Microsoft Surface Laptop 5
Get multitasking speed with 12th Gen Intel® Core™ processors built on
the Intel® Evo™ platform, long-lasting battery, and your choice of size and
colour in a sleek and beautiful touchscreen laptop design.
A sleek, beautiful,
timeless design
Between working from home and going out to auditions, Maya has a lot to
balance. But with Surface Laptop 5, she’s able to do it all in style.
Whether they’re working at the plant shop or creating sustainable
designs for friends, Luca and Reed need a laptop that can power their always-on
lifestyle.
Autodesk Revit: BIM software to design and make anything Design buildings and infrastructure in 3D. Build greener projects. Transform the world.
Autodesk® Revit® allows architectects, engineers and construction professionals to:
Model shapes, structures and systems in 3D with parametric accuracy, precision and ease.
Streamline project management with instant revisions to plans, elevations, schedules, sections and sheets.
Unite multidisciplinary project teams for higher efficiency, collaboration and impact in the office or on the construction site.
With tools for sketching, scheduling, sharing, annotating and visualising, Revit helps architects, engineers and contractors collaborate more effectively.
Autodesk supports the way AEC project teams work, in the office or on the go. Revit cloud worksharing and BIM Collaborate Pro support collaboration and a common data environment.
With integrated analysis tools and the ability to unite multiple datasets and file types, architects and engineers use Autodesk Revit to design with confidence.
3-Year Renewal License.
Kaspersky Endpoint Security for Business Select - protection and control you can trust – for every endpoint
With more of your business operations going digital, you need to protect every server, laptop and mobile device on your network. Select tier combines multi-layered technologies with flexible cloud management and centralized application, web and device controls to protect your sensitive data on every endpoint.
Kaspersky Endpoint Security for Business Select – Key Features:
Performance & multi-layered protection
Security shouldn’t slow you down, so our security has minimal impact on system performance. And if you’re attacked, the Remediation Engine undoes most malicious actions, so users can keep working without interruption.
Agile protection technologies
Delivering world-class security – including post execution Behavior Detection and Machine Learning technologies – to help reduce your attack risk and keep all your endpoints safe and secure, with less need to download frequent updates.
‘Best of both worlds’ management console
In the cloud, on-premises or both? You decide - and we’ll provide unified management via the cloud console or traditional console deployment on-premise, in AWS or Azure cloud environments. Deploy security and policies quickly and easily, using any of our preconfigured scenarios.
Straightforward migration
Provides straightforward migration from third-party endpoint protection, helping to make your transition error-free. Our post-deployment quality assurance audit service will ensure optimum configuration.
Sophos Intercept X for Server is the industry leading Server Security solution that reduces the attack surface and prevents attacks from running. Combining anti-exploit, anti-ransomware, deep learning AI and control technology it stops attacks before they impact your systems. Intercept X for Server uses a comprehensive, defense in depth approach to server protection, rather than relying on one primary security technique.
Deep learning AI in Intercept X for Server excels at detecting and blocking malware even when it hasn’t been seen before. It does this by scrutinizing file attributes from hundreds of millions of samples to identify threats without the need for a signature.
Intercept X for Server includes advanced anti-ransomware capabilities that detect and block the malicious encryption processes used in ransomware attacks. Files that have been encrypted will be rolled back to a safe state, minimizing any impact to business productivity.
Anti-exploit technology stops the exploit techniques that attackers rely on to compromise devices, steal credentials and distribute malware. By stopping the techniques used throughout the attack chain Intercept X for Server keeps your organization secure against file-less attacks and zero-day exploits.
Ensure only what you want can run. Server Lockdown (whitelisting) makes sure that only applications you have approved can run on a server. File Integrity Monitoring will notify you if there are unauthorized attempts to change critical files.
Understand and secure your entire multi-cloud inventory. You can detect your cloud workloads as well as critical cloud services including S3 buckets, databases and serverless functions, identify suspicious activity, spot insecure deployments and close security gaps.
Project Plan 1 is a comprehensive solution for all your project management needs. It is designed to provide a highly efficient and streamlined approach to project planning, execution and tracking. This product is optimal for businesses of all sizes, providing a clear, easy-to-use platform for managing all aspects of your projects.
This plan comes with an array of features that are aimed at enhancing productivity while ensuring effective project management. Key features include:
Project Plan 1 is not just a project management tool, but a complete ecosystem to manage, track, and collaborate on your projects. Its designed to help you stay organized, meet deadlines, and ensure nothing slips through the cracks. With Project Plan 1, you can take your project management to the next level.
