Help & Support Register Login
AA

Keep Systems Secure

15 SGD
Bitdefender Internet Security 2018.png



Description: 

Bitdefender Internet Security is security software that protects computers from viruses, spam, and other online threats.

This donation provides a subscription for use of the product on one computer for one year. The year of service for this license begins when you activate the product on your computer. The subscription includes protection updates and new product features. The product will cease to function entirely after one year unless the subscription is renewed.

 

Benefits for Organizations

You can use Bitdefender Internet Security to

  • Protect your organization's data from viruses, worms, Trojan horses, botnets, rootkits, ransomware, and spam
  • Reduce system administration costs by keeping your computers running smoothly
  • Prevent uninvited connections to computers and other devices so intruders can't steal information, install and launch programs, or make other dangerous changes to your organization's computers

 

Major Capabilities

  • Remote management: A dashboard displays the status and licensing information about your software and services in one location that is accessible from any web-enabled device.
  • Firewall: A firewall continuously monitors your Internet connections and prevents unauthorized access, even over a Wi-Fi network.
  • Phishing defense: Internet Security analyzes and blocks websites that support scams or credit card phishing attempts. It automatically opens banking and shopping pages in its own secure browser and prevents critical data like your Social Security number from being transmitted.
  • Behavior-based protection: Internet Security stops emerging threats by analyzing the behavior of a given program or process in a virtual environment before it is executed. If it is deemed safe to run, Internet Security continues to analyze the process while it's running to identify likely threats that have not yet been reported.
  • Rescue mode: If threats like rootkits cannot be removed from within the operating system, Internet Security will reboot the computer in a trusted environment to clean it up and restore it to a safe state.

 

Choose Carefully

The administrative fee for this product is not refundable, and the product cannot be exchanged.

 

Obtaining This Product

When TechSoup approves your donation request, we will send a message to your organization email address with instructions for obtaining and activating this product.

Requirements: 
  • See the system requirements at the bottom of this Internet Security page.
  • Bitdefender cannot run alongside other antivirus programs. In order to use Bitdefender, you must first uninstall them.
Restrictions: 
82 SGD
Bitdefender GravityZone Business Security, 10 Users.product-image.png
Description: 

Bitdefender GravityZone Business Security is software that protects networked laptops, desktops, servers, and virtual machines from viruses, worms, Trojan horses, spyware, adware, rootkits, and other threats. Network protection is managed through a central console.

This donation provides a one-year GravityZone Business Security subscription for up to 10 devices. Of these devices, 3 can be servers or Linux machines. The product will cease to function entirely after one year unless the subscription is renewed.

 

Benefits for Organizations

If you have experience with network administration, you can use Bitdefender GravityZone Business Security to reduce resource costs and centrally manage protection for your organization's network.

 

Major Capabilities

  • Management console: The console, or Control Center, is deployed as an appliance that runs in a virtualized environment. Control Center provides full visibility into the organization's overall security posture, insight into global security threats, and control over its security services. When you activate the product, you choose one of two types of console.
    • Cloud: Bitdefender hosts this console, and the administrator connects to it with a web browser.
    • On-premises: You deploy this console as an appliance that runs in a virtualized environment in your organization's own infrastructure. You should choose this type only if you have experience with virtualized environments.
  • Antivirus and antispyware: Security scanners can detect and clean viruses and quarantine viruses, spyware, adware, Trojans, and rootkits on all endpoints and servers.    
  • Behavior-based protection: Security for Endpoints stops emerging threats by analyzing the behavior of a given program or process in a virtual environment before it is executed. If it is deemed safe to run, Bitdefender continues to analyze the process while it's running to identify likely threats that have not yet been reported.
  • Desktop firewall (Windows workstations only): The firewall prevents unauthorized users from accessing users' computers when roaming or working remotely using unsecured networks. Configuration settings include Internet blocking and access by IP address, application, port, or protocol to protect against inbound and outbound threats.
  • Content control (Windows workstations only): Content control allows administrators to define traffic scan options and schedule web access while blocking or allowing certain web categories or URLs. They can also configure data protection rules and define permissions for the use of specific applications.
  • Device control (Windows desktop and server operating systems only): Device control applies security policies to devices attached to endpoints. It prevents data leakage and malware infections that can result from using USB flash drives, Bluetooth devices, CD or DVD players, storage devices, and so on.

