Computers

Office 365 License Comparison 1024 411 Vaughan

Office 365 License Comparison

With a range of plans for small, medium and enterprise businesses; identifying the plan (or plans) that are right for your organisation can be challenging. This Office 365 license comparison will overview the Business and Enterprise plans available from Microsoft to help you make the right choices for your organisation.

Within the Office 365 plans targeted at businesses there are two plan types:

  1. Office 365 Business
    • Maximum number of users: 300
  1. Office 365 Enterprise
    • No ceiling on the number of users

Office 365 Business

There are three Office 365 Business plans:

Plan Per Month (ex-GST) Per Annum (ex-GST)
Office 365 Business $12.00 $144.00
Office 365 Business Essentials $6.90 $82.80
Office 365 Business Premium $17.20 $206.40

Note: For each user/mailbox in the plan the commitment is now annual, so the monthly rates shown above are for budgeting / comparison purposes only. The ‘Per Annum’ figure is the actual cost and commitment.

The main differences between the three plans are:

  1. The Office 365 Business plan does not include access to Microsoft Exchange (i.e. business e-mail) and as a result for the majority of organisations this plan is not useful and so won’t be considered further here.
  2. The key difference between Office 365 Business Essentials and Office 365 Business Premium is that Business Premium includes both the following desktop applications and the Web versions:
    • Outlook
    • Word
    • Excel
    • PowerPoint
    • Publisher (desktop application only)
    • Access (desktop application only)
  3. While Business Essentials only includes the Web versions (and there is no Web version of Access or Publisher)

So many organisations use a combination of Business Essentials and Business Premium depending on the needs of their user’s and their budget.

For a detailed comparison of Business Essentials and Business Premium plans click here

Office 365 Enterprise

There are four Office 365 Enterprise plans:

Plan Per Month (ex-GST) Per Annum (ex-GST)
Office 365 ProPlus $17.40 $208.80
Office 365 Enterprise E1 $11.00 $132.00
Office 365 Enterprise E3 $29.00 $348.00
Office 365 Enterprise E5 $50.70 $608.40

The main differences between the four plans are:

  1. Like the Office 365 Business plan, Office 365 ProPlus does not include access to Microsoft Exchange (i.e. business e-mail) and as a result is not a useful plan for the majority of organisations. This plan won’t be discussed further here.
  2. Office 365 Enterprise E1 is similar to Office 365 Business Essentials, in that it only includes the Web versions of: Outlook, Word, Excel and PowerPoint. The size of the user mailbox is 50GB
  3. Office 365 Enterprise E3 and E5 are similar to Office 365 Business Premium, in that they also include the desktop applications:
    • Outlook
    • Word
    • Excel
    • PowerPoint
    • Publisher (desktop application only)
    • Access (desktop application only)
  4. However in contrast to the Enterprise E1 and Office 365 Business Premium plans, both E3 and E5 provide a user mailbox of 100GB.
  5. The Enterprise E3 and E5 plans also provide additional “back office” services

For a detailed comparison of the Office 365 Enterprise plans click here

Still have questions about which Office 365 plan (or plans) is right for your organisation? Contact ZEN today for assistance