Seqrite Endpoint Cloud Advanced, coupled with a 1-year subscription, delivers an elevated standard of cybersecurity for your business, providing advanced threat protection and comprehensive endpoint security. Elevate your defense strategy with this cutting-edge solution that combines real-time threat intelligence, cloud-based security, and centralized management for a robust and proactive approach to safeguarding your digital assets.
Microsoft HoloLens 2 smart glasses is the most agreeable blended VR Headset accessible, with industry-driving arrangements that convey a vivid encounter—all upgraded by the unwavering quality, security, and adaptability of the cloud and AI administrations from Microsoft. The move began immediately with off-the-rack applications or construct a custom arrangement utilizing Microsoft Azure administrations.
HoloLens 2 offers the most comfortable and immersive mixed reality experience available, with industry-leading solutions that deliver value in minutes—all enhanced by the reliability, security, and scalability of cloud and AI services from Microsoft.
See more holograms at once through the greatly increased field of view. Read text and see intricate details on 3D images more easily and comfortably with industry-leading resolution.
Wear HoloLens 2 longer and more comfortably with a dial-in fit system designed for extended use. And keep your glasses on—the headset slides right over them. When it’s time to switch tasks, flip the visor up to step out of mixed reality.
Touch, grasp, and move holograms in ways that feel natural—they respond a lot like real objects. Log in to HoloLens 2 instantly and securely using just your eyes with Windows Hello. And voice commands work even in noisy industrial environments through smart microphones and natural language speech processing.
Move freely, with no wires or external packs to get in your way. The HoloLens 2 headset is a self-contained computer with Wi-Fi connectivity, which means that everything you need goes with you while you work.
General | |
---|---|
Product Type | Smart glasses |
Audio Output | Surround speakers |
Sensors | Accelerometer, magnetometer, gyro sensor, 4 visible light cameras, 2 IR cameras, 1-MP time-of-flight (ToF) depth sensor, 5 channels microphone |
Features | 6DoF tracking, Spatial Mapping, Mixed Reality Capture, dial-in fit system |
Storage | |
---|---|
Capacity | 64 GB |
Holographic Display | |
---|---|
Resolution | 2k 3:2 light engines |
Density | >2.5k radiants (light points per radian) |
Display | |
---|---|
Type | 3D color |
Camera | |
---|---|
Sensor Resolution | 8 Megapixel |
Videos | 1920 x 1080 (1080p) 30fps |
Connectivity | |
---|---|
Wireless Interface | IEEE 802.11ac, Bluetooth 5.0 |
Connectors | USB-C |
Input Device | |
---|---|
Human Understanding Interface | Voice input, hand tracking (two-handed fully articulated model, direct manipulation), eye tracking, Windows Hello |
CPU | |
---|---|
Manufacturer | Qualcomm |
Type | Snapdragon 850 |
Features | Custom built Microsoft Holographic processing unit (HPU 2 gen) |
RAM | |
---|---|
Size | 4 GB |
Battery | |
---|---|
Technology | Lithium |
Run Time (Up To) | 3 hours |
Dimensions & Weight | |
---|---|
Weight | 19.96 oz |
Miscellaneous | |
---|---|
SAR Value | 0.17 W/kg (head) |
Included Accessories | Power adapter, carrying case, microfiber cleaning cloth, overhead strap, USB-C cable |
Country of Origin | |
---|---|
Country of Origin | CN |
Microsoft
Surface Laptop Go 3
Essential
power, exceptional portability, an all-day battery life,2 and
a 12.4” touchscreen. All at under 1.13 kg, it’s the perfect everyday laptop.
Go anywhere in style
Wherever you’re
headed, go in style. At just under 1.13 kg, Surface Laptop Go 3 is a
lightweight laptop that’s built to last, so you can effortlessly bring it
anywhere.
1. Battery life
varies significantly based on device configuration, usage, network and feature
configuration, signal strength, settings and other factors. See
aka.ms/SurfaceBatteryPerformance for details.
2. Comparison of
viewable content on Surface devices with 3:2 aspect ratio v. laptops with 16:10
or 16:9.
3. Colors
available on selected models only. Available colors, sizes, finishes, and
processors may vary by store, market, and configuration.
4. System
software uses significant storage space. Available storage is subject to change
based on system software updates and apps usage. 1 GB = 1 billion bytes. 1 TB =
1,000 GB. See Surface.com/Storage for more details.
5. Sold
separately. Software license required for some features.
Seqrite Endpoint Security for Business software or Seqrite EPS is designed to keep your network and devices safe from cyber threats. Whether you run a big or small business, Seqrite has everything you need to protect your data and network. The software allows businesses of all sizes to have the essential tools for comprehensive data protection and network security.