 

No Additional Users

You cannot add more users once you have installed this product on your network. You can request a product with more users and install it, but it will replace the product that you previously installed. You will not receive a refund for the previous product.

If your organization requires more than 10 users on a single network, TechSoup also offers GravityZone Business Security for 25 users and 50 users.

Number of Users Required Product
1 to 10 Bitdefender GravityZone Business Security, 10 Users
11 to 25 Bitdefender GravityZone Business Security, 25 Users
26 to 50 Bitdefender GravityZone Business Security, 50 Users

If your organization requires more than 50 users on a single network, please contact Bitdefender directly.

Existing Subscribers

Current subscribers to GravityZone Business Security or Bitdefender Small Office Security can use this donation to add another year of protection. Small Office Security users will need to upgrade to GravityZone. After the upgrade, only 3 of the protected devices can be servers or Linux machines.

 

Choose Carefully

The administrative fee for this product is not refundable, and the product cannot be exchanged. Please be sure that you have requested a subscription that will cover all the users on your network.

 

Obtaining This Product

When TechSoup approves your donation request, we will send a message to your organization email address with instructions for obtaining and activating this product.

Requirements: 
  • See the system requirements at the bottom of this GravityZone Business Security page.
  • Bitdefender cannot run alongside other antivirus programs. In order to use Bitdefender, you must first uninstall them.
Restrictions: 
Donor & Discount Partners:
Language:
Media:
Platform:
177 SGD
veritaslogo



Description: 

Veritas System Recovery 18 is a backup and recovery solution that uses disk imaging technology to protect servers. It takes snapshots of entire hard disks that can be saved to almost any type of storage media or converted to virtual disks. When recovery is needed, these snapshots (called recovery points) can be restored to either the same hardware configuration or a different hardware setup.

This donation provides one Licence, which allows an Organisation back up any number of devices. Only one Licence is required per Organisation.

 

Benefits for Organisations:

Regular backups can protect your Organisation against a data-loss catastrophe. If you have experience with system administration, you can restore an entire system or individual files and folders if a disaster renders servers inoperable.

 

Major Capabilities:

  • Flexible recovery point creation: You can create recovery points as needed or schedule them to be created automatically.
  • Restoration of individual files: If only certain files need to be recovered, you can browse the recovery point to restore individual files, Exchange messages, and SharePoint documents.
  • Secondary backup locations: System Recovery supports secondary backup locations, which are often essential when primary on-site backups are inaccessible or unrecoverable.
  • Cloud storage options: System Recovery supports backup and recovery directly to third-party cloud storage, including Amazon S3 and Microsoft Azure (64-bit operating systems only).

 

Free Management Console:

The System Recovery Management Solution is free for any Organisation with a valid System Recovery Licence. It provides a centralized management console for Organisations administering System Recovery on multiple computers distributed across one or more locations. Veritas recommends it for managing 20 or more servers. It must be installed on a computer running Windows Server.

 

Comparison with Backup Exec:

This product is one of two Veritas enterprise-level backup applications. For a comparison of the applications offered through TechSoup Asia, see the Guide to Veritas Recovery and Backup Products.

 

NFR Version:

The version of this product available through TechSoup Asia is the Not for Resale (NFR) version. NFR products cannot be upgraded to new releases. If you are seeking a new release, you will need to request a new donation through TechSoup Asia. In addition, NFR products do not include telephone assistance with product issues or add-ons. However, free online technical support is available at the Veritas website through its knowledge bases and discussion forums.
 

Choose Carefully:

The administrative fee for this online product is not refundable, and the product cannot be exchanged.

 

Obtaining This Product:

Expect two emails. When your donation request has been approved, TechSoup Asia will send a message to your organisation email address with preliminary information about obtaining this product. Shortly after, the donor partner will send an email with information needed to complete the installation or activation. 

Requirements: 
6 SGD
Symantec current pic.jpg



Description: 

Symantec Endpoint Protection Small Business Edition is security software that protects networked laptops, desktops, and servers ("endpoints"). It defends against viruses, worms, Trojan horses, spyware, adware, rootkits, and threats not seen before ("zero-day attacks"). This product is most suitable for organizations with between 5 and 100 endpoints.

This donation provides a one-year subscription for use of the product on a single endpoint. The subscription includes protection updates and new product features.

