Products related to Obligation:
-
Trend Micro Worry-Free Business Security Services
Block ransomware and targeted attacks with hosted endpoint security for all your devices Trend Micro Worry-Free Business Security Services provide enterprise-class protection for Windows, Mac, and Android devices through a secure, centralized, web-based management console. Even remote or branch office security can be managed over the web. Worry-Free Business Security Services protects against viruses, dangerous websites and other threats. As a cloud-based (hosted) service, it requires no server and no maintenance. It is easy to install and simple to manage. In the last two years, more small businesses worldwide have trusted Trend Micro for their content security than any other vendor. Protects against: Viruses Hackers Spyware Dangerous websites Phishing Data theft Advantages: No server and no maintenance required Easy to install and simple to use Monitors, updates and protects all your computers automatically Protects Windows, Mac and Android devices, whether in the office or on the road Stops threats before they reach your business Blocks employee access to unwanted websites Device control that prevents data loss and downloads from infected connected devices Each seat provides protection for two Android devices The broadest range of threat protection Simple Easy to install, easy to use and doesn't slow you down. Efficiently and easily defend against and remediate the most advanced threats with an intuitive, cloud-based console that gives you complete visibility and control across your entire organization. Completely You get detection, response, and investigation capabilities in a single agent. By eliminating multiple vendors, protecting your employees, computers, and mobile devices from cyber threats is easy and affordable. Reliable With our up-to-the-second threat intelligence network, we protect more than 250 million endpoints and defend against threats while you focus on your business. Advanced detection and response Add investigative EDR capabilities for better threat visibility. Our integrated endpoint sensor helps you detect and respond to threats before they compromise your sensitive data. Protect your sensitive data Our integrated DLP, encryption management and device control capabilities cover the broadest range of devices, applications and file types to ensure: Maximum visibility and control Ensure confidentiality and compliance with GDPR, HIPPA, and other rapidly evolving regulations Granular device control and data management policies Management and Visibility for Microsoft BitLocker Stop malicious software with application control Application monitoring, safelisting and lockdown prevent malware and infections from entering your organization by Blocking unauthorized or unknown applications from executing attacks, such as ransomware Enforcing easy-to-manage, simple rules Allowing you to run only applications that you have authorized System Requirements: Browsers Microsoft Internet Explorer 8.0, 9.0, 10.0, 11.0 (32- and 64-bit) Mozilla Firefox (ESR) 38, 39, 40 and 41 Google ChromeTM Microsoft Edge PDF Reader Adobe AcrobatTM Reader 6.0. Newer versions are recommended. Display High-color display with a resolution of 1024 x 768 pixels or higher
Price: 18.75 £ | Shipping*: 0.00 £ -
Trend Micro Worry-Free Business Security Services Advanced
Cloud-based, enterprise-grade protection for your business devices and email The broadest range of threat protection More and more small businesses are falling victim to cybercriminals. Their data theft tactics include spam, malware, phishing, and complex, targeted attacks designed to evade traditional antivirus protection. Simply Cloud-based security designed specifically to protect all your devices and email. Stop email threats in the cloud before they reach your network and protect your devices from spear phishing and advanced targeted attacks. A single, intuitive web console makes managing these powerful capabilities a breeze. Completely Get detection, response, and investigation capabilities in a single agent. Eliminating multiple vendors makes protecting your employees, computers and mobile devices from cyber threats simple and cost-effective. By combining machine learning with other state-of-the-art detection techniques, you get the most comprehensive protection against ransomware and advanced attacks. Trusted More than 500,000 companies worldwide rely on Trend Micro to keep their businesses safe. Thanks to our up-to-the-second threat intelligence network, we protect more than 250 million endpoints and fend off threats while you focus on your business. Advanced Protection A blend of cross-generational threat methods gives you the most comprehensive protection against advanced threats. Take advantage of: High-fidelity machine learning that uniquely analyzes files-not just before execution, but on the fly. More reliable detection of advanced malware, including fileless, cryptomining, ransomware and more Noise reduction techniques , such as Census and Safelist, that check at every level to reduce false positives Behavioral analysis against scripts, injection, ransomware, storage and browser attacks Complete protection for email and collaboration Leverage the efficiency of cloud services while maintaining security. Get advanced threat and data protection for Microsoft® Office 365® email, Microsoft® Teams®, OneDrive, Sharepoint, Gmail® and collaboration tools like Google Drive, Dropbox and Box. Protect your sensitive data Our integrated DLP, encryption management and device control capabilities cover the broadest range of devices, applications and file types to ensure: Maximum visibility and control Ensure confidentiality and compliance with GDPR, HIPPA, and other rapidly evolving regulations Granular policies for device control and data management Management and Visibility for Microsoft BitLocker Stop malicious