{"title":"Security, Protection \u0026 Antivirus","description":"","products":[{"product_id":"microsoft-enterprise-mobility-security-e3-annual-billing","title":"Microsoft Enterprise Mobility + Security E3 (Annual Billing)","description":"\u003cblockquote\u003e\n\u003cp style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eMicrosoft Enterprise Mobility + Security (EMS) is an intelligent mobility management and security platform.  It helps protect and secure your organization and empowers your employees to work in new and flexible ways.\u003c\/p\u003e\n\u003c\/blockquote\u003e\n\u003ch4 style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan style=\"text-decoration: underline;\" mce-data-marked=\"1\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cstrong\u003eWarranty \u0026amp; Shipping Information\u003c\/strong\u003e\u003c\/span\u003e\u003c\/h4\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eFor new license subscription, license extension or license migration.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eAuthorized Products.  Around-the-clock phone and web support from Microsoft.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eTypical delivery time (online delivery):  0-2 business days.\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003c\/div\u003e\n\u003ch4 style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cstrong\u003eProduct Highlights\u003c\/strong\u003e\u003c\/span\u003e\u003c\/h4\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eMicrosoft Enterprise Mobility + Security provides cloud-based solutions to enable users to work on the device of their choice and access resources they need, while centralizing organizational information to ensure compliance and data protection.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eIt is a comprehensive cloud solution to address the consumerization of IT, BYOD and SaaS challenges.  The suite delivers comprehensive management of users, devices, and applications found both on-premises and in the cloud.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eMicrosoft can help you manage the complexity of existing platforms and add new capabilities to deliver cloud-based services to organizationally managed devices and user-provided devices, regardless of where the services are delivered and consumed from.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eIt enables users to work on the device of their choice and access resources they need, while centralizing organizational information to ensure compliance and data protection.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eMicrosoft's Enterprise Mobility + Security is simple to set up, always up-to-date, and connects to on-premises data centers.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003cstrong\u003eIdentity and access management\u003c\/strong\u003e\u003cbr\u003eEnsure secure connections between people, devices, apps, and data. Increase your security and productivity with a single, holistic identity solution that gives you flexibility and control. \u003cbr\u003e\u003cbr\u003e\u003cstrong\u003eInformation protection\u003c\/strong\u003e\u003cbr\u003eProtect your sensitive data everywhere, even in transit and when shared. See and control how files are used with a comprehensive and integrated information protection solution.\u003cbr\u003e\u003cbr\u003e\u003cstrong\u003eThreat protection\u003c\/strong\u003e\u003cbr\u003eDetect and investigate advanced threats, compromised identities, and malicious actions across your on-premises and cloud environments. Protect your organization with adaptive, built-in intelligence.\u003cbr\u003e\u003cbr\u003e\u003cstrong\u003eCloud security\u003c\/strong\u003e\u003cbr\u003eGet comprehensive, cross-cloud protection with Microsoft cloud security solutions.\u003cbr\u003e\u003cbr\u003e\u003cstrong\u003eExpand your security with EMS\u003c\/strong\u003e\u003cbr data-mce-fragment=\"1\"\u003eGet greater protection, detection, and response capabilities for your mobile workforce. EMS and its products increase the security features of Windows 10 and Microsoft 365 and extend them to your entire environment including investments that aren’t supplied by Microsoft.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cem\u003eAzure Active Directory\u003c\/em\u003e\u003c\/span\u003e\u003cbr data-mce-fragment=\"1\"\u003eThe most trusted identity and access management solution in the market that helps you safeguard user credentials and connect people securely to the apps they need.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cem\u003eMicrosoft Endpoint Configuration Manager\u003c\/em\u003e\u003c\/span\u003e\u003cbr data-mce-fragment=\"1\"\u003eSystems management software for managing on-premises PCs, servers, and mobile devices with cloud-powered insights.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cem\u003eMicrosoft Intune\u003c\/em\u003e\u003c\/span\u003e\u003cbr data-mce-fragment=\"1\"\u003eCloud-based unified endpoint management, access management, and data protection.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cem\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003eAzure Information Protection\u003c\/span\u003e\u003c\/em\u003e\u003cbr data-mce-fragment=\"1\"\u003eCloud-based data classification, tracking, protection, and encryption.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cem\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003eMicrosoft Cloud App Security\u003c\/span\u003e\u003c\/em\u003e\u003cbr data-mce-fragment=\"1\"\u003eCloud access security broker with discovery, behavioral analytics, risk assessment, data protection, and threat protection.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cem\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003eMicrosoft Advanced Threat Analytics\u003c\/span\u003e\u003c\/em\u003e\u003cbr data-mce-fragment=\"1\"\u003eOn-premises platform that protects against advanced targeted cyberattacks and insider threats.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cem\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003eMicrosoft Defender for Identity\u003c\/span\u003e\u003c\/em\u003e\u003cbr data-mce-fragment=\"1\"\u003eCloud-based solution that helps protect your organization’s identities from multiple types of advanced targeted cyberattacks.