Benefits for Organizations:

If you have network administration experience, you can use Symantec Endpoint Protection to:

  • Centrally manage protection for all the endpoints in your organization's network
  • Manage endpoints from anywhere and minimize maintenance costs through cloud-based management rather than installing software locally on a management server

Major Capabilities:

Symantec Endpoint Protection Small Business Edition incorporates many of the technologies of the standard Endpoint Protection application, all manageable through a single console:

  • Cloud-based or on-premises management:Network administrators have the option to manage endpoint protection through a web browser using a cloud management service or through a locally managed deployment on a server. Note that if you have any endpoints running Mac OS X, you cannot use cloud-based management.
  • Antivirus and antispyware:Endpoint Protection scans for both viruses and security risks.
  • Desktop firewall:The firewall prevents unauthorized users from accessing the computers and the networks that connect to the Internet.
  • Intrusion prevention:The intrusion prevention system (IPS) acts as a second layer of network defense after the firewall.
  • Proactive threat scanning: This scan analyzes the behavior of an application or process to determine if it exhibits characteristics of threats.

The Small Business Edition does not include device control or application control technologies, which are more suited to larger organizations.

Support, Renewals, and Upgrades:

This product is identical to the version sold through the Symantec website and includes the standard support, renewal, and upgrade options available with retail products.

Choose Carefully:

The administrative fee for this product is not refundable, and the product cannot be exchanged.

Obtaining This Product:

Expect two emails. When TechSoup approves your donation request, we will send a message to your organization email address with preliminary information about obtaining this product.

Shortly after, the donor partner Symantec will send an email with information needed to complete the installation or and activation. This email will include a serial number certificate as a PDF file and and a license file in zip form. If your organization uses a firewall, be sure it is configured to accept files from symantec.com.

Requirements: 

Endpoint Protection consists of client software that runs on the endpoints and management software that runs on a cloud-based or local server.

Cloud Management Service Option

Client workstations:

Hardware:

  • 300-MHz processor for Windows XP; 1-GHz processor for Windows Vista or later
  • 256 MB or more RAM
  • 300 MB available hard-disk space

Software:

  • Windows XP with SP2 or later (32-bit only); Windows Vista with SP1 or later; Windows 7; Windows 8

Client servers:

Hardware:

  • 1-GHz or higher Pentium III processor (32-bit); 2-GHz or higher Pentium 4 processor with x86-64 support (64-bit); Itanium processors not supported
  • 512 MB or more RAM; 1 GB recommended
  • 700 MB available hard-disk space

Software:

  • Windows Server 2003; Windows Small Business Server 2003; Windows Server 2008; Windows Small Business Server 2008; Windows Small Business Server 2011; Windows Essential Business Server 2008

 

On-Premises Management Service Option

Client workstations and servers:

Hardware for Windows:

  • 1-GHz or higher Pentium III processor (32-bit); 2-GHz or Pentium 4 processor with x86-64 support (64-bit); Itanium processors are not supported

Software for Windows:

  • Windows XP Home or Professional with SP2 or later (32-bit); Windows XP Home or Professional with any SP (64-bit); Windows XP Embedded with SP3 or later; Windows Vista; Windows 7; Windows Embedded Standard 7; Windows Server 2003; Windows Small Business Server 2003; Windows Server 2008; Windows Small Business Server 2008; Windows Essential Business Server 2008; Windows Small Business Server 2011; Windows 8; Windows Server 2012

Hardware for Mac:

  • Core Solo or Core Duo processor (32-bit); Core 2 Duo or Quad-Core Xeon processor (64-bit); PowerPC processors not supported
  • 512 MB or more RAM; 1 GB recommended
  • 700 MB or more available hard-disk space

Software for Mac:

·          Mac OS X v10.5 to v10.7; Mac OS X Server v10.5 to v10.7

Management server:

Hardware:

  • 1-GHz or higher Pentium III processor, Pentium 4 recommended (32-bit); 2-GHz Pentium 4 processor with x86-64 support (64-bit)
  • 1 GB or more RAM (32-bit); 2 GB or more RAM (64-bit)
  • 8 GB or more available hard-disk space

Software:

  • Windows XP Professional with SP3 or later; Windows Server 2003 with SP1 or later; Windows Small Business Server 2003; Windows Server 2008; Windows Small Business Server 2008; Windows Essential Business Server 2008; Windows 7 (all editions except Home); Windows Small Business Server 2011; Windows Server 2012; Windows 8
Donor & Discount Partners:
Language:
Media:
Platform:
15 SGD
Norton Security Deluxe.jpg



Description: 

Norton Security Deluxe protects computers, tablets, and smartphones against the latest online threats and also includes tools for tuning up systems. It does most of its work in the background while consuming few system resources and requiring little user interaction.