Comparison of Office 365 Enterprise Plans 1024 411 Vaughan

Comparison of Office 365 Enterprise Plans

Comparison of Office 365 Enterprise Plans

Plan Office 365 Enterprise E1 Office 365 Enterprise E3 Office 365 Enterprise E5
Per user / per month (ex-GST) $11.00 $29.00 $50.70
Per user / Annual commitment (ex-GST) $132.00 $348.00 $608.40
Services included: Exchange, OneDrive, SharePoint, Microsoft Teams, Yammer, Stream
Additional Services: Power BI Pro
E-mail hosting with 50GB mailbox and custom e-mail domain address
E-mail hosting with 100GB mailbox and custom e-mail domain address
Desktop versions of Office applications on PC or Mac: Outlook, Word, Excel, PowerPoint (plus Access and Publisher for PC only)
OneNote
Web versions of Outlook, Word, Excel and PowerPoint
One license covers fully-installed Office apps on 5 phones, 5 tablets and 5 PC’s or Mac’s per user
File storage and sharing with 1TB of OneDrive storage
Unlimited personal cloud storage
Company-wide intranet and team sites with SharePoint
Online meetings and video conferencing for up to 250 people
Host meetings for up to 10,000 people with Skype Meeting Broadcast or Microsoft Teams live events
Hub for teamwork to connect your teams with Microsoft Teams
Collaborate across departments and locations with Yammer
Manual retention and deletion policies and manual classifications
Manage tasks and teamwork with Microsoft Planner
Search and discovery with Delve
eDiscovery with in-place search, hold and export
Advanced eDiscovery with in-place search, hold, export and analytics
Guard your mailbox against malicious links and attachments with Exchange Online Advanced Threat Protection
Control how Support accesses your mailbox with Customer Lockbox
Auto classification, smart import and more with Advanced Data Governance
Asses risk and gain insight into potential threats with Office 365 Cloud App Security
Advanced personal and organisational analytics with MyAnalytics and Power BI Pro
Make, receive and transfer calls across a wide range of devices with Phone System
Make domestic or international calls from current or new phone numbers with add-on Calling Plan
Create meetings with a dial-in number that attendees can join by telephone with Audio Conferencing
Maximum number of users Unlimited Unlimited Unlimited
24/7 phone and Web support
Licensed for commercial use

<< Return to Office 365 License Comparison

Comparison of Office 365 Business Plans 1024 411 Vaughan

Comparison of Office 365 Business Plans

Comparison of Office 365 Business Plans

Plan Office 365 Business Essentials Office 365 Business Premium
Per user / per month (ex-GST) $6.90 $17.20
Per user / Annual commitment (ex-GST) $82.80 $206.40
Services included: Exchange, OneDrive, SharePoint, Microsoft Teams  
E-mail hosting with 50GB mailbox and custom e-mail domain address    
Desktop versions of Office applications on PC or Mac: Outlook, Word, Excel, PowerPoint (plus Access and Publisher for PC only)  
OneNote    
Web versions of Outlook, Word, Excel and PowerPoint    
One license covers fully-installed Office apps on 5 phones, 5 tablets and 5 PC’s or Mac’s per user  
File storage and sharing with 1TB of OneDrive storage    
Company-wide intranet and team sites with SharePoint    
Online meetings and video conferencing for up to 250 people    
Hub for teamwork to connect your teams with Microsoft Teams    
Manage customer relationships with Outlook Customer Manager  
Manage your business better with Microsoft Bookings  
Manage tasks and teamwork with Microsoft Planner    
Maximum number of users 300 300
24/7 phone and Web support    
Licensed for commercial use    

<< Return to Office 365 License Comparison

Competitive Internet Plans for Business 1024 411 Vaughan

Competitive Internet Plans for Business

Competitive Internet Plans for Business

 Get cost-effective enterprise-grade connectivity to the Internet through Fibre400 or Fibre1000.

ZEN’s symmetric fibre-optic plans can be tailored to meet your connectivity and business requirements.

Fibre1000 and Fibre400 have ample capacity and can deliver both Internet access and Voice services on the same service. Why is this important?

A number of organisations are presently are paying for two services:

  1. Internet access
  2. Voice services (often via a separate dedicated ISDN line)

By combining Internet and Voice into the one service, you can save money.

Example Scenario

Customer was paying for the following services:

Internet 100Mbps $1,100ex
ISDN 20 (i.e. 20 lines) 850
Call charges 140
    Total Monthly fees: $2,090ex

Compared with Fibre1000

Fibre1000 (48 month term) $ 750ex
16 SIP channels with Premium call package 480
    Total Monthly fees: $ 1,230ex
    Monthly Savings $ 860ex !!

Note: Fibre1000 is 10x faster than Internet 100Mbps. So with Fibre1000 the customer is saving money and getting a much faster Internet service.

How fast is Fibre1000 ?