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cem\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003eMicrosoft Secure Score\u003c\/span\u003e\u003c\/em\u003e\u003cbr data-mce-fragment=\"1\"\u003eIntelligent insights and guidance that help maximize your security posture with Microsoft 365 and Azure.\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e  \u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003ch4 style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cstrong\u003eMore Information\u003c\/strong\u003e\u003c\/span\u003e\u003c\/h4\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eWatch the above official or review video(s) for more.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003ca title=\"Microsoft Enterprise Mobility + Security - Quick Guide\" href=\"https:\/\/info.microsoft.com\/rs\/157-GQE-382\/images\/EMS-CNTNT-eBook-ITI-how-EN.PDF\"\u003eMicrosoft Enterprise Mobility + Security - Quick Guide\u003c\/a\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e  \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003ctable width=\"156\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd width=\"156\" colspan=\"2\"\u003e\n\u003cp\u003eIdentity and access management\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eSimplified access management and security\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eMulti-factor authentication\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eConditional access\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eAdvanced security reporting\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eWindows Server Client Access License (CAL)*\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"156\" colspan=\"2\"\u003e\n\u003cp\u003eEndpoint management\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eMobile application management\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eAdvanced Microsoft Office 365 data protection\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eIntegrated PC management\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eIntegrated on-premises management\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"156\" colspan=\"2\"\u003e\n\u003cp\u003eInformation protection\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003ePersistent data protection\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eDocument tracking and revocation\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eEncryption key management per regulatory needs\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"156\" colspan=\"2\"\u003e\n\u003cp\u003eIdentity-driven security\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eMicrosoft Advanced Threat Analytics\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003c\/div\u003e","brand":"Langya Tech","offers":[{"title":"1-Year","offer_id":40181801124000,"sku":"Microsofit-Enterprise-Mobility+Security-E3","price":786.0,"currency_code":"HKD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/4195\/5744\/products\/microsoft-logo.png?v=1623636248"},{"product_id":"microsoft-enterprise-mobility-security-e5-annual-billing","title":"Microsoft Enterprise Mobility + Security E5 (Annual Billing)","description":"\u003cblockquote\u003e\n\u003cp style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eMicrosoft Enterprise Mobility + Security (EMS) is an intelligent mobility management and security platform.  It helps protect and secure your organization and empowers your employees to work in new and flexible ways.\u003c\/p\u003e\n\u003c\/blockquote\u003e\n\u003ch4 style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan style=\"text-decoration: underline;\" mce-data-marked=\"1\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cstrong\u003eWarranty \u0026amp; Shipping Information\u003c\/strong\u003e\u003c\/span\u003e\u003c\/h4\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eFor new license subscription, license extension or license migration.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eAuthorized Products.  Around-the-clock phone and web support from Microsoft.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eTypical delivery time (online delivery):  0-2 business days.\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003c\/div\u003e\n\u003ch4 style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cstrong\u003eProduct Highlights\u003c\/strong\u003e\u003c\/span\u003e\u003c\/h4\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eMicrosoft Enterprise Mobility + Security provides cloud-based solutions to enable users to work on the device of their choice and access resources they need, while centralizing organizational information to ensure compliance and data protection.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eIt is a comprehensive cloud solution to address the consumerization of IT, BYOD and SaaS challenges.  The suite delivers comprehensive management of users, devices, and applications found both on-premises and in the cloud.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eMicrosoft can help you manage the complexity of existing platforms and add new capabilities to deliver cloud-based services to organizationally managed devices and user-provided devices, regardless of where the services are delivered and consumed from.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eIt enables users to work on the device of their choice and access resources they need, while centralizing organizational information to ensure compliance and data protection.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eMicrosoft's Enterprise Mobility + Security is simple to set up, always up-to-date, and connects to on-premises data centers.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003cstrong\u003eIdentity and access management\u003c\/strong\u003e\u003cbr\u003eEnsure secure connections between people, devices, apps, and data. Increase your security and productivity with a single, holistic identity solution that gives you flexibility and control. \u003cbr\u003e\u003cbr\u003e\u003cstrong\u003eInformation protection\u003c\/strong\u003e\u003cbr\u003eProtect your sensitive data everywhere, even in transit and when shared. See and control how files are used with a comprehensive and integrated information protection solution.