software with application control Application monitoring, safelisting, and lockdown prevent malware and infections from entering your organization by Blocking unauthorized or unknown applications from executing attacks, such as ransomware Enforcing easy-to-manage, simple rules Allowing you to run only applications that you have authorized System requirements: Operating systems Clients Windows XP, Vista, Windows 7, Windows 8, Windows 8.1 x86/x64 Mac Clients: Mac OS X Snow LeopardTM, LeopardTM, TigerTM Windows Servers 2003, 2003 R2, 2008, 2008 R2, 2012, Small Business Server 2003, 2003 R2, 2008 & 2011, Storage Server 2003, 2003 R2, 2008 & 2012, 2012 R2 x64, Home Server 2011, Server 2008 2008 R2, Essential Business Server 2008, Server 2012 Essentials Mac Servers OS XTM Mountain Lion 10.8 or later, Mac OSTM X Lion 10.7 or later, Mac OS X Snow LeopardTM 10.6 or later, Mac OS X LeopardTM 10.5.7 or later, Mac OS X TigerTM 10.4.11 or later, Mac OS X Mavericks 10.9 Mobile Security (Advanced version only) iOS 3.0 to 6.1 (4.3 to 7.0), Android 2.2 to 4.2, Windows 7.0 to 8.0, BlackBerry 7.0 to 10.1 Email Server (Advanced Version only) Exchange Server 2003 SP2, 2007 SP1, 2010 SP 1, 2 and 3, 2013 Processor: Clients Intel Pentium x86 or compatible; x64: AMD64, Intel EM64T (clock speed varies by OS) Security Server: Conventional Scan Mode:IntelTM PentiumTM 4 or higher; Smart Scan Mode:Intel Core 2 DuoTM or higher recommended Mac PowerPCTM or IntelTM Core Security Server Conventional Scan Mode:IntelTM PentiumTM 4 or higher Smart Scan Mode: multiple processors or multi-core processor Email Server 1 GHz Intel Pentium x86 or compatible; 1 GHz x64 (AMD64, Intel EM64T) RAM: Clients 256 MB; 512 MB recommended Security Server Smart Scan Mode: 1 GB; 2 GB recommended Conventional mode (x86): 512 MB; 1 GB recommended x64 (Smart and conventional): 1 GB; 2 GB recommended Windows EBS 2008 or SBS 2008 (Smart and conventional): 4 GB; 8 GB recommended E-mail server 1 GB Disk space (8.5 GB total): Clients 450 MB Security Server 5 GB (agents not included) Email server: 1.5 GB
Price: 43.33 £ | Shipping*: 0.00 £ -
Trend Micro Worry-Free Business Security Services Advanced
Cloud-based, enterprise-grade protection for your business devices and email The broadest range of threat protection More and more small businesses are falling victim to cybercriminals. Their data theft tactics include spam, malware, phishing, and complex, targeted attacks designed to evade traditional antivirus protection. Simply Cloud-based security designed specifically to protect all your devices and email. Stop email threats in the cloud before they reach your network and protect your devices from spear phishing and advanced targeted attacks. A single, intuitive web console makes managing these powerful capabilities a breeze. Completely Get detection, response, and investigation capabilities in a single agent. Eliminating multiple vendors makes protecting your employees, computers and mobile devices from cyber threats simple and cost-effective. By combining machine learning with other state-of-the-art detection techniques, you get the most comprehensive protection against ransomware and advanced attacks. Trusted More than 500,000 companies worldwide rely on Trend Micro to keep their businesses safe. Thanks to our up-to-the-second threat intelligence network, we protect more than 250 million endpoints and fend off threats while you focus on your business. Advanced Protection A blend of cross-generational threat methods gives you the most comprehensive protection against advanced threats. Take advantage of: High-fidelity machine learning that uniquely analyzes files-not just before execution, but on the fly. More reliable detection of advanced malware, including fileless, cryptomining, ransomware and more Noise reduction techniques , such as Census and Safelist, that check at every level to reduce false positives Behavioral analysis against scripts, injection, ransomware, storage and browser attacks Complete protection for email and collaboration Leverage the efficiency of cloud services while maintaining security. Get advanced threat and data protection for Microsoft® Office 365® email, Microsoft® Teams®, OneDrive, Sharepoint, Gmail® and collaboration tools like Google Drive, Dropbox and Box. Protect your sensitive data Our integrated DLP, encryption management and device control capabilities cover the broadest range of devices, applications and file types to ensure: Maximum visibility and control Ensure confidentiality and compliance with GDPR, HIPPA, and other rapidly evolving regulations Granular policies for device control and data management Management and Visibility for Microsoft BitLocker Stop malicious software with application control Application monitoring, safelisting, and lockdown prevent malware and infections from entering your organization by Blocking unauthorized or unknown applications from executing attacks, such as ransomware Enforcing easy-to-manage, simple rules Allowing you to run only applications that you have authorized System requirements: Operating systems Clients Windows XP, Vista, Windows 7, Windows 8, Windows 8.1 x86/x64 Mac Clients: Mac OS X Snow LeopardTM, LeopardTM, TigerTM Windows Servers 2003, 2003 R2, 2008, 2008 R2, 2012, Small Business Server 2003, 2003 R2, 2008 & 2011, Storage Server 2003, 2003 R2, 2008 & 2012, 2012 R2 x64, Home Server 2011, Server 2008 2008 R2, Essential Business Server 2008, Server 2012 Essentials Mac Servers OS XTM Mountain Lion 10.8 or later, Mac OSTM X Lion 10.7 or later, Mac OS X Snow LeopardTM 10.6 or later, Mac OS X LeopardTM 10.5.7 or later, Mac OS X TigerTM 10.4.11 or later, Mac OS X Mavericks 10.9 Mobile Security (Advanced version only) iOS 3.0 to 6.1 (4.3 to 7.0), Android 2.2 to 4.2, Windows 7.0 to 8.0, BlackBerry 7.0 to 10.1 Email Server (Advanced Version only) Exchange Server 2003 SP2, 2007 SP1, 2010 SP 1, 2 and 3, 2013 Processor: Clients Intel Pentium x86 or compatible; x64: AMD64, Intel EM64T (clock speed varies by OS) Security Server: Conventional Scan Mode:IntelTM PentiumTM 4 or higher; Smart Scan Mode:Intel Core 2 DuoTM or higher recommended Mac PowerPCTM or IntelTM Core Security Server Conventional Scan Mode:IntelTM PentiumTM 4 or higher Smart Scan Mode: multiple processors or multi-core processor Email Server 1 GHz Intel Pentium x86 or compatible; 1 GHz x64 (AMD64, Intel EM64T) RAM: Clients 256 MB; 512 MB recommended Security Server Smart Scan Mode: 1 GB; 2 GB recommended Conventional mode (x86): 512 MB; 1 GB recommended x64 (Smart and conventional): 1 GB; 2 GB recommended Windows EBS 2008 or SBS 2008 (Smart and conventional): 4 GB; 8 GB recommended E-mail server 1 GB Disk space (8.5 GB total): Clients 450 MB Security Server 5 GB (agents not included) Email server: 1.5 GB
