Red Hat Enterprise Linux Desktop, Self Support, 3Y, 3 vuosi/vuosia
FBAC4895-B52C-4E03-B099-A6A8F8B8017B Created with sketchtool. 706D6907-81E1-46A2-B8F9-7B702A1EF2C7 Created with sketchtool. 6A870209-E7F5-44F5-A66F-09E20C85A0DC Created with sketchtool. 0BB04D6C-A9AB-4913-BF4F-5A23954E68E1 Created with sketchtool. 501E26C7-66C1-4DAA-B740-6CFAF55A1B39 Created with sketchtool. C105F7D3-D5EE-43C9-9EE8-05CC42B296D4 Created with sketchtool. D94689D8-7CBB-41C8-AC06-F79D81FF82D5 Created with sketchtool. DA4C7ED9-2512-4D52-94F0-92800F2A6E04 Created with sketchtool. 42E133FD-828F-4CF4-A0BF-560014487A57 Created with sketchtool. F52D9745-4BFD-4506-BEEF-630FD09EF2D9 Created with sketchtool.
Etävarastossa
Tuotetta on etävarastossamme. Toimitusaika noin 4-5 arkipäivää. Lisätietoja

Toimitetaan sähköpostiin 48 tunnin sisällä.

EUR 431,83
ilman ALV 348,25
Kokonaishinta sis. toimitus 431,83
Easy to Use, Deploy, and Secure\n\nRed Hat Enterprise Linux Desktop is built for both the administrator and the end user. Built with the robust and secure Red Hat Enterprise Linux foundation and leading end-user applications and features from the open source community, Red Hat Enterprise Linux Desktop is an attractive and highly productive environment for knowledge workers on desktops or laptops.\n\nClient installations can be finely tailored and locked down for simplicity and security for any task workstation. For those who require performance, visualization, and interactivity for simulation and design, Red Hat provides support for the latest graphics cards and true scalability on multi-core systems.\n\nDesktop Features\n\nSecurity\n\nLinux has a reputation for being a very secure operating system. Red Hat has extended Linux's security advantage by developing a layered defense scheme for keeping desktops secure.\n\nFeaturing\n\n- more secure applications;\n- protection against commonly exploited security flaws, e.g. buffer overflows integrated in the standard software stack;\n- highest-grade protection via the SELinux security feature. Protects system services from attacks, full transparency and is easy to extend and adopt.\n- smartcard authentication support.\n\nRed Hat makes it easy to secure a desktop deployment against external and internal threats.\n\nManagement\n\nRed Hat provides a simple, rapidly-deployable tool that allows a systems administrator to manage a complex, geographically dispersed desktop deployment from a single web-based console.\n\nRed Hat Network allows a system administrator to remotely update, group, deploy, and provision desktop systems. Whether it's 10 or 10,000 desktop systems, the system administration effort is the same. This frees up some of your desktop personnel to be redeployed on other projects.\n\nInteroperability\n\nNot only are the applications bundled with a Red Hat Enterprise Linux Desktop interoperable with Microsoft® formats, but Red Hat also includes other technologies to allow a Red Hat desktop to plug-and-play in a Microsoft-centric environment.\n\nApplications\n\nRed Hat Enterprise Linux Desktop includes the most popular desktop applications for no additional charge. Fully featured and with intuitive interfaces, these applications make your users productive with little need for retraining.\n\nAnd all of these applications are interoperable with their Microsoft counterparts. This means you can create, view, and edit Microsoft-formatted documents or email and leverage the investments you have already made.\n\nUser experience\n\nRed Hat Enterprise Linux Desktop was designed to create a user experience where everything "just works." This involves major improvements to everything, from OpenOffice and Firefox to networking, laptop support, peripheral support, graphics, and multimedia. All of this ensures that your users are more productive with minimal need for retraining.