\u003cbr\u003e\u003cbr\u003e\u003cstrong\u003eThreat protection\u003c\/strong\u003e\u003cbr\u003eDetect and investigate advanced threats, compromised identities, and malicious actions across your on-premises and cloud environments. Protect your organization with adaptive, built-in intelligence.\u003cbr\u003e\u003cbr\u003e\u003cstrong\u003eCloud security\u003c\/strong\u003e\u003cbr\u003eGet comprehensive, cross-cloud protection with Microsoft cloud security solutions.\u003cbr\u003e\u003cbr\u003e\u003cstrong\u003eExpand your security with EMS\u003c\/strong\u003e\u003cbr data-mce-fragment=\"1\"\u003eGet greater protection, detection, and response capabilities for your mobile workforce. EMS and its products increase the security features of Windows 10 and Microsoft 365 and extend them to your entire environment including investments that aren’t supplied by Microsoft.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cem\u003eAzure Active Directory\u003c\/em\u003e\u003c\/span\u003e\u003cbr data-mce-fragment=\"1\"\u003eThe most trusted identity and access management solution in the market that helps you safeguard user credentials and connect people securely to the apps they need.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cem\u003eMicrosoft Endpoint Configuration Manager\u003c\/em\u003e\u003c\/span\u003e\u003cbr data-mce-fragment=\"1\"\u003eSystems management software for managing on-premises PCs, servers, and mobile devices with cloud-powered insights.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cem\u003eMicrosoft Intune\u003c\/em\u003e\u003c\/span\u003e\u003cbr data-mce-fragment=\"1\"\u003eCloud-based unified endpoint management, access management, and data protection.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cem\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003eAzure Information Protection\u003c\/span\u003e\u003c\/em\u003e\u003cbr data-mce-fragment=\"1\"\u003eCloud-based data classification, tracking, protection, and encryption.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cem\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003eMicrosoft Cloud App Security\u003c\/span\u003e\u003c\/em\u003e\u003cbr data-mce-fragment=\"1\"\u003eCloud access security broker with discovery, behavioral analytics, risk assessment, data protection, and threat protection.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cem\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003eMicrosoft Advanced Threat Analytics\u003c\/span\u003e\u003c\/em\u003e\u003cbr data-mce-fragment=\"1\"\u003eOn-premises platform that protects against advanced targeted cyberattacks and insider threats.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cem\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003eMicrosoft Defender for Identity\u003c\/span\u003e\u003c\/em\u003e\u003cbr data-mce-fragment=\"1\"\u003eCloud-based solution that helps protect your organization’s identities from multiple types of advanced targeted cyberattacks.\u003cbr data-mce-fragment=\"1\"\u003e \u003cbr data-mce-fragment=\"1\"\u003e\u003cem\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003eMicrosoft Secure Score\u003c\/span\u003e\u003c\/em\u003e\u003cbr data-mce-fragment=\"1\"\u003eIntelligent insights and guidance that help maximize your security posture with Microsoft 365 and Azure.\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e  \u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003ch4 style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cstrong\u003eMore Information\u003c\/strong\u003e\u003c\/span\u003e\u003c\/h4\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eWatch the above official or review video(s) for more.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003ca title=\"Microsoft Enterprise Mobility + Security - Quick Guide\" href=\"https:\/\/info.microsoft.com\/rs\/157-GQE-382\/images\/EMS-CNTNT-eBook-ITI-how-EN.PDF\"\u003eMicrosoft Enterprise Mobility + Security - Quick Guide\u003c\/a\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e  \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003ctable width=\"156\"\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd width=\"156\" colspan=\"2\"\u003e\n\u003cp\u003eIdentity and access management\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eSimplified access management and security\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eMulti-factor authentication\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eConditional access\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eRisk-based conditional access\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eAdvanced security reporting\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003ePrivileged identity management\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eWindows Server Client Access License (CAL)*\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"156\" colspan=\"2\"\u003e\n\u003cp\u003eEndpoint management\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eMobile application management\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eAdvanced Microsoft Office 365 data protection\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eIntegrated PC management\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eIntegrated on-premises management\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"156\" colspan=\"2\"\u003e\n\u003cp\u003eInformation protection\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003ePersistent data protection\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eIntelligent data classification and labeling\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eDocument tracking and revocation\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eEncryption key management per regulatory needs\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"156\" colspan=\"2\"\u003e\n\u003cp\u003eIdentity-driven security\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eMicrosoft Advanced Threat Analytics\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eMicrosoft Cloud App Security\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd width=\"92\"\u003e\n\u003cp\u003eMicrosoft Defender for Identity\u003c\/p\u003e\n\u003c\/td\u003e\n\u003ctd width=\"64\"\u003eIncluded\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003c\/div\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003c\/div\u003e","brand":"Langya Tech","offers":[{"title":"1-Year","offer_id":40181890089120,"sku":"Microsoft-Enterprise-Mobility+Security-E5","price":1435.0,"currency_code":"HKD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/4195\/5744\/products\/microsoft-logo_ce32aea5-6971-43be-932c-86a47a7d1ad5.png?v=1623638816"},{"product_id":"kaspersky-products","title":"Kaspersky Products","description":"\u003cblockquote data-mce-fragment=\"1\"\u003e\n\u003cp style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003eKaspersky - statistically one of the best antivirus software at its price range.