Price: 38.99 £ | Shipping*: 0.00 £ -
Trend Micro Worry-Free Business Security Services Advanced
Cloud-based, enterprise-grade protection for your business devices and email The broadest range of threat protection More and more small businesses are falling victim to cybercriminals. Their data theft tactics include spam, malware, phishing, and complex, targeted attacks designed to evade traditional antivirus protection. Simply Cloud-based security designed specifically to protect all your devices and email. Stop email threats in the cloud before they reach your network and protect your devices from spear phishing and advanced targeted attacks. A single, intuitive web console makes managing these powerful capabilities a breeze. Completely Get detection, response, and investigation capabilities in a single agent. Eliminating multiple vendors makes protecting your employees, computers and mobile devices from cyber threats simple and cost-effective. By combining machine learning with other state-of-the-art detection techniques, you get the most comprehensive protection against ransomware and advanced attacks. Trusted More than 500,000 companies worldwide rely on Trend Micro to keep their businesses safe. Thanks to our up-to-the-second threat intelligence network, we protect more than 250 million endpoints and fend off threats while you focus on your business. Advanced Protection A blend of cross-generational threat methods gives you the most comprehensive protection against advanced threats. Take advantage of: High-fidelity machine learning that uniquely analyzes files-not just before execution, but on the fly. More reliable detection of advanced malware, including fileless, cryptomining, ransomware and more Noise reduction techniques , such as Census and Safelist, that check at every level to reduce false positives Behavioral analysis against scripts, injection, ransomware, storage and browser attacks Complete protection for email and collaboration Leverage the efficiency of cloud services while maintaining security. Get advanced threat and data protection for Microsoft® Office 365® email, Microsoft® Teams®, OneDrive, Sharepoint, Gmail® and collaboration tools like Google Drive, Dropbox and Box. Protect your sensitive data Our integrated DLP, encryption management and device control capabilities cover the broadest range of devices, applications and file types to ensure: Maximum visibility and control Ensure confidentiality and compliance with GDPR, HIPPA, and other rapidly evolving regulations Granular policies for device control and data management Management and Visibility for Microsoft BitLocker Stop malicious software with application control Application monitoring, safelisting, and lockdown prevent malware and infections from entering your organization by Blocking unauthorized or unknown applications from executing attacks, such as ransomware Enforcing easy-to-manage, simple rules Allowing you to run only applications that you have authorized System requirements: Operating systems Clients Windows XP, Vista, Windows 7, Windows 8, Windows 8.1 x86/x64 Mac Clients: Mac OS X Snow LeopardTM, LeopardTM, TigerTM Windows Servers 2003, 2003 R2, 2008, 2008 R2, 2012, Small Business Server 2003, 2003 R2, 2008 & 2011, Storage Server 2003, 2003 R2, 2008 & 2012, 2012 R2 x64, Home Server 2011, Server 2008 2008 R2, Essential Business Server 2008, Server 2012 Essentials Mac Servers OS XTM Mountain Lion 10.8 or later, Mac OSTM X Lion 10.7 or later, Mac OS X Snow LeopardTM 10.6 or later, Mac OS X LeopardTM 10.5.7 or later, Mac OS X TigerTM 10.4.11 or later, Mac OS X Mavericks 10.9 Mobile Security (Advanced version only) iOS 3.0 to 6.1 (4.3 to 7.0), Android 2.2 to 4.2, Windows 7.0 to 8.0, BlackBerry 7.0 to 10.1 Email Server (Advanced Version only) Exchange Server 2003 SP2, 2007 SP1, 2010 SP 1, 2 and 3, 2013 Processor: Clients Intel Pentium x86 or compatible; x64: AMD64, Intel EM64T (clock speed varies by OS) Security Server: Conventional Scan Mode:IntelTM PentiumTM 4 or higher; Smart Scan Mode:Intel Core 2 DuoTM or higher recommended Mac PowerPCTM or IntelTM Core Security Server Conventional Scan Mode:IntelTM PentiumTM 4 or higher Smart Scan Mode: multiple processors or multi-core processor Email Server 1 GHz Intel Pentium x86 or compatible; 1 GHz x64 (AMD64, Intel EM64T) RAM: Clients 256 MB; 512 MB recommended Security Server Smart Scan Mode: 1 GB; 2 GB recommended Conventional mode (x86): 512 MB; 1 GB recommended x64 (Smart and conventional): 1 GB; 2 GB recommended Windows EBS 2008 or SBS 2008 (Smart and conventional): 4 GB; 8 GB recommended E-mail server 1 GB Disk space (8.5 GB total): Clients 450 MB Security Server 5 GB (agents not included) Email server: 1.5 GB
Price: 35.38 £ | Shipping*: 0.00 £ -
Trend Micro Worry-Free Business Security Services Advanced