With 1000Mbps, you’ll be future proofing your business performance. Our customers have been extremely happy with the speed of this product, to understand the speed in ‘real-world’ operations. The size of a typical movie file is: 1,000GB. The time required to download (or upload) this movie with:

  • Fibre400        25 seconds
  • Fibre1000      10 seconds

Technical Specs of Fibre400 / Fibre1000

Feature Specification
Availability Fibre connected buildings subject to Service Qualification
Access Network Fibre
Access Type Multi-Service
Number of Services Minimum 1 | Maximum 4
Services Supported Unlimited Internet – IP-Line with flat rate data plan and Static IP
Optional:
IP/MPLS VPN – IP-VPN
Ethernet VPN – e-LAN
Ethernet Line – e-Line (v3)
SIP Trunking – PAYG, National IV and Premium IV Plans
Bandwidth Aggregate: 400 or 1000Mbps
NTU Provided
Router Managed Router options available or Customer can provide and manage their own router
Service Level 99.95% availability SLA backed by Outage Restoration targets and rebates
Contract Term 24, 36 or 48 months
Technical Support 24 x 7 x 365 days per year
Business Size Medium business
What you need to know about Network Security 509 203 Vaughan

What you need to know about Network Security

Network Security is a concern that must be taken into consideration if you own a business whether big or small. Network security means the protection of your data and network using both hardware and software technologies. You can easily manage the access to your network by using a network security technology.

The cost to recover from a network security breach can be really high for small and medium business owners. So it’s extremely important for small and medium enterprises to consider the network security as one of their top priorities. So what can you do to protect your network from security breaches?  What are the ways to protect your network and precious business data?

Network security offers you various layers of defense for the protection of your data and network. So here I will tell you some of the best ways to protect your network.

Access control

You should limit the number of users who can have access to your network. You need to recognise each user and the device from which they are going to access your network. You can decide which users and devices can access your network and can even impose a limit on their usage.

Antivirus and Antimalware

The second thing you should consider is to install an antivirus and antimalware

software on all your devices. They protect your network and data from worms, trojans, ransomware and spyware. Sometimes viruses and malware infect your network and lie dormant for weeks or even months. The antivirus and antimalware

software not only remove the viruses and malware but also find anomalies and fix the damage afterwards.

Application Security

You also need to protect the applications you use for running your business. Attackers look for the loopholes and vulnerabilities in your software to infiltrate into your network. The application security programs find and close such loopholes and vulnerabilities and protect your network from potential attacks. For example, ZAP (Zed Attack Proxy) is a tool used to find vulnerabilities in web applications. ZAP is used to scan the vulnerabilities and perform the functionalities such as intercepting proxy, websocket support, authentication support, smartcard and client digital certificates support.

Data loss prevention

You should make sure that your staff does not send confidential and sensitive information out from your network. You can use a data loss prevention program that will check people from sending, uploading or even printing sensitive and confidential information in any way. A data loss prevention program detects the data breaches, data ex-filtration transmissions and prevents them from happening. A DLP software classifies and protects sensitive and confidential information which helps a network administrator to control what users can transfer over the network. For example, Symantec Data Loss Prevention is a DLP program which is capable of monitoring thousands of users and devices. It has a unified management platform, content detection servers and light-weight endpoint agents for windows, Linux and Macintosh.

Email Security

Cyber attackers always consider email gateways as their top priority for security breaches. You can use the email security applications to check the incoming security attacks and outgoing emails containing sensitive and confidential business data. For example, CipherMail is an open source email security application which supports multiple encryption standards. Scrollout F1 is another open source email security application which offers almost all the features of email server security along with anti-virus and anti-spam protection.

Intrusion prevention systems

The intrusion prevention system checks the incoming network traffic to block the potential attacks. It can block the malicious activities and prevent the suspected viruses and malware containing files from entering into your network, thereby preventing the security breaches and attacks.

Virtual Private Network (VPN)

Using a Virtual Private Network helps you encrypt the connection from an endpoint to network. A remote-access virtual private network will authenticate the communication between the devices used by your staff and your network. A VPN makes the data pass through secure tunnels and requires passwords, tokens and other unique identification techniques to gain access.