\u003c\/p\u003e\n\u003cp style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003ePlease contact us for solutions and quotation.\u003c\/p\u003e\n\u003c\/blockquote\u003e\n\u003ch4 style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-fragment=\"1\" data-mce-style=\"text-decoration: underline;\" mce-data-marked=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eWarranty \u0026amp; Shipping Information\u003c\/strong\u003e\u003c\/span\u003e\u003c\/h4\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003eAuthorized Products.  Support from Kaspersky.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eTypical store pick-up \/ delivery time:\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd class=\"attribute\"\u003eHong Kong:\u003cbr\u003e\n\u003c\/td\u003e\n\u003ctd\u003e0-3 business days\u003cbr\u003e\u003ca id=\"ctl00_PlaceHolderMain_pdBottomControl_pdExtSpecControl_ctl00_dataRepeater_ctl00_attrValueLink\" disabled target=\"_blank\"\u003e\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"attribute\"\u003eOther locations:\u003cbr\u003e\n\u003c\/td\u003e\n\u003ctd\u003eNot available yet\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003ch4 style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan style=\"text-decoration: underline;\" data-mce-fragment=\"1\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eProduct Highlights\u003c\/strong\u003e\u003c\/span\u003e\u003c\/h4\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\n\u003cstrong\u003eProtect your small business easily (1-50 employees)\u003c\/strong\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003eAs a small business owner, your time is as precious as your business.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003eAt Kaspersky, we’re out to protect both. We’ll secure your business against cyber threats with easy-to-deploy and straightforward-to-manage solutions that leave you free to get on with the important stuff – like generating revenue.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e \u003cbr\u003eKaspersky protects more of the things that matter to your business regardless of IT skill level.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003cstrong\u003eEffortless cybersecurity for growing businesses (51-999 employees)\u003c\/strong\u003e\u003cbr\u003eThe best security makes life easier, not harder, for overworked IT departments. If your business is growing fast, or is in the throes of digital transformation, the chances are that resources are continuously overstretched.\u003cbr\u003e\u003cbr\u003eChoose an endpoint product that delivers instant protection and is ready to scale when you need it.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003cstrong\u003eEnterprise security you can trust (1000+ employees)\u003c\/strong\u003e\u003cbr\u003eGet adaptive protection against advanced threats targeting your business\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e____________________________________\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\n\u003cstrong\u003eOnline Security For You \u0026amp; Your Family (Home Solution)\u003c\/strong\u003e\u003cbr\u003eWith our advanced technology, you can enjoy a safe and private Internet experience without compromising the performance of your computer and mobile devices.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003cstrong\u003eKaspersky Total Security - All your security needs in one product\u003c\/strong\u003e\u003cbr\u003eOur premium protection suite has everything to keep you \u0026amp; your family safe online.\u003cbr\u003e\u003cbr\u003eGet the unmatched feeling of security with award-winning protection against hackers, viruses and malware. Plus payment protection and privacy tools that guard you from every angle.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\n\u003cstrong\u003eSafe Wi-Fi connection - Kaspersky VPN Secure Connection\u003c\/strong\u003e\u003cbr\u003eEncrypt your Internet connection to stay safe on home \u0026amp; public Wi‑Fi\u003cbr\u003e\u003cbr\u003e\u003cstrong\u003eKids protection - Kaspersky Safe Kids\u003c\/strong\u003e\u003cbr\u003eParental controls and GPS tracking to keep your child safe\u003cbr\u003e\u003cbr\u003e\u003cstrong\u003ePassword protection - Kaspersky Password Manager\u003c\/strong\u003e\u003cbr\u003eA bank-grade security vault for your passwords \u0026amp; confidential documents\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003c\/div\u003e\n\u003ch4 style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eMore Information\u003c\/strong\u003e\u003c\/h4\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003eWatch the official or review video(s) for more.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\n\u003ca title=\"Kaspersky Enterprise Products Framework\" href=\"https:\/\/media.kaspersky.com\/en\/enterprise-security\/kaspersky-enterprise-products-framework.pdf\"\u003eKaspersky Enterprise Products Framework (PDF)\u003c\/a\u003e\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003ca href=\"https:\/\/media.kaspersky.com\/en\/business-security\/enterprise\/KL-Enterprise-Catalogue-EN.pdf\" title=\"Kaspersky Security for Enterprise Whitepaper\"\u003eKaspersky Security for Enterprise Whitepaper (PDF)\u003c\/a\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\n\u003cspan\u003ePlease \u003c\/span\u003e\u003cspan\u003econtact us for solutions and quotation.