Cloud-based, enterprise-grade protection for your business devices and email The broadest range of threat protection More and more small businesses are falling victim to cybercriminals. Their data theft tactics include spam, malware, phishing, and complex, targeted attacks designed to evade traditional antivirus protection. Simply Cloud-based security designed specifically to protect all your devices and email. Stop email threats in the cloud before they reach your network and protect your devices from spear phishing and advanced targeted attacks. A single, intuitive web console makes managing these powerful capabilities a breeze. Completely Get detection, response, and investigation capabilities in a single agent. Eliminating multiple vendors makes protecting your employees, computers and mobile devices from cyber threats simple and cost-effective. By combining machine learning with other state-of-the-art detection techniques, you get the most comprehensive protection against ransomware and advanced attacks. Trusted More than 500,000 companies worldwide rely on Trend Micro to keep their businesses safe. Thanks to our up-to-the-second threat intelligence network, we protect more than 250 million endpoints and fend off threats while you focus on your business. Advanced Protection A blend of cross-generational threat methods gives you the most comprehensive protection against advanced threats. Take advantage of: High-fidelity machine learning that uniquely analyzes files-not just before execution, but on the fly. More reliable detection of advanced malware, including fileless, cryptomining, ransomware and more Noise reduction techniques , such as Census and Safelist, that check at every level to reduce false positives Behavioral analysis against scripts, injection, ransomware, storage and browser attacks Complete protection for email and collaboration Leverage the efficiency of cloud services while maintaining security. Get advanced threat and data protection for Microsoft® Office 365® email, Microsoft® Teams®, OneDrive, Sharepoint, Gmail® and collaboration tools like Google Drive, Dropbox and Box. Protect your sensitive data Our integrated DLP, encryption management and device control capabilities cover the broadest range of devices, applications and file types to ensure: Maximum visibility and control Ensure confidentiality and compliance with GDPR, HIPPA, and other rapidly evolving regulations Granular policies for device control and data management Management and Visibility for Microsoft BitLocker Stop malicious software with application control Application monitoring, safelisting, and lockdown prevent malware and infections from entering your organization by Blocking unauthorized or unknown applications from executing attacks, such as ransomware Enforcing easy-to-manage, simple rules Allowing you to run only applications that you have authorized System requirements: Operating systems Clients Windows XP, Vista, Windows 7, Windows 8, Windows 8.1 x86/x64 Mac Clients: Mac OS X Snow LeopardTM, LeopardTM, TigerTM Windows Servers 2003, 2003 R2, 2008, 2008 R2, 2012, Small Business Server 2003, 2003 R2, 2008 & 2011, Storage Server 2003, 2003 R2, 2008 & 2012, 2012 R2 x64, Home Server 2011, Server 2008 2008 R2, Essential Business Server 2008, Server 2012 Essentials Mac Servers OS XTM Mountain Lion 10.8 or later, Mac OSTM X Lion 10.7 or later, Mac OS X Snow LeopardTM 10.6 or later, Mac OS X LeopardTM 10.5.7 or later, Mac OS X TigerTM 10.4.11 or later, Mac OS X Mavericks 10.9 Mobile Security (Advanced version only) iOS 3.0 to 6.1 (4.3 to 7.0), Android 2.2 to 4.2, Windows 7.0 to 8.0, BlackBerry 7.0 to 10.1 Email Server (Advanced Version only) Exchange Server 2003 SP2, 2007 SP1, 2010 SP 1, 2 and 3, 2013 Processor: Clients Intel Pentium x86 or compatible; x64: AMD64, Intel EM64T (clock speed varies by OS) Security Server: Conventional Scan Mode:IntelTM PentiumTM 4 or higher; Smart Scan Mode:Intel Core 2 DuoTM or higher recommended Mac PowerPCTM or IntelTM Core Security Server Conventional Scan Mode:IntelTM PentiumTM 4 or higher Smart Scan Mode: multiple processors or multi-core processor Email Server 1 GHz Intel Pentium x86 or compatible; 1 GHz x64 (AMD64, Intel EM64T) RAM: Clients 256 MB; 512 MB recommended Security Server Smart Scan Mode: 1 GB; 2 GB recommended Conventional mode (x86): 512 MB; 1 GB recommended x64 (Smart and conventional): 1 GB; 2 GB recommended Windows EBS 2008 or SBS 2008 (Smart and conventional): 4 GB; 8 GB recommended E-mail server 1 GB Disk space (8.5 GB total): Clients 450 MB Security Server 5 GB (agents not included) Email server: 1.5 GB
Price: 30.32 £ | Shipping*: 0.00 £ -
Trend Micro Worry-Free Business Security Services Advanced
Cloud-based, enterprise-grade protection for your business devices and email The broadest range of threat protection More and more small businesses are falling victim to cybercriminals. Their data theft tactics include spam, malware, phishing, and complex, targeted attacks designed to evade traditional antivirus protection. Simply Cloud-based security designed specifically to protect all your devices and email. Stop email threats in the cloud before they reach your network and protect your devices from spear phishing and advanced targeted attacks. A single, intuitive web console makes managing these powerful capabilities a breeze. Completely Get detection, response, and investigation capabilities in a single agent. Eliminating multiple vendors makes protecting your employees, computers and mobile devices from cyber threats simple and cost-effective. By combining machine learning with other state-of-the-art detection techniques, you get the most comprehensive protection against ransomware and advanced attacks. Trusted More than 500,000 companies worldwide rely on Trend Micro to keep their businesses safe. Thanks to our up-to-the-second threat intelligence network, we protect more than 250 million endpoints and fend off threats while you focus on your business. Advanced Protection A blend of cross-generational threat methods gives you the most comprehensive protection against advanced threats. Take advantage of: High-fidelity machine learning that