Furthermore, the endpoint security software offers a wide range of features, including advanced endpoint protection, vulnerability scanning, asset management, IDS/IPS protection, and internet security.
Additionally, it excels in vulnerability scanning and patch management to help businesses identify and rectify application vulnerabilities and strengthen their security posture. With the increasing threat of ransomware, it is even more critical now to ensure complete network protection with Seqrite EPS. It addresses and prevents the most sophisticated cyber threats from entering your network and compromising data security.
Seqrite Endpoint Security for Business offers comprehensive and advanced features to safeguard your enterprise. With its multi-layered protection approach, including antivirus, anti-ransomware, firewall, and advanced device control, Seqrite EPS ensures comprehensive security. Its centralized administration, SIEM integration, and vulnerability scanning further ensure that you have complete visibility and control over your network.
Seqrite's indigenous scan engine and patented detection technologies keep you updated about potential threats, while the Endpoint Detection and Response (EDR) capabilities detect and report vulnerabilities. With seamless integration and user-friendly features, Seqrite Endpoint Security is the trusted choice for businesses seeking complete data protection.
Seqrite Endpoint Security for Business price in India starts at Rs. 3051 at technologysurface.com Seqrite EPS comes with multiple pricing plans and caters to a diverse customer base.
The price may vary based on factors like customization, additional features required, the number of users, and the deployment type. For subscription-related details and offers on premium packages, please request a call back from our product experts.
Project Plan 3 is a comprehensive and top-tier project management solution designed to streamline and simplify the process of project planning, tracking, and execution. It is powered by Microsoft, one of the leading tech companies globally, providing a seamless, efficient, and user-friendly interface. This robust platform is designed to cater to the needs of businesses of all sizes, offering extensive features that aid in project management, resource management, and team collaboration.
software comes loaded with a multitude of features that make it stand out from other project management tools in the market. It includes:
Project Plan 3 is the ideal project management tool that ensures your project planning and execution processes are efficient, organized, and effective. With its extensive features and user-friendly interface, it saves time, reduces workload, and enhances team collaboration. It is a valuable asset for any business aiming to streamline its project management processes and boost productivity.
Microsoft Surface Thunderbolt 4 Dock - Compatible with all Surface models including Surface Pro 7, 7+, 8 & 9, Surface Laptop 3, 4 & 5, Surface Book 3 and Surface Go 2 & Surface Go 3.
Beware of other online retailers that may sell international models imported from China where you risk the warranty not being recognised by Microsoft Australia.
Get the fast, flexible connectivity you need for work and play, with performance you can count on. Slide 1 of 3. USB4®/Thunderbolt™ 4 high-speed ports
Visio Online Plan 2 is a dynamic, cloud-based application designed for individuals and teams who need to create and share professional, versatile diagrams that simplify complex information. It is an innovative product from Microsoft that allows users to work visually from anywhere, at any time. This product is ideal for creating flowcharts, network diagrams, org charts, floor plans, engineering designs, and so much more. Whether youre an individual looking to organize personal projects or a team needing to map out business strategies, Visio Online Plan 2 is your comprehensive solution.
product boasts a wealth of features designed to enhance collaboration and productivity. These include:
With Visio Online Plan 2, collaboration is made easy. Users can work together on diagrams from a web browser, making teamwork seamless whether members are sitting next to each other or across the world. The product also allows users to share their work with anyone in their organization, even those who dont have Visio installed. With the added benefit of advanced security and compliance features, users can confidently create, share, and manage their diagrams and data visualizations.
Microsoft Surface Pro Signature Keyboard -Black
Enjoy a
smooth and elegant typing experience while using your Surface Pro 8 or Surface
Pro X with the Microsoft Surface Pro Signature Keyboard. Made with
luxurious Alcantara material, this stylish platinum mechanical keyboard cover
attaches magnetically to your Surface Pro device to provide a smooth typing
experience in almost any situation, whether you're working from your lap or at
a desk. It also helps to optimize your workflow with a large glass touchpad
along with Windows shortcut, media control, right click, and brightness
adjustment buttons. Additionally, its convenient tray securely stores and
recharges your Surface Slim Pen 2, keeping it ready and close by when you need
it. Once you're done, simply close the cover to protect your screen while
traveling.
ESET PROTECT ENTRY On-Prem features
A. ESET ENDPOINT SECURITY
Antivirus and Antispyware
Eliminates all types of threats, including viruses, rootkits, worms and spyware
Optional cloud-powered scanning:
Whitelisting of safe files based on file reputation database in the cloud for better detection and faster scanning. Only information about executable and archive files is sent to the cloud – such data are not personally attributable.
Virtualization Support
ESET Shared Local Cache stores metadata about already scanned files within the virtual environment so identical files are not scanned again, resulting in boosted scan speed.