\u003c\/span\u003e\n\u003c\/div\u003e\n\u003ch6 style=\"text-align: center;\" data-mce-fragment=\"1\" data-mce-style=\"text-align: center;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/h6\u003e\n\u003c\/div\u003e","brand":"Langya Tech","offers":[{"title":"Antivirus Products","offer_id":40662835462304,"sku":"","price":0.0,"currency_code":"HKD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/4195\/5744\/products\/768px-Kaspersky_logo.svg_e4c506b0-3b1c-40dc-a519-2cac3b37fa15.png?v=1629204964"},{"product_id":"mcafee-products","title":"McAfee Products","description":"\u003cblockquote data-mce-fragment=\"1\"\u003e\n\u003cp data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eMcAfee - statistically one of the best antivirus software at its price range.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003ePlease contact us for solutions and quotation.\u003c\/p\u003e\n\u003c\/blockquote\u003e\n\u003ch4 data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\" style=\"text-decoration: underline;\" mce-data-marked=\"1\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eWarranty \u0026amp; Shipping Information\u003c\/strong\u003e\u003c\/span\u003e\u003c\/h4\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eAuthorized Products.  Support from McAfee.\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eTypical store pick-up \/ delivery time:\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003ctable\u003e\n\u003ctbody\u003e\n\u003ctr\u003e\n\u003ctd class=\"attribute\"\u003eHong Kong:\u003cbr\u003e\n\u003c\/td\u003e\n\u003ctd\u003e0-3 business days\u003cbr\u003e\u003ca disabled id=\"ctl00_PlaceHolderMain_pdBottomControl_pdExtSpecControl_ctl00_dataRepeater_ctl00_attrValueLink\" target=\"_blank\"\u003e\u003c\/a\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd class=\"attribute\"\u003eOther locations:\u003cbr\u003e\n\u003c\/td\u003e\n\u003ctd\u003eNot available yet\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003c\/div\u003e\n\u003ch4 data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\" style=\"text-decoration: underline;\" data-mce-style=\"text-decoration: underline;\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eProduct Highlights\u003c\/strong\u003e\u003c\/span\u003e\u003c\/h4\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003cstrong\u003eMcAfee® Total Protection\u003c\/strong\u003e\u003cbr\u003ePremium antivirus, safe web browsing and PC optimization.\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e  \u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003cstrong\u003eComprehensive internet security\u003c\/strong\u003e\u003cbr\u003eMcAfee Total Protection goes beyond our award-winning antivirus to provide a wide array of protections to help secure your devices, privacy and identity.\u003cbr\u003e \u003cbr\u003e\u003cstrong\u003eMulti-faceted privacy protection\u003c\/strong\u003e\u003cbr\u003eGain the upper hand against digital identity thieves by protecting or shredding sensitive files, deleting cookies, and more.\u003cbr\u003e \u003cbr\u003e\u003cstrong\u003eSecurity that helps you go faster\u003c\/strong\u003e\u003cbr\u003eGone are the days when antivirus would curse your computer with slow performance. McAfee Total Protection includes a variety of tools\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003cstrong\u003eBeyond just antivirus\u003c\/strong\u003e\u003cbr\u003eAmong our McAfee security solutions, McAfee Total Protection stands tall with its combination of antivirus, privacy and identity tools and features. Defend yourself against the latest virus, malware, ransomware and spyware attacks, while keeping your identity and privacy close and personal.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e \u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003cstrong\u003eMulti-device protection for your modern connected family\u003c\/strong\u003e\u003cbr\u003eWith all the Windows PCs, Macs, tablets and smartphones that help power your family’s day-to-day, it’s hard enough to keep track of their devices, much less protect them. With a single McAfee Total Protection subscription, you can protect five or ten devices without skipping a beat and most importantly, without slowing the family down\u003cbr\u003e \u003cbr\u003e\u003cstrong\u003eAntivirus for a PC\u003c\/strong\u003e\u003cbr\u003eWe recommend using a comprehensive antivirus solution to protect your Windows PCs. Although Windows Defender is built into Windows 10, its anti-malware capabilities may not be sufficient to combat ever-evolving threats. McAfee Total Protection goes beyond antivirus with tools to protect against threats like malicious web pages, phishing and much more.\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003cstrong\u003e\u003c\/strong\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan data-mce-fragment=\"1\"\u003e\u003c\/span\u003e\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003c\/div\u003e\n\u003ch4 data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eMore Information\u003c\/strong\u003e\u003c\/h4\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003eWatch the official or review video(s) for more.\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003ca title=\"McAfee Total Protection - Data Sheet\" href=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0559\/4195\/5744\/files\/mcafee-total-protection_dataSheet.pdf?v=1629381325\"\u003eMcAfee Total Protection - Data Sheet (PDF)\u003c\/a\u003e\u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\n\u003cspan\u003ePlease \u003c\/span\u003e\u003cspan\u003econtact us for solutions and quotation.\u003c\/span\u003e\n\u003c\/div\u003e\n\u003ch6 data-mce-fragment=\"1\" style=\"text-align: center;\" data-mce-style=\"text-align: center;\"\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/h6\u003e\n\u003c\/div\u003e","brand":"Langya Tech","offers":[{"title":"Antivirus Products","offer_id":40682633003168,"sku":null,"price":0.0,"currency_code":"HKD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/4195\/5744\/products\/McAfee_logo__2017_.svg_7c6de8e8-91a7-4f12-8f0e-4048bff9426f.png?v=1629381458"},{"product_id":"teramind-dlp-data-loss-prevention","title":"Teramind Employee Monitoring Software DLP - Data Loss Prevention [Annual Billing]","description":"\u003cp style=\"text-align: center;\"\u003eTeramind - statistically one of the best employee monitoring software at its price range.\u003c\/p\u003e\n\u003cp style=\"text-align: center;\"\u003eWe are an official Authorized Global Partner of Teramind.