uniquely analyzes files-not just before execution, but on the fly. More reliable detection of advanced malware, including fileless, cryptomining, ransomware and more Noise reduction techniques , such as Census and Safelist, that check at every level to reduce false positives Behavioral analysis against scripts, injection, ransomware, storage and browser attacks Complete protection for email and collaboration Leverage the efficiency of cloud services while maintaining security. Get advanced threat and data protection for Microsoft® Office 365® email, Microsoft® Teams®, OneDrive, Sharepoint, Gmail® and collaboration tools like Google Drive, Dropbox and Box. Protect your sensitive data Our integrated DLP, encryption management and device control capabilities cover the broadest range of devices, applications and file types to ensure: Maximum visibility and control Ensure confidentiality and compliance with GDPR, HIPPA, and other rapidly evolving regulations Granular policies for device control and data management Management and Visibility for Microsoft BitLocker Stop malicious software with application control Application monitoring, safelisting, and lockdown prevent malware and infections from entering your organization by Blocking unauthorized or unknown applications from executing attacks, such as ransomware Enforcing easy-to-manage, simple rules Allowing you to run only applications that you have authorized System requirements: Operating systems Clients Windows XP, Vista, Windows 7, Windows 8, Windows 8.1 x86/x64 Mac Clients: Mac OS X Snow LeopardTM, LeopardTM, TigerTM Windows Servers 2003, 2003 R2, 2008, 2008 R2, 2012, Small Business Server 2003, 2003 R2, 2008 & 2011, Storage Server 2003, 2003 R2, 2008 & 2012, 2012 R2 x64, Home Server 2011, Server 2008 2008 R2, Essential Business Server 2008, Server 2012 Essentials Mac Servers OS XTM Mountain Lion 10.8 or later, Mac OSTM X Lion 10.7 or later, Mac OS X Snow LeopardTM 10.6 or later, Mac OS X LeopardTM 10.5.7 or later, Mac OS X TigerTM 10.4.11 or later, Mac OS X Mavericks 10.9 Mobile Security (Advanced version only) iOS 3.0 to 6.1 (4.3 to 7.0), Android 2.2 to 4.2, Windows 7.0 to 8.0, BlackBerry 7.0 to 10.1 Email Server (Advanced Version only) Exchange Server 2003 SP2, 2007 SP1, 2010 SP 1, 2 and 3, 2013 Processor: Clients Intel Pentium x86 or compatible; x64: AMD64, Intel EM64T (clock speed varies by OS) Security Server: Conventional Scan Mode:IntelTM PentiumTM 4 or higher; Smart Scan Mode:Intel Core 2 DuoTM or higher recommended Mac PowerPCTM or IntelTM Core Security Server Conventional Scan Mode:IntelTM PentiumTM 4 or higher Smart Scan Mode: multiple processors or multi-core processor Email Server 1 GHz Intel Pentium x86 or compatible; 1 GHz x64 (AMD64, Intel EM64T) RAM: Clients 256 MB; 512 MB recommended Security Server Smart Scan Mode: 1 GB; 2 GB recommended Conventional mode (x86): 512 MB; 1 GB recommended x64 (Smart and conventional): 1 GB; 2 GB recommended Windows EBS 2008 or SBS 2008 (Smart and conventional): 4 GB; 8 GB recommended E-mail server 1 GB Disk space (8.5 GB total): Clients 450 MB Security Server 5 GB (agents not included) Email server: 1.5 GB
Price: 43.33 £ | Shipping*: 0.00 £ -
Trend Micro Worry-Free Business Security Services Advanced
Cloud-based, enterprise-grade protection for your business devices and email The broadest range of threat protection More and more small businesses are falling victim to cybercriminals. Their data theft tactics include spam, malware, phishing, and complex, targeted attacks designed to evade traditional antivirus protection. Simply Cloud-based security designed specifically to protect all your devices and email. Stop email threats in the cloud before they reach your network and protect your devices from spear phishing and advanced targeted attacks. A single, intuitive web console makes managing these powerful capabilities a breeze. Completely Get detection, response, and investigation capabilities in a single agent. Eliminating multiple vendors makes protecting your employees, computers and mobile devices from cyber threats simple and cost-effective. By combining machine learning with other state-of-the-art detection techniques, you get the most comprehensive protection against ransomware and advanced attacks. Trusted More than 500,000 companies worldwide rely on Trend Micro to keep their businesses safe. Thanks to our up-to-the-second threat intelligence network, we protect more than 250 million endpoints and fend off threats while you focus on your business. Advanced Protection A blend of cross-generational threat methods gives you the most comprehensive protection against advanced threats. Take advantage of: High-fidelity machine learning that uniquely analyzes files-not just before execution, but on the fly. More reliable detection of advanced malware, including fileless, cryptomining, ransomware and more Noise reduction techniques , such as Census and Safelist, that check at every level to reduce false positives Behavioral analysis against scripts, injection, ransomware, storage and browser attacks Complete protection for email and collaboration Leverage the efficiency of cloud services while maintaining security. Get advanced threat and data protection for Microsoft® Office 365® email, Microsoft® Teams®, OneDrive, Sharepoint, Gmail® and collaboration tools like Google Drive, Dropbox and Box. Protect your sensitive data Our integrated DLP, encryption management and device control capabilities cover the broadest range of devices, applications and file types to ensure: Maximum visibility and control Ensure confidentiality and compliance with GDPR, HIPPA, and other rapidly evolving regulations Granular policies for device control and data management Management and Visibility for Microsoft BitLocker Stop malicious software with application control Application monitoring, safelisting, and lockdown prevent malware and infections from entering