ESET module updates and virus signatures database are stored outside of the default location, so these don’t have to be downloaded every time a virtual machine is reverted to default snapshot.
Host-Based Intrusion Prevention System (HIPS)
Enables you to define rules for system registry, processes, applications and files. Provides anti-tamper protection and detects threats based on system behavior.
Exploit Blocker
Strengthens security of applications such as web browsers, PDF readers, email clients or MS office components, which are commonly exploited.
Monitors process behaviors and looks for suspicious activities typical of exploits.
Strengthens protection against targeted attacks and previously unknown exploits, i.e. zero-day attacks that could be used by crypto-ransomware to enter the targeted system.
Advanced Memory Scanner
Monitors the behavior of malicious processes and scans them once they decloak in the memory. This allows for effective infection prevention, even from heavily obfuscated malware,
often detecting crypto-ransomware prior to it encrypting valuable files.
Client Antispam
Effectively filters out spam and scans all incoming emails for malware. Native support for Microsoft Outlook (POP3, IMAP, MAPI).
Cross-Platform Protection
ESET security solutions for Windows are capable of detecting Mac OS threats and vice-versa, delivering better protection in multi-platform environments.
Web Control
Limits website access by category, e.g. gaming, social networking, shopping and others. Enables you to create rules for user groups to comply with your company policies.
Soft blocking – notifies the end user that the website is blocked giving him an option to access the website, with activity logged.
Anti-Phishing
Protects end users from attempts by fake websites to acquire sensitive information such as usernames, passwords or banking and credit card details.
Two-Way Firewall
Prevents unauthorized access to your company network. Provides anti-hacker protection and data exposure prevention. Lets you define trusted networks, making all other connections, such as to
public Wi-Fi, in ‘strict’ mode by default. Troubleshooting wizard guides you through a set of questions, identifying problematic rules, or allowing you to create new ones.
Vulnerability Shield
Improves detection of Common Vulnerabilities and Exposures (CVEs) on widely used protocols such as SMB, RPC and RDP.
Protects against vulnerabilities for which a patch has not yet been released or deployed.
Botnet Protection
Protects against infiltration by botnet malware – preventing spam and network attacks launched from the endpoint.
Device Control
Blocks unauthorized devices (CDs/DVDs and USBs) from your system. Enables you to create rules for
user groups to comply with your company policies. Soft blocking – notifies the end user that his device is blocked and gives him the option to access the device, with activity logged.
Idle-State Scanner
Aids system performance by performing a full scan proactively when the computer is not in use. Helps speed up subsequent scans by populating the local cache.
First Scan after Installation
Provides the option to automatically run low priority on-demand scan 20 minutes after installation, assuring protection from the outset.
Update Rollback
Lets you revert to a previous version of protection modules and virus signature database.
Allows you to freeze updates as desired - opt for temporary rollback or delay until manually changed.
Postponed Updates
Provides the option to download from three specialized update servers: pre-release (beta users), regular release (recommended for non-critical systems) and postponed release (recommended for company- critical systems – approximately 12 hours after regular release).
Local Update Server
Saves company bandwidth by downloading updates only once, to a local mirror server.
Mobile workforce updates directly from ESET Update Server when the local mirror is not available. Secured (HTTPS) communication channel is supported.
RIP & Replace
Other security software is detected and uninstalled during installation of ESET Endpoint solutions. Supports both 32 and 64-bit systems.
Customizable GUI Visibility
Visibility of Graphical User Interface (GUI) to end user can be set to: Full, Minimal, Manual or Silent. Presence of ESET solution can be made completely invisible to end user, including no tray icon or notification windows.
By hiding the GUI completely, the “egui.exe” process does not run at all, resulting in even lower system resource consumption by the ESET solution.
ESET License Administrator
Makes it possible to handle all licenses transparently, from one place via web browser. You can merge, delegate and manage all licenses centrally in real-time, even if you are not using ESET Remote Administrator.
Touchscreen Support
Supports touch screens and high-resolution displays.
More padding for and complete rearrangement of GUI elements. Basic frequently used actions accessible from tray menu.
Low System Demands
Delivers proven protection while leaving more system resources for programs that end users regularly run. Can be deployed on older machines without the need for an upgrade, thereby extending hardware lifetime. Conserves battery life for laptops that are away from the office, using battery mode.
Right-to-Left Language Support
Native right-to-left language support (e.g. for Arabic) for optimum usability.
Remote Management
ESET Endpoint solutions are fully manageable via ESET Remote Administrator.
Deploy, run tasks, set up policies, collect logs, and get notifications and an overall security overview of your network – all via a single web-based management console.