\u003c\/p\u003e\n\u003cp style=\"text-align: center;\"\u003eA minimum of 5 users are required for first subscription.\u003c\/p\u003e\n\u003cp style=\"text-align: center;\"\u003ePlease contact us for free trial, solutions and quotation. \u003c\/p\u003e\n\u003ch4 style=\"text-align: center;\"\u003e\n\u003cspan style=\"text-decoration: underline;\"\u003e\u003cstrong\u003eProduct Highlights\u003c\/strong\u003e\u003c\/span\u003e\u003cstrong\u003e\u003c\/strong\u003e\n\u003c\/h4\u003e\n\u003cdiv style=\"text-align: center;\"\u003e\n\u003cstrong\u003eEndpoint Data Loss Prevention\u003c\/strong\u003e\u003cbr\u003eDLP solutions offer robust Data Loss Prevention (DLP) capabilities to safeguard all data types and intellectual property. This comprehensive solution employs content-based and file operation-based rules to prevent both malicious and negligent data exfiltration. With pre-defined data discovery and classification, as well as fingerprinting and tagging, sensitive data is meticulously protected. The DLP Plan ensures compliance with critical regulations such as GDPR, HIPAA, PCI DSS, and more, delivering a reliable defense against data breaches and unauthorized access.\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003e\n\u003cstrong\u003e\u003c\/strong\u003e  \u003cbr\u003e\u003cstrong\u003e\u003c\/strong\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003e\u003cstrong\u003eReal-time User Activity Monitoring\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003eDLP solutions monitors screen recording\/live view, remote control, OCR, web pages and applications, activity blocking, email, console commands, file transfers, instant messaging, online meetings, social media activity, keystrokes, clipboard (copy and paste), searches, printing, camera usage, geolocation, and time tracking. \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003e\u003cstrong\u003eUser Behavior Analytics\u003c\/strong\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003eThe DLP solutions' User Behavior Analytics (UBA) provides advanced tools for detecting and analyzing insider threats, abusive and malicious behavior, and anomalies in user activities. Through dynamic risk scoring, the solution identifies and assesses potential threats based on behavior patterns. It also includes productivity analysis and reporting to monitor user efficiency, and offers template-based scheduling to streamline and automate regular reports and alerts.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003e\n\u003cbr\u003e\u003cstrong\u003ePowerful Policy and Rule Engine\u003c\/strong\u003e\u003cbr\u003eThe DLP solutions include a robust Policy and Rules Management system designed for ease of use and flexibility. The Policy Manager allows you to efficiently create, manage, and enforce policies. The Visual Rule Editor provides an intuitive interface for customizing rules, while Regular Expression Support enables advanced rule configuration for complex data patterns. Additionally, Out-of-the-Box Rule Templates offer pre-defined, ready-to-use templates to expedite the setup of standard policies and rules, ensuring streamlined management and effective data protection.\u003cbr\u003e\n\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003e\n\u003cp\u003e\u003cstrong\u003eAudit \u0026amp; Forensics\u003cbr\u003e\u003c\/strong\u003eDLP solutions' Audit \u0026amp; Forensics capabilities feature video and optional audio recording for comprehensive evidence collection, along with OCR of screen content to extract and analyze text within recordings. The option to record only during rule violations ensures targeted data capture, and Full-Text Search allows for quick and thorough investigation of recorded content, facilitating efficient forensic analysis and audit trails.\u003c\/p\u003e\n\u003cstrong\u003e\u003c\/strong\u003e\n\u003c\/div\u003e\n\u003ch4 style=\"text-align: center;\"\u003e\u003cstrong\u003eMore Information\u003c\/strong\u003e\u003c\/h4\u003e\n\u003cdiv style=\"text-align: center;\"\u003e\n\u003cdiv style=\"text-align: center;\"\u003eRead the official whitepaper for more.\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003e\u003ca href=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0559\/4195\/5744\/files\/Teramind_DLP_ppt.pdf?v=1629382814\" title=\"Teramind DLP Whitepaper (PDF)\" rel=\"noopener\" target=\"_blank\"\u003eTeramind DLP Whitepaper (PDF)\u003c\/a\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003e\n\u003cspan\u003ePlease \u003c\/span\u003e\u003cspan\u003econtact us for free trial, solutions and quotation.\u003c\/span\u003e\n\u003c\/div\u003e\n\u003ch6 style=\"text-align: center;\"\u003e\n\u003cspan\u003e\u003c\/span\u003e\u003cbr\u003e\n\u003c\/h6\u003e\n\u003c\/div\u003e","brand":"Langya Tech","offers":[{"title":"Data Loss Prevention [1 User]","offer_id":40683279646880,"sku":"Teramind-DLP-1-User","price":2995.2,"currency_code":"HKD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/4195\/5744\/files\/teramind-thumbnail-new.png?v=1722993960"},{"product_id":"sophos-central-email-advanced","title":"Sophos Central Email Advanced","description":"\u003cp style=\"text-align: center;\"\u003eSophos - statistically one of the best brands for endpoint protection solution at its price range.\u003c\/p\u003e\n\u003cp style=\"text-align: center;\"\u003eWe are an official Sophos Authorized Reseller.