Wireless security

Wireless networks can be less secured as compared to wired networks as there are multiple tools available to hack wireless networks. If someone knows your password he or she can easily infiltrate your network and steal your sensitive and confidential data. So if you are using a wireless network for your business you need to use an advanced protection specially designed for wireless networks. Mostly, WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) type are used for the protection of wireless networks. WEP is less secure as compared to WPA and is more vulnerable to hacks and security breaches. WPA2 was introduced in the year 2004 as an improved and more secure version of WPA. WPA2 uses a security protocol based on Advanced Encryption Standard (AES) which is more secure than WEP and WPA.
The ideal solution is that you should look for a company that guides you throughout the process and suits your budget. If you are looking for IT support services in Sydney one such company is Zero Effort Networking which is serving its clients for 20 years in Australia.

For more information on Network Security, please visit the following link – IT Support in Sydney You can also Email us at info@zen.net.au or Call us at 1300 93 94 95 and we will be happy to help you.

The rise of Cybercrime 509 203 Vaughan

The rise of Cybercrime

IT security is one of the most important concerns that small and medium businesses consider while planning for IT support. There has been observed a high rise in cyber crime during the past decade which has become difficult to handle concern both for businesses and IT companies supporting small businesses.

Cybercrime is not just limited to hacking and exploitation of passwords and data. It involves social engineering and phishing to which small businesses are the most vulnerable victims. Cybercrime appears lucrative to employees of small enterprises to which they respond without knowing the consequences. Such kind of cyber crime is called business email crime or CEO fraud which could create multiple problems for small and medium businesses.

Now let’s see how cybercrime takes place. Generally, the hackers impersonate email accounts of managers of the targeted business and request the fraudulent transfers from the company’s staff. The hackers provide a domain to victims that look almost same as the original domain with a little bit of difference. For example, if “john.phillip@emilia.net” is the actual email address, the hacker will register a domain name like emillia.net and make an email “john.phillip@emillia.net”.

Fraudsters might learn the communication style of people with whom they are communicating through social media in order to avoid any kind of suspicion. If the plan goes well and the victim remains unaware of the matter, he or she can make and unauthorized transaction which could transfer cash into the hacker’s bank account.

According to the FBI reports, a steep rise has been seen in such kind of cyber crime. Thousands of companies have fallen prey to this type of crime. Any kind of business whether large of small can be the victim of such kind of cyber crime with real estate companies the potential victims of hackers.

Cyber security attacks

Such attacks happen across the globe and have been reported in hundreds of nations. Borders are not a problem for the hackers and this is a global issue. All they need is a computer and an internet connection. Even the big corporate are not isolated from this kind of attacks regardless of the level of security measures they have employed.

The only way to protect yourself from such attacks is companies should employ a two-step authentication both for emails and verification on phone for wired transfers. Companies should also instruct their staff to be aware of the suspicious e-mails and intrusion attempts.

Another increasing trend is ransomware, in which a hacker takes a device hostage and asks for money to return it. The viruses which are used to perform such attacks are not picked by the standard antivirus protection. So you will never know when you become a victim of such attack. Such attacks can steal your important and personal data and the hackers agree to return them only when you pay them money.

These attacks may encrypt your documents and files stored on your computer as well as network. Such attacks seem lucrative to the victims, especially to the people working in the small and medium companies. The best defense against ransomware is regular backups, if systems are compromised and data is encrypted then that data can be recovered from backups.

Cybercrime is not just limited to computers and laptops, it is also active on mobile phones and smart TV’s. Moreover using the advanced technology and open source encryption cyber crime is going to touch its new levels with high speed.  You may take support from an IT company like Zero Effort Networking to protect your business from cyber attacks. If you are located in Sydney, then we can assist you with our services at your doorstep.

Zero Effort Networking IT support Sydney provides IT services in and around Sydney. For more information on IT support services, please call us on 1300 93 94 95 or email us at info@zen.net.au.

Join our Newsletter

We'll send you newsletters with news, tips & tricks. No spams here.

Input this code:captcha