your organization by Blocking unauthorized or unknown applications from executing attacks, such as ransomware Enforcing easy-to-manage, simple rules Allowing you to run only applications that you have authorized System requirements: Operating systems Clients Windows XP, Vista, Windows 7, Windows 8, Windows 8.1 x86/x64 Mac Clients: Mac OS X Snow LeopardTM, LeopardTM, TigerTM Windows Servers 2003, 2003 R2, 2008, 2008 R2, 2012, Small Business Server 2003, 2003 R2, 2008 & 2011, Storage Server 2003, 2003 R2, 2008 & 2012, 2012 R2 x64, Home Server 2011, Server 2008 2008 R2, Essential Business Server 2008, Server 2012 Essentials Mac Servers OS XTM Mountain Lion 10.8 or later, Mac OSTM X Lion 10.7 or later, Mac OS X Snow LeopardTM 10.6 or later, Mac OS X LeopardTM 10.5.7 or later, Mac OS X TigerTM 10.4.11 or later, Mac OS X Mavericks 10.9 Mobile Security (Advanced version only) iOS 3.0 to 6.1 (4.3 to 7.0), Android 2.2 to 4.2, Windows 7.0 to 8.0, BlackBerry 7.0 to 10.1 Email Server (Advanced Version only) Exchange Server 2003 SP2, 2007 SP1, 2010 SP 1, 2 and 3, 2013 Processor: Clients Intel Pentium x86 or compatible; x64: AMD64, Intel EM64T (clock speed varies by OS) Security Server: Conventional Scan Mode:IntelTM PentiumTM 4 or higher; Smart Scan Mode:Intel Core 2 DuoTM or higher recommended Mac PowerPCTM or IntelTM Core Security Server Conventional Scan Mode:IntelTM PentiumTM 4 or higher Smart Scan Mode: multiple processors or multi-core processor Email Server 1 GHz Intel Pentium x86 or compatible; 1 GHz x64 (AMD64, Intel EM64T) RAM: Clients 256 MB; 512 MB recommended Security Server Smart Scan Mode: 1 GB; 2 GB recommended Conventional mode (x86): 512 MB; 1 GB recommended x64 (Smart and conventional): 1 GB; 2 GB recommended Windows EBS 2008 or SBS 2008 (Smart and conventional): 4 GB; 8 GB recommended E-mail server 1 GB Disk space (8.5 GB total): Clients 450 MB Security Server 5 GB (agents not included) Email server: 1.5 GB
Price: 38.63 £ | Shipping*: 0.00 £ -
Trend Micro Worry-Free Business Security Services Advanced
Cloud-based, enterprise-grade protection for your business devices and email The broadest range of threat protection More and more small businesses are falling victim to cybercriminals. Their data theft tactics include spam, malware, phishing, and complex, targeted attacks designed to evade traditional antivirus protection. Simply Cloud-based security designed specifically to protect all your devices and email. Stop email threats in the cloud before they reach your network and protect your devices from spear phishing and advanced targeted attacks. A single, intuitive web console makes managing these powerful capabilities a breeze. Completely Get detection, response, and investigation capabilities in a single agent. Eliminating multiple vendors makes protecting your employees, computers and mobile devices from cyber threats simple and cost-effective. By combining machine learning with other state-of-the-art detection techniques, you get the most comprehensive protection against ransomware and advanced attacks. Trusted More than 500,000 companies worldwide rely on Trend Micro to keep their businesses safe. Thanks to our up-to-the-second threat intelligence network, we protect more than 250 million endpoints and fend off threats while you focus on your business. Advanced Protection A blend of cross-generational threat methods gives you the most comprehensive protection against advanced threats. Take advantage of: High-fidelity machine learning that uniquely analyzes files-not just before execution, but on the fly. More reliable detection of advanced malware, including fileless, cryptomining, ransomware and more Noise reduction techniques , such as Census and Safelist, that check at every level to reduce false positives Behavioral analysis against scripts, injection, ransomware, storage and browser attacks Complete protection for email and collaboration Leverage the efficiency of cloud services while maintaining security. Get advanced threat and data protection for Microsoft® Office 365® email, Microsoft® Teams®, OneDrive, Sharepoint, Gmail® and collaboration tools like Google Drive, Dropbox and Box. Protect your sensitive data Our integrated DLP, encryption management and device control capabilities cover the broadest range of devices, applications and file types to ensure: Maximum visibility and control Ensure confidentiality and compliance with GDPR, HIPPA, and other rapidly evolving regulations Granular policies for device control and data management Management and Visibility for Microsoft BitLocker Stop malicious software with application control Application monitoring, safelisting, and lockdown prevent malware and infections from entering your organization by Blocking unauthorized or unknown applications from executing attacks, such as ransomware Enforcing easy-to-manage, simple rules Allowing you to run only applications that you have authorized System requirements: Operating systems Clients Windows XP, Vista, Windows 7, Windows 8, Windows 8.1 x86/x64 Mac Clients: Mac OS X Snow LeopardTM, LeopardTM, TigerTM Windows Servers 2003, 2003 R2, 2008, 2008 R2, 2012, Small Business Server 2003, 2003 R2, 2008 & 2011, Storage Server 2003, 2003 R2, 2008 & 2012, 2012 R2 x64, Home Server 2011, Server 2008 2008 R2, Essential Business Server 2008, Server 2012 Essentials Mac Servers OS XTM Mountain Lion 10.8 or later, Mac OSTM X Lion 10.7 or later, Mac OS X Snow LeopardTM 10.6 or later, Mac OS X LeopardTM 10.5.7 or later, Mac OS X TigerTM 10.4.11 or later, Mac OS X Mavericks 10.9 Mobile Security (Advanced version only) iOS 3.0 to 6.1 (4.3 to 7.0), Android 2.2 to 4.2, Windows 7.0 to 8.0, BlackBerry 7.0 to 10.1 Email Server (Advanced Version only) Exchange Server 2003 SP2, 2007 SP1, 2010 SP 1, 2 and 3, 2013 Processor: Clients Intel Pentium x86 or compatible; x64: AMD64, Intel EM64T (clock speed varies by OS) Security Server: Conventional Scan Mode:IntelTM PentiumTM 4 or higher; Smart Scan Mode:Intel Core 2 DuoTM or higher recommended Mac PowerPCTM or IntelTM Core Security Server Conventional Scan Mode:IntelTM PentiumTM 4 or higher Smart Scan Mode: multiple processors or multi-core processor Email Server 1 GHz Intel Pentium x86 or compatible; 1 GHz x64 (AMD64, Intel EM64T) RAM: Clients 256 MB; 512 MB recommended Security Server Smart Scan Mode: 1 GB; 2 GB recommended Conventional mode (x86): 512 MB; 1 GB recommended x64 (Smart and conventional): 1 GB; 2 GB recommended Windows EBS 2008 or SBS 2008 (Smart and conventional): 4 GB; 8 GB recommended E-mail server 1 GB Disk space (8.5 GB total): Clients 450 MB Security Server 5 GB (agents not included) Email server: 1.5 GB