\u003c\/p\u003e\n\u003cp style=\"text-align: center;\"\u003eMinimum order quantity:  5 users\u003c\/p\u003e\n\u003ch4 style=\"text-align: center;\"\u003eProduct Highlights\u003c\/h4\u003e\n\u003cul\u003e\n\u003cli\u003eIntegrate with business email providers: Microsoft 365, Google Workspaces Gmail, and more\u003c\/li\u003e\n\u003cli\u003eAPI-based email security for Microsoft 365 with postdelivery protection\u003c\/li\u003e\n\u003cli\u003eStop spam, malware, ransomware, and malicious URLs\u003c\/li\u003e\n\u003cli\u003eBlock malware-free phishing and impersonation attempts\u003c\/li\u003e\n\u003cli\u003eProtect sensitive data with email encryption and data loss prevention\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cdiv style=\"text-align: center;\"\u003e\u003cbr\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003e\u003ca title=\"Sophos Central Email Advanced - DataSheet\" href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/factsheets\/sophos-email-dsna.pdf\"\u003eDatasheet (PDF)\u003c\/a\u003e\u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003e \u003c\/div\u003e\n\u003cdiv style=\"text-align: center;\"\u003e\n\u003ctable style=\"height: 271.208px;\" width=\"556\"\u003e\n\u003ctbody\u003e\n\u003ctr style=\"height: 19.625px;\"\u003e\n\u003ctd style=\"height: 19.625px;\" width=\"88\"\u003e\u003cstrong\u003eProduct Code\u003c\/strong\u003e\u003c\/td\u003e\n\u003ctd style=\"height: 19.625px;\" width=\"171\"\u003e\u003cstrong\u003eDescription\u003c\/strong\u003e\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 19.625px;\"\u003e\n\u003ctd style=\"height: 19.625px;\"\u003eCAMD1CSAA\u003c\/td\u003e\n\u003ctd style=\"height: 19.625px;\" width=\"171\"\u003eCentral Email Advanced - 1-9 USERS - 12 MOS\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 19.625px;\"\u003e\n\u003ctd style=\"height: 19.625px;\"\u003eCAMD2CSAA\u003c\/td\u003e\n\u003ctd style=\"height: 19.625px;\" width=\"171\"\u003eCentral Email Advanced - 1-9 USERS - 24 MOS\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 19.625px;\"\u003e\n\u003ctd style=\"height: 19.625px;\"\u003eCAMD3CSAA\u003c\/td\u003e\n\u003ctd style=\"height: 19.625px;\" width=\"171\"\u003eCentral Email Advanced - 1-9 USERS - 36 MOS\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 19.625px;\"\u003e\n\u003ctd style=\"height: 19.625px;\"\u003eCAME1CSAA\u003c\/td\u003e\n\u003ctd style=\"height: 19.625px;\" width=\"171\"\u003eCentral Email Advanced - 10-24 USERS - 12 MOS\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 19.625px;\"\u003e\n\u003ctd style=\"height: 19.625px;\"\u003eCAME2CSAA\u003c\/td\u003e\n\u003ctd style=\"height: 19.625px;\" width=\"171\"\u003eCentral Email Advanced - 10-24 USERS - 24 MOS\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 19.625px;\"\u003e\n\u003ctd style=\"height: 19.625px;\"\u003eCAME3CSAA\u003c\/td\u003e\n\u003ctd style=\"height: 19.625px;\" width=\"171\"\u003eCentral Email Advanced - 10-24 USERS - 36 MOS\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 19.625px;\"\u003e\n\u003ctd style=\"height: 19.625px;\"\u003eCAMF1CSAA\u003c\/td\u003e\n\u003ctd style=\"height: 19.625px;\" width=\"171\"\u003eCentral Email Advanced - 25-49 USERS - 12 MOS\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 19.625px;\"\u003e\n\u003ctd style=\"height: 19.625px;\"\u003eCAMF2CSAA\u003c\/td\u003e\n\u003ctd style=\"height: 19.625px;\" width=\"171\"\u003eCentral Email Advanced - 25-49 USERS - 24 MOS\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 19.625px;\"\u003e\n\u003ctd style=\"height: 19.625px;\"\u003eCAMF3CSAA\u003c\/td\u003e\n\u003ctd style=\"height: 19.625px;\" width=\"171\"\u003eCentral Email Advanced - 25-49 USERS - 36 MOS\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 19.625px;\"\u003e\n\u003ctd style=\"height: 19.625px;\"\u003eCAMG1CSAA\u003c\/td\u003e\n\u003ctd style=\"height: 19.625px;\" width=\"171\"\u003eCentral Email Advanced - 50-99 USERS - 12 MOS\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 19.625px;\"\u003e\n\u003ctd style=\"height: 19.625px;\"\u003eCAMG2CSAA\u003c\/td\u003e\n\u003ctd style=\"height: 19.625px;\" width=\"171\"\u003eCentral Email Advanced - 50-99 USERS - 24 MOS\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr style=\"height: 35.7083px;\"\u003e\n\u003ctd style=\"height: 35.7083px;\"\u003eCAMG3CSAA\u003c\/td\u003e\n\u003ctd style=\"height: 35.7083px;\" width=\"171\"\u003e\n\u003cp\u003eCentral Email Advanced - 50-99 USERS - 36 MOS\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003ctr\u003e\n\u003ctd\u003eCEMAAU12AENCAA\u003cbr\u003e\n\u003c\/td\u003e\n\u003ctd\u003e\n\u003cp\u003eCentral Email Advanced - 100-199 USERS - 12 MOS\u003c\/p\u003e\n\u003c\/td\u003e\n\u003c\/tr\u003e\n\u003c\/tbody\u003e\n\u003c\/table\u003e\n\u003cbr\u003e\n\u003c\/div\u003e","brand":"Langya Tech","offers":[{"title":"Per user [1-9 users, minimum 5 users] [12-month]","offer_id":47532285264032,"sku":"Sophos-CAMD1CSAA","price":404.4,"currency_code":"HKD","in_stock":true},{"title":"Per user [1-9 users, minimum 5 users] [24-month]","offer_id":47615297388704,"sku":"Sophos-CAMD2CSAA","price":606.53,"currency_code":"HKD","in_stock":true},{"title":"Per user [1-9 users, minimum 5 users] [36-month]","offer_id":47615304630432,"sku":"Sophos-CAMD3CSAA","price":812.83,"currency_code":"HKD","in_stock":true},{"title":"Per user [10-24 users] [12-month]","offer_id":47615314559136,"sku":"Sophos-CAME1CSAA","price":351.84,"currency_code":"HKD","in_stock":true},{"title":"Per user [10-24 users] [24-month]","offer_id":47615318851744,"sku":"Sophos-CAME2CSAA","price":527.83,"currency_code":"HKD","in_stock":true},{"title":"Per user [10-24 users] [36-month]","offer_id":47615325438112,"sku":"Sophos-CAME3CSAA","price":707.28,"currency_code":"HKD","in_stock":true},{"title":"Per user [25-49 users] [12-month]","offer_id":47615334416544,"sku":"Sophos-CAMF1CSAA","price":330.43,"currency_code":"HKD","in_stock":true},{"title":"Per user [25-49 users] [24-month]","offer_id":47615338217632,"sku":"Sophos-CAMF2CSAA","price":495.61,"currency_code":"HKD","in_stock":true},{"title":"Per user [25-49 users] [36-month]","offer_id":47615342313632,"sku":"Sophos-CAMF3CSAA","price":664.11,"currency_code":"HKD","in_stock":true},{"title":"Per user [50-99 users] [12-month]","offer_id":47615347556512,"sku":"Sophos-CAMG1CSAA","price":301.04,"currency_code":"HKD","in_stock":true},{"title":"Per user [50-99 users] [24-month]","offer_id":47615351423136,"sku":"Sophos-CAMG2CSAA","price":451.59,"currency_code":"HKD","in_stock":true},{"title":"Per user [50-99 users] [36-month]","offer_id":47615356272800,"sku":"Sophos-CAMG3CSAA","price":605.05,"currency_code":"HKD","in_stock":true},{"title":"Per user [1-9 users minimum 5 users] [12-month]","offer_id":52906982801568,"sku":"Sophos-CEMAAU12AARCAA","price":507.0,"currency_code":"HKD","in_stock":true},{"title":"Per user [25-49 users] [12 -month]","offer_id":53048123850912,"sku":"Sophos-CEMAAU12ACNCAA","price":407.08,"currency_code":"HKD","in_stock":true},{"title":"Per user [100-199 users] - [12 -month]","offer_id":56922061963424,"sku":"Sophos-CEMAU12AERCAA","price":266.6,"currency_code":"HKD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/4195\/5744\/files\/sophos_logo.png?v=1699521806"},{"product_id":"symantec-endpoint-protection","title":"Symantec Endpoint Protection (SEP)","description":"\u003cp style=\"text-align: center;\"\u003eWe are an Authorized Reseller of Symantec in most Asia locations including but not limited to Hong Kong, Singapore, Taiwan, China, Indonesia, Philippines, Malaysia, Thailand, and Vietnam.