Enterprise Mobility+Security E5

  • Manage single sign-on devices in your data centre and in the cloud from a single location.
  • Multi-factor authentication helps in securing your phone calls, text messages, and mobile app notifications.
  • Suspicious activity is monitored by reporting, auditing, and warnings, and any security risks are mitigated through focused recommendations.
  • With the Windows Server Access License, each user will be able to access server functions from multiple devices for a single fee.
  • With the data protection feature, users can encrypt sensitive data and also define usage rights.
  • Microsoft Advanced Threat Analysis helps in detecting unusual behavior in on-premise devices and identifies the threats before they cause damage.
  • Safeguard your apps and data in real-time by using machine learning. And with Microsoft Intelligent Security Graph, one can block access when risk is detected.
  • Microsoft Cloud App Security offers protection to your cloud-based apps and also identifies threats and other cloud security issues.
  • And much more features… are mentioned, in the below table

Compare Enterprise Mobility Security Plans

Standalone Plans Included microsoft-365/enterprise-mobility-security/compare-plans-and-pricingecurity E3 Enterprise Mobility + Security E5
Azure Active Directory Premium P1 Azure Active Directory Premium P2
Microsoft Endpoint Microsoft Endpoint
  Azure Information Protection P1 Azure Information Protection P2
  Microsoft Defender for Office 365 Plan 1 Microsoft Defender for Office 365 Plan 2
    Cloud App Security
Features ₹ 10,020 user / year ₹ 15,480 user / year
1 Seat Capacity    
2 Office Online supports Yes Yes
3 Fully installed office app supports web or mobile Desktop Client & Web+Mobile
4 Android, iOS, Windows & smartphone apps Supported Supported
5 Simplified access management and security Yes Yes
6 Centrally manage single sign-on across devices, your datacentre, and the cloud. Yes Yes
7 Multi-factor authentication Yes Yes
8 Strengthen sign-in authentication with verification options, including phone calls, text messages, or mobile app notifications, and use security monitoring to identify inconsistencies. Yes Yes
9 Conditional access Yes Yes
10 Define policies that provide contextual controls at the user, location, device, and app levels to allow, block, or challenge user access. Yes Yes
11 Advanced security reporting Yes Yes
12 Monitor suspicious activity with reporting, auditing, and alerts, and mitigate potential security issues using focused recommendations Yes Yes
13 Windows Server Client Access License (CAL)* Yes Yes
14 Provide each user access to server functions from multiple devices for a single fee. Yes Yes
15 Mobile device management Yes Yes
16 Enroll corporate and personal devices to provision settings, enforce compliance, and protect your corporate data. Yes Yes
17 Mobile application management Yes Yes
18 Publish, configure, and update mobile apps on enrolled and unenrolled devices, and secure or remove app-associated corporate data. Yes Yes
19 Advanced Microsoft Office 365 data protection Yes Yes
20 Extend management and security capabilities across users, devices, apps, and data, while preserving a rich, productive end-user experience. Yes Yes
21 Integrated PC management Yes Yes
22 Centralise management of PCs, laptops, and mobile devices from a single administrative console, and produce detailed hardware and software configuration reporting Yes Yes
23 Integrated on-premises management Yes Yes
24 Extend your on-premises management to the cloud from a single console with Microsoft System Center Configuration Manager and Microsoft System Center Endpoint Protection integration for enhanced PC, Mac, Unix/Linux server, and mobile device administration. Yes Yes
25 Persistent data protection Yes Yes
26 Encrypt sensitive data and define usage rights for persistent protection regardless of where data is stored or shared. Yes Yes
27 Document tracking and revocation Yes Yes
28 Monitor activities on shared data and revoke access in case of unexpected events. Yes Yes
29 Encryption key management per regulatory needs Yes Yes
30 Choose default key management options or deploy and manage your own keys to comply with regulations. Yes Yes
31 Microsoft Advanced Threat Analytics Yes Yes
32 Detect abnormal behavior in on-premises systems and identify advanced targeted attacks and insider threats before they cause damage. Yes Yes
33 Risk-based conditional access Yes Yes
34 Protect apps and critical data in real time using machine learning and the Microsoft Intelligent Security Graph to block access when risk is detected. Yes Yes
35 Privileged identity management Yes Yes
36 Provide timely, on-demand administrative access to online services with access-related reporting and alerts. Yes Yes
37 Intelligent data classification and labeling No Yes
38 Configure policies to automatically classify and label data based on sensitivity and then apply persistent protection. No Yes
39 Microsoft Cloud App Security No Yes
40 Gain visibility, control, and protection for your cloud-based apps, while identifying threats, abnormal usage, and other cloud security issues. No Yes

Contact Us

Do you want to know more about Microsoft Office 365 and its plans? Our experts would love to talk with you. Just fill out the form below.