Price: 35.01 £ | Shipping*: 0.00 £ -
Trend Micro Worry-Free Business Security Services Advanced
Cloud-based, enterprise-grade protection for your business devices and email The broadest range of threat protection More and more small businesses are falling victim to cybercriminals. Their data theft tactics include spam, malware, phishing, and complex, targeted attacks designed to evade traditional antivirus protection. Simply Cloud-based security designed specifically to protect all your devices and email. Stop email threats in the cloud before they reach your network and protect your devices from spear phishing and advanced targeted attacks. A single, intuitive web console makes managing these powerful capabilities a breeze. Completely Get detection, response, and investigation capabilities in a single agent. Eliminating multiple vendors makes protecting your employees, computers and mobile devices from cyber threats simple and cost-effective. By combining machine learning with other state-of-the-art detection techniques, you get the most comprehensive protection against ransomware and advanced attacks. Trusted More than 500,000 companies worldwide rely on Trend Micro to keep their businesses safe. Thanks to our up-to-the-second threat intelligence network, we protect more than 250 million endpoints and fend off threats while you focus on your business. Advanced Protection A blend of cross-generational threat methods gives you the most comprehensive protection against advanced threats. Take advantage of: High-fidelity machine learning that uniquely analyzes files-not just before execution, but on the fly. More reliable detection of advanced malware, including fileless, cryptomining, ransomware and more Noise reduction techniques , such as Census and Safelist, that check at every level to reduce false positives Behavioral analysis against scripts, injection, ransomware, storage and browser attacks Complete protection for email and collaboration Leverage the efficiency of cloud services while maintaining security. Get advanced threat and data protection for Microsoft® Office 365® email, Microsoft® Teams®, OneDrive, Sharepoint, Gmail® and collaboration tools like Google Drive, Dropbox and Box. Protect your sensitive data Our integrated DLP, encryption management and device control capabilities cover the broadest range of devices, applications and file types to ensure: Maximum visibility and control Ensure confidentiality and compliance with GDPR, HIPPA, and other rapidly evolving regulations Granular policies for device control and data management Management and Visibility for Microsoft BitLocker Stop malicious software with application control Application monitoring, safelisting, and lockdown prevent malware and infections from entering your organization by Blocking unauthorized or unknown applications from executing attacks, such as ransomware Enforcing easy-to-manage, simple rules Allowing you to run only applications that you have authorized System requirements: Operating systems Clients Windows XP, Vista, Windows 7, Windows 8, Windows 8.1 x86/x64 Mac Clients: Mac OS X Snow LeopardTM, LeopardTM, TigerTM Windows Servers 2003, 2003 R2, 2008, 2008 R2, 2012, Small Business Server 2003, 2003 R2, 2008 & 2011, Storage Server 2003, 2003 R2, 2008 & 2012, 2012 R2 x64, Home Server 2011, Server 2008 2008 R2, Essential Business Server 2008, Server 2012 Essentials Mac Servers OS XTM Mountain Lion 10.8 or later, Mac OSTM X Lion 10.7 or later, Mac OS X Snow LeopardTM 10.6 or later, Mac OS X LeopardTM 10.5.7 or later, Mac OS X TigerTM 10.4.11 or later, Mac OS X Mavericks 10.9 Mobile Security (Advanced version only) iOS 3.0 to 6.1 (4.3 to 7.0), Android 2.2 to 4.2, Windows 7.0 to 8.0, BlackBerry 7.0 to 10.1 Email Server (Advanced Version only) Exchange Server 2003 SP2, 2007 SP1, 2010 SP 1, 2 and 3, 2013 Processor: Clients Intel Pentium x86 or compatible; x64: AMD64, Intel EM64T (clock speed varies by OS) Security Server: Conventional Scan Mode:IntelTM PentiumTM 4 or higher; Smart Scan Mode:Intel Core 2 DuoTM or higher recommended Mac PowerPCTM or IntelTM Core Security Server Conventional Scan Mode:IntelTM PentiumTM 4 or higher Smart Scan Mode: multiple processors or multi-core processor Email Server 1 GHz Intel Pentium x86 or compatible; 1 GHz x64 (AMD64, Intel EM64T) RAM: Clients 256 MB; 512 MB recommended Security Server Smart Scan Mode: 1 GB; 2 GB recommended Conventional mode (x86): 512 MB; 1 GB recommended x64 (Smart and conventional): 1 GB; 2 GB recommended Windows EBS 2008 or SBS 2008 (Smart and conventional): 4 GB; 8 GB recommended E-mail server 1 GB Disk space (8.5 GB total): Clients 450 MB Security Server 5 GB (agents not included) Email server: 1.5 GB
Price: 29.96 £ | Shipping*: 0.00 £ -
Health Herb Tea - 120 g
Harmonious, tasty, for any occasion and any time of day. Ingredients: Blackberry leaves, lemon balm leaves, Lungwort, birch leaves, horsetail herb, herb St. John's wort with flowers, bean pods, anise, Iceland moss, mint leaves, poppy flowers, smartweed herb, dill fruits, marigold flowers, juniper berries, rosemary leaves, mountain everlasting, fennel, rosehip fruit (rosehip peel, rose hip seed), hollow tooth herb.
