Enterprise Mobility + Security E3 and E5 are cloud-based identity and security services that help manage and protect your organization's users, devices, apps, and data. The tools included vary depending on the subscription you choose.
Enterprise Mobility + Security E5 includes everything in E3 plus advanced security capabilities.
See the Features tab for a comparison of subscription options.
You can use Enterprise Mobility + Security to
If you need help with Microsoft cloud solutions that you've received through TechSoup, let us know.
Centrally manage single sign-on across devices, your datacenter, and the cloud.
Strengthen sign-in authentication with verification options, including phone calls, text messages, or mobile app notifications, and use security monitoring to identify inconsistencies.
Define policies that provide contextual controls at the user, location, device, and app levels to allow, block, or challenge user access.
Protect apps and critical data in real time using machine learning and the Microsoft Intelligent Security Graph to block access when risk is detected.
Monitor suspicious activity with reporting, auditing, and alerts, and mitigate potential security issues using focused recommendations.
Provide timely, on-demand administrative access to online services with access-related reporting and alerts.
Provide each user access to server functions from multiple devices for a single fee.
Enroll corporate and personal devices to provision settings, enforce compliance, and protect your corporate data.
Publish, configure, and update mobile apps on enrolled and unenrolled devices, and secure or remove app-associated corporate data.
Extend management and security capabilities across users, devices, apps, and data, while preserving a rich, productive end-user experience.
Centralize management of PCs, laptops, and mobile devices from a single administrative console, and produce detailed hardware and software configuration reporting.
Extend your on-premises management to the cloud from a single console with Microsoft System Center Configuration Manager and Microsoft System Center Endpoint Protection integration for enhanced PC, Mac, Unix/Linux server, and mobile device administration.
Encrypt sensitive data and define usage rights for persistent protection regardless of where data is stored or shared.
Configure policies to automatically classify and label data based on sensitivity and then apply persistent protection.
Monitor activities on shared data and revoke access in case of unexpected events.
Choose default key management options or deploy and manage your own keys to comply with regulations.
Detect abnormal behavior in on-premises systems and identify advanced targeted attacks and insider threats before they cause damage.
Gain visibility, control, and protection for your cloud-based apps, while identifying threats, abnormal usage, and other cloud security issues.
Detect and investigate advanced attacks and suspicious behaviors on-premises and in the cloud.
Get technology news and updates on exciting new offers from TechSoup.
This website is using cookies.
We use only non-persistent cookies that are essential for the normal functionality of the site. No personal data are stored in our cookies.