This donation provides a subscription for one user to use the product on up to five devices for one year. The subscription includes protection updates and new product features. The product will cease to function entirely after one year unless the subscription is renewed. Organizations that need protection for more than one user should consider using either Norton Small Business or a Symantec Enterprise product.

Benefits for Organizations

You can use Norton Security Deluxe to

  • Protect your organization's data from viruses, spyware, malware, and other threats
  • Reduce system administration costs by keeping your computers running smoothly
  • Prevent uninvited connections to computers and other devices so attackers can't steal information, install and launch programs, or make other dangerous changes to your organization's computers

Major Capabilities

  • 24/7 threat protection: Combines several defense technologies based on networks, files, reputation, and behavior.
  • Mobile Insight: Checks apps for potential privacy risks, high battery and data use, and intrusive behavior.
  • Mobile device location: Remotely locates lost or stolen devices, locks them, wipes them, or sets off scream alarms.
  • Computer tune-up: Provides tools to fix common computer problems, free up memory, remove unneeded files, and clean up the hard drive. (Windows only)
  • Password management: Remembers, secures, and automatically enters usernames and passwords; generates new passwords. (Windows only)

Newest Version

This product description is for the version of Norton Security that was released in September 2015. However, when you download your Norton product, you will receive the most recent version. As updates are released, they are installed automatically.

Support, Renewals, and Upgrades

This product is identical to the version sold through the Symantec website and includes the standard support, renewal, and upgrade options available with retail products.

Choose Carefully

The administrative fee for this product is not refundable, and the product cannot be exchanged. Symantec's money-back guarantee does not apply to this product since it is donated.

Obtaining This Product

Expect two emails. When your donation request has been approved, TechSoup Asia will send a message to your organization email address with preliminary information about obtaining this product. Shortly after, the donor partner will send an email with information needed to complete the installation or activation.

Donor & Discount Partners:
Language:
Media:
Platform:
210 SGD
veritaslogo



Description: 

Veritas Backup Exec is backup and recovery software that runs on Windows Server. With the agents and options included, it can back up Windows, Mac, and Linux computers and virtual machines.


This donation provides one license for Veritas Backup Exec 20. One Backup Exec license allows the Backup Exec server to back up any number of devices. Only one license is required per organization.
 

Benefits for Organisations:

Regular backups can protect your organisation against a data-loss catastrophe. With Backup Exec, you can back up data from multiple sources in a centralised interface.
 

 

Major Capabilities:

  • Ease of use: An intuitive interface and wizards simplify installation, setup, backup, recovery, media management, disaster preparation, cluster installation, and agent configuration.
  • Multiple-server backups: You can back up multiple servers at once, either as part of one backup definition or individually in separate definitions.
  • Storage options: You can back up to nearly any storage device, including disk, tape, dedupe storage, or third-party cloud, including Amazon Web Services (AWS) Storage Gateway VTL.
  • Block-level deduplication: Backup Exec deduplicates data across all backup jobs, including physical and virtual environments.
  • Versatile recovery: You can recover virtual machines, applications, databases, files, folders, and granular objects directly from backup storage.
  • Simplified Disaster Recovery technology: In the event of a disaster, Backup Exec can recover an entire server to the same or dissimilar hardware in minutes, not hours or days.

 

Agents and Options:

Agents and options extend platform and feature support for Backup Exec environments. You can use an unlimited number of these agents  within a network, allowing for multiple instances of agents to protect several servers. The version of Backup Exec available through TechSoup Asia includes all of the available agents and options. For a complete list, see Backup Exec agents and options.
 

 

Comparison with System Recovery:

This product is one oftwo Veritas enterprise-level backup applications. For a comparison of the applications offered through TechSoup Asia, see the Guide to Veritas Recovery and Backup Products.
 

 

NFR Version:

The version of this product available through TechSoup Asia is the Not for Resale (NFR) version. NFR products cannot be upgraded to new releases. If you are seeking a new release, you will need to request a new donation through TechSoup Asia. In addition, NFR products do not include telephone assistance with product issues or add-ons. However, free online technical support is available at the Veritas website through its knowledge bases and discussion forums.
 

 

Choose Carefully:

The administrative fee for this online product is not refundable, and the product cannot be exchanged.