Price: 6.17 £ | Shipping*: 14.50 £ -
Cobalance Health Herb Tea - 500 g
A balanced mixture of 10 herbs (bean peels, lady's mantle herb, couch grass root, chicory root, bedstraw, rose hip, silver linden flowers, willowherb, yarrow herb and raspberry leaves) for the preparation of a delicious herb-aromatic tea. Cobalance Health Herb Tea is soothing and yet effective in the regulation of the cholesterol metabolism and digestion.
Price: 18.50 £ | Shipping*: 14.50 £ -
Aromafume Inner-peace - Wellness Kit
Merchant: Aromafume.uk, Brand: Aromafume, Price: 26.00 £, Currency: £, Availability: in_stock, Shipping costs: 0.0 £, Time to deliver: 3-5 business days, Category: Decoration, Title: Aromafume Inner-peace - Wellness Kit
Price: 26.00 £ | Shipping*: 0.00 £
Similar search terms for Obligation:
-
Is this an obligation?
Without more context, it is difficult to determine if something is an obligation. An obligation typically refers to a duty or responsibility that one is required to fulfill. It could be a legal or moral requirement. If you provide more details about the specific situation or context, I would be happy to help determine if it is an obligation.
-
Is it an obligation to be educated or an obligation to attend school?
It is generally considered an obligation to be educated, as education is essential for personal development, critical thinking, and contributing to society. However, attending school is one of the most common ways to receive an education, and in many places, it is legally required for children to attend school up to a certain age. While attending school is a common way to fulfill the obligation to be educated, there are alternative paths to education such as homeschooling or online learning. Ultimately, the obligation is to be educated, and attending school is one way to fulfill that obligation.
-
What is the calibration obligation?
The calibration obligation refers to the requirement for companies to regularly adjust and fine-tune their measuring instruments or devices to ensure accuracy and reliability in their measurements. This process involves comparing the readings of a device to a known standard and making necessary adjustments to correct any discrepancies. By fulfilling this obligation, companies can maintain the quality and consistency of their products or services, as well as comply with industry regulations and standards.
-
What does maintenance obligation mean?
Maintenance obligation refers to the legal responsibility of an individual to provide financial support to their spouse or children. This support is typically provided to ensure the basic needs of the recipient are met, such as food, shelter, and clothing. Maintenance obligations are often determined by a court based on factors such as the income and needs of the parties involved.
-
What is the difference between an obligation to deliver and an obligation to pick up?
An obligation to deliver refers to the responsibility of a party to transfer or hand over a specific item, product, or service to another party as per the terms of an agreement or contract. On the other hand, an obligation to pick up refers to the responsibility of a party to collect or retrieve a specific item, product, or service from another party as per the terms of an agreement or contract. In essence, the difference lies in the direction of the transfer - with the obligation to deliver, the transfer is from the party with the obligation to the other party, while with the obligation to pick up, the transfer is from the other party to the party with the obligation.
-
What is the financial obligation when inviting someone to Germany with a formal obligation letter?
When inviting someone to Germany with a formal obligation letter, the financial obligation is to provide financial support for the invited person during their stay in Germany. This includes covering their living expenses, accommodation, and any potential medical costs. The person issuing the formal obligation letter is legally responsible for ensuring that the invited person has the necessary financial means to cover their stay in Germany. It is important to carefully consider the financial commitment before issuing a formal obligation letter.
-
What exactly is a reporting obligation?
A reporting obligation is a requirement for individuals or organizations to provide specific information or data to a regulatory authority or governing body. This information is typically related to financial transactions, activities, or other relevant matters that need to be disclosed for transparency, compliance, or regulatory purposes. Failure to meet reporting obligations can result in penalties, fines, or other consequences. It is important for entities to understand and fulfill their reporting obligations to maintain compliance with laws and regulations.
-
Is organ donation a moral obligation?
Organ donation is not necessarily a moral obligation, as individuals have the right to make decisions about their own bodies. However, many people believe that organ donation is a moral act of kindness and generosity that can save lives. It is a personal choice that can have a significant impact on others in need of organ transplants. Ultimately, the decision to become an organ donor is a personal one that should be based on individual beliefs and values.
-
What is the obligation to register?
The obligation to register refers to the requirement for individuals or entities to officially sign up or enroll for a particular service, program, or activity. This registration process is usually mandatory and ensures that the person or organization is accounted for and has agreed to abide by certain rules or regulations. Failure to register when required can result in penalties or consequences, depending on the specific situation. Overall, registration helps maintain order, track participation, and ensure compliance with relevant laws or guidelines.
-
Is the master obligation really necessary?
The necessity of the master obligation depends on the specific context and circumstances. In some cases, having a master obligation can provide clarity and structure to a complex agreement, ensuring that all parties understand their responsibilities and obligations. It can also serve as a reference point for resolving disputes and enforcing the terms of the agreement. However, in other situations, the master obligation may not be necessary if the terms of the agreement are straightforward and easily understood by all parties involved. Ultimately, the decision to include a master obligation should be based on the specific needs and requirements of the agreement in question.
-
What does gender obligation 2 mean?
Gender obligation 2 refers to the societal expectations and responsibilities placed on individuals based on their gender. This can include traditional roles and duties that are often assigned to individuals based on their gender, such as caregiving, household chores, or career expectations. Gender obligation 2 can also encompass the pressure to conform to certain gender norms and behaviors, and the consequences of not meeting these expectations. Overall, gender obligation 2 highlights the ways in which gender roles and expectations can impact individuals' lives and choices.
-
What training obligation is being challenged?
The training obligation being challenged is the requirement for employers to provide sexual harassment prevention training to their employees. This obligation is being challenged by individuals or organizations who may argue that the training is unnecessary, ineffective, or burdensome. They may also challenge the specific content or format of the training, claiming that it does not adequately address the issue of sexual harassment in the workplace.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.