\u003c\/p\u003e\n\u003ch4 style=\"text-align: center;\"\u003eProduct Highlights\u003c\/h4\u003e\n\u003cul\u003e\n\u003cli\u003eProtection for all endpoints: laptops, desktops, tablets, mobile devices, and servers\u003c\/li\u003e\n\u003cli\u003eSingle agent for attack surface reduction, attack prevention, breach prevention, and Endpoint Detection and Response (EDR)\u003c\/li\u003e\n\u003cli\u003eSingle console with real-time threat visibility\u003c\/li\u003e\n\u003cli\u003eFlexible deployment: on-premises, cloud managed, and hybrid models\u003c\/li\u003e\n\u003cli\u003eAdaptive Protection\u003c\/li\u003e\n\u003cli\u003eActive Directory Security\u003c\/li\u003e\n\u003cli\u003eAdvanced Application Control\u003c\/li\u003e\n\u003cli\u003eArtificial Intelligence (AI) guided security management\u003c\/li\u003e\n\u003cli\u003eTargeted Attack Analytics and Threat Hunter\u003c\/li\u003e\n\u003cli\u003eGlobal Intelligence Network (GIN), one of the largest in the world, delivers real-time threat information, threat analytics, content classification, and comprehensive threat blocking data\u003c\/li\u003e\n\u003cli\u003eIntegration with third-party applications including Microsoft Graph, Open C2, and other Symantec solutions through Symantec ICDx\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp style=\"text-align: center;\"\u003e\u003ca href=\"https:\/\/cdn.shopify.com\/s\/files\/1\/0559\/4195\/5744\/files\/Symantec_endpoint_security_brief_SED-EPS-PB102.pdf?v=1710339121\" title=\"Symantec Endpoint Protection - Product Brief\"\u003eProduct Brief (PDF)\u003c\/a\u003e\u003c\/p\u003e","brand":"Langya Tech","offers":[{"title":"1-Year Subscription License with Support [1-99 Devices]","offer_id":49043902529696,"sku":"Symantec-SEP-SUB-1-99","price":186.0,"currency_code":"HKD","in_stock":true},{"title":"3-Year Subscription License with Support [1-99 Devices]","offer_id":53008627171488,"sku":"Symantec-SEP-SUB-1-99-[3-year]","price":558.0,"currency_code":"HKD","in_stock":true},{"title":"1-Year Subscription License with Support [500+ Devices]","offer_id":52417208189088,"sku":"Symantec-SEP-SUB-500-PLUS","price":101.4,"currency_code":"HKD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/4195\/5744\/files\/SymantecEndPointProtection_1.png?v=1710339956"},{"product_id":"symantec-endpoint-security","title":"Symantec Endpoint Security (SES)","description":"\u003cp style=\"text-align: center;\"\u003eWe are an Authorized Reseller of Symantec in most Asia locations including but not limited to Hong Kong, Singapore, Taiwan, China, Indonesia, Philippines, Malaysia, Thailand, and Vietnam.\u003c\/p\u003e\n\u003ch4 style=\"text-align: center;\"\u003eProduct Highlights\u003c\/h4\u003e\n\u003cp\u003e\u003cstrong\u003eUnified Architecture \u0026amp; Management\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cb\u003eSingle Agent, Single Console:\u003c\/b\u003e Consolidates multiple security functions (Prevention, EDR, Application Control) into one lightweight agent and manages all endpoints from a unified, cloud-based console.\u003c\/li\u003e\n\u003cli\u003e\n\u003cb\u003eFlexible Deployment:\u003c\/b\u003e Supports on-premises, cloud-managed, and hybrid deployment models to suit any infrastructure.\u003c\/li\u003e\n\u003cli\u003e\n\u003cb\u003eBroad OS Coverage:\u003c\/b\u003e Protects traditional devices (Windows, macOS, Linux) and mobile devices (iOS and Android).\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eAdvanced Threat Prevention\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cb\u003eMulti-Layered Protection:\u003c\/b\u003e Goes beyond traditional antivirus with advanced machine learning, behavioral analysis (SONAR), and file reputation analysis (Insight).\u003c\/li\u003e\n\u003cli\u003e\n\u003cb\u003eAI-Driven Detection:\u003c\/b\u003e Utilizes Artificial Intelligence and Machine Learning to detect and block zero-day threats, polymorphic malware, and fileless attacks before execution.\u003c\/li\u003e\n\u003cli\u003e\n\u003cb\u003eActive Directory Security:\u003c\/b\u003e Defends against credential theft and lateral movement by protecting Active Directory from attacks originating at the endpoint.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDetection, Response, and Hardening\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cb\u003eIntegrated EDR (Endpoint Detection and Response):\u003c\/b\u003e Provides deep endpoint visibility, automated incident generation, and forensics to quickly detect, investigate, and remediate advanced threats.\u003c\/li\u003e\n\u003cli\u003e\n\u003cb\u003eAdaptive Protection:\u003c\/b\u003e Uses real-time threat intelligence to automatically adjust security policies and manage potentially risky behaviors (like Living-Off-The-Land attacks).\u003c\/li\u003e\n\u003cli\u003e\n\u003cb\u003eAttack Surface Reduction:\u003c\/b\u003e Features like Application Control, Device Control, and Host Integrity help proactively harden devices and enforce compliance policies.\u003c\/li\u003e\n\u003cli\u003e\n\u003cb\u003eGlobal Threat Intelligence:\u003c\/b\u003e Leverages the vast Symantec Global Intelligence Network (GIN) for real-time threat data to enhance detection accuracy.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp style=\"text-align: center;\"\u003e\u003ca href=\"https:\/\/docs.broadcom.com\/doc\/endpoint-security-en\"\u003eProduct Brief (PDF)\u003c\/a\u003e\u003cbr\u003e\u003c\/p\u003e","brand":"Symantec","offers":[{"title":"Endpoint Security Enterprise Hybrid Subscription License with Support 1-99 Devices 1Y [License Term Year: 3 Years]","offer_id":52985302778016,"sku":"Symantec-SES-SUB-1-99","price":654.0,"currency_code":"HKD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0559\/4195\/5744\/files\/SymantecEndPointProtection_1.png?v=1710339956"}],"url":"https:\/\/www.langyatech.com\/de-th\/collections\/security-protection-antivirus-1.oembed","provider":"Langya Tech","version":"1.0","type":"link"}