 

 

Obtaining This Product:

Expect two emails. When your donation request has been approved, TechSoup Asia will send a message to your organisation email address with preliminary information about obtaining this product. Shortly after, the donor partner will send an email with information needed to complete the installation or activation. 

Requirements: 

The Veritas website provides basic system requirements. It also offers much more detailed PDF lists of compatible hardware and software.

9 SGD
Untitled design.jpg



Description: 

Symantec Endpoint Protection 14.1 protects networked laptops, desktops, and servers ("endpoints") against viruses, worms, Trojan horses, spyware, adware, rootkits, and threats not seen before ("zero-day attacks"). It consists of client software that runs on the endpoints and management software that runs on a server. This product is most suitable for organizations with 100 or more endpoints.

This donation includes a one-year subscription for use of the product, protection updates, and new product features.

 

Benefits for Organizations:

If you have network administration experience, you can use Symantec Endpoint Protection to centrally manage protection for all the endpoints in your organization's network.

 

Major Capabilities

Symantec Endpoint Protection combines several Symantec technologies, all manageable through a single console.

  • Multilayered protection: Endpoint Protection analyzes the attributes, behavior, and reputation of potential malware files. It also provides a system firewall and prevents intrusions and exploits.
  • Artificial intelligence and machine learning: The product deploys machine learning on both the endpoint and in the cloud and adds artificial intelligence mechanisms in the cloud. Symantec collects threat insights from over 175 million endpoints and 57 million attack sensors.
  • Device control: Endpoint Protection blocks or allows access from devices, such as connections through USB, infrared, FireWire, SCSI, serial ports, and parallel ports
  • Application control: This feature blocks or allows applications that try to access system resources
  • Turnable security: Administrators can tune the level of detection and blocking to optimize protection and gain enhanced visibility into suspicious files. They can do this through a cloud console that integrates with the on-premises SEP manager.
  • Small footprint: Cloud lookup capabilities reduce bandwidth usage and the size of definition files 70 percent over the previous generation.

Learn more about Symantec Endpoint Protection 14.1.

 

Support and Renewals

This product includes 12 months of support. You are entitled to update to the latest version of the product, including regular definition updates.

You may renew your subscription by requesting another product through TechSoup each year before the subscription expires.

 

Choose Carefully

The administrative fee for this downloaded product is not refundable.

 

Obtaining this Product

Expect two emails. When TechSoup approves your donation request, we will send a message to your organization email address with preliminary information about obtaining this product.

Shortly after, the donor partner Symantec will send an email with information needed to complete the installation or and activation. This email will include a serial number certificate as a PDF file and and a license file in zip form. If your organization uses a firewall, be sure it is configured to accept files from symantec.com.

This donation includes a one-year subscription for use of the product, protection updates, and new product features. 

Requirements: 

Symantec Endpoint Protection Client (32-Bit and 64-Bit):

  • Windows 2000 Professional, Server, Advanced Server, Datacenter Server, Small Business Server SP3 or later; Windows XP Home, Tablet PC, Media Center, Professional SP1 or later; Windows Vista Home Basic, Home Premium, Business, Enterprise, Ultimate, 32-bit or x64 edition; Windows Server 2003 Standard, Enterprise, Datacenter, Storage, Web, Cluster, Small Business Server, 32-bit or x64 edition
  • For Terminal Server clients connecting to a computer with antivirus protection — Microsoft Terminal Server RDP client; Citrix Metaframe (ICA) client 1.8 or later
  • 256 MB or more RAM
  • 600 MB available hard-disk space (32-bit)
  • 700 MB available hard-disk space (64-bit)
  • 1024x768-pixel (or higher) display
  • Internet Explorer 6.0 or later

Symantec Endpoint Protection Manager (32-Bit and 64-Bit):

  • Windows 2000 Professional, Server, Advanced Server, Datacenter Server, Small Business Server SP3 or later; Windows XP Professional SP1 or later, 32-bit edition or x64 edition; Windows Server 2003 Standard, Enterprise, Datacenter, Storage, Web, Cluster, Small Business Server, 32-bit edition or x64 edition
  • Internet Information Services server 5.0 (or later) with World Wide Web services enabled
  • 1 GB or more RAM; 2 – 4 GB recommended
  • 4 GB available hard-disk space for the server plus an additional 4 GB for the database
  • 1024x768-pixel (or higher) display
  • Internet Explorer 6.0 or later
  • Static IP address recommended

Symantec Endpoint Protