | ✔ |
Publish, configure, and update mobile apps on enrolled and unenrolled devices, and secure or remove app-associated corporate data | ||
Publish, configure, and update mobile apps on enrolled and unenrolled devices, and secure or remove app-associated corporate data | ✔ | ✔ |
Extend management and security capabilities across users, devices, apps, and data, while preserving a rich, productive end-user experience | ||
Extend management and security capabilities across users, devices, apps, and data, while preserving a rich, productive end-user experience | ✔ | ✔ |
Centralize management of PCs, laptops, and mobile devices from a single administrative console, and produce detailed hardware and software configuration reporting | ||
Centralize management of PCs, laptops, and mobile devices from a single administrative console, and produce detailed hardware and software configuration reporting | ✔ | ✔ |
Extend your on-premises management to the cloud from a single console with Microsoft System Center Configuration Manager and Microsoft System Center Endpoint Protection integration for enhanced PC, Mac, Unix/Linux server, and mobile device administration | ||
Extend your on-premises management to the cloud from a single console with Microsoft System Center Configuration Manager and Microsoft System Center Endpoint Protection integration for enhanced PC, Mac, Unix/Linux server, and mobile device administration | ✔ | ✔ |
Encrypt sensitive data and define usage rights for persistent protection regardless of where data is stored or shared | ||
Encrypt sensitive data and define usage rights for persistent protection regardless of where data is stored or shared | ✔ | ✔ |
Configure policies to automatically classify and label data based on sensitivity and then apply persistent protection | ||
Configure policies to automatically classify and label data based on sensitivity and then apply persistent protection | ✔ | |
Monitor activities on shared data and revoke access in case of unexpected events | ||
Monitor activities on shared data and revoke access in case of unexpected events | ✔ | ✔ |
Choose default key management options or deploy and manage your own keys to comply with regulations | ||
Choose default key management options or deploy and manage your own keys to comply with regulations | ✔ | ✔ |
Detect abnormal behavior in on-premises systems and identify advanced targeted attacks and insider threats before they cause damage | ||
Detect abnormal behavior in on-premises systems and identify advanced targeted attacks and insider threats before they cause damage | ✔ | ✔ |
Gain visibility, control, and protection for your cloud-based apps, while identifying threats, abnormal usage, and other cloud security issues | ||
Gain visibility, control, and protection for your cloud-based apps, while identifying threats, abnormal usage, and other cloud security issues | ✔ |