-
Microsoft Products Must Be Downloaded Within Five Days After your request for this product is approved and the licenses are made available to you, you will have five days to download the product and license keys. To avoid a delay in access to your products, please follow the instructions we provide to obtain your products from the Microsoft 365 admin center as soon as they are available.$168.00 ex GSTIn stock -
The GigaStack GBIC adds port density and high-performance connectivity to supporting switches. When installed in a supporting switch, the GigaStack GBIC supports Gigabit connections in a cascaded stack or point-to-point configuration. The GigaStack GBIC autonegotiates the duplex setting of each port to maximize the bandwidth for your configuration.$10.51 ex GST5 in stock -
Dell Wyse ZX0 Z90D7 7010 Thin Client AMD G-T56N 1.65GHz 4GB 8GB SSD | 3mth Wty | Excellent conditionWhen we designed the revolutionary Wyse Z90 thin client, we had the future in mind. Z90 delivers a combination of performance, connectivity, and ease of use never before seen in a thin client. Really. It’s fast. At the heart of the Wyse Z90 lies a whole new engine, where all the major system elements – CPU cores, vector engines, and a unified video decoder for HD decoding tasks – live on the same piece of silicon. This design concept eliminates one of the fundamental constraints that limit performance. Whether you want the best 2D or 3D graphics, HD video, or the ability to embed custom Windows applications that execute right on the Z90, you’ll have power to spare. With available dual core performance, you’ll just say “Wow”.$79.91 ex GST124 in stock
-
HP EliteBook x360 1040 G5 Certified Refurbished Motherboard with i7-8650U & 16GB The HP EliteBook x360 1040 G5 Motherboard L41014$161.73 ex GST1 in stock -
DataSecurity Plus is a data visibility and security solution that specializes in data leak prevention, file server auditing, and data discovery. It tracks and alerts on critical file modifications and movement across file servers, workstations, and USBs. It uses pre-configured policies to identify malicious user behavior, as well as locate and classify sensitive data. It helps detect and block sensitive data leaks via USBs, email, printers, and more. Further, it helps monitor file integrity, review file permissions, and meet multiple compliance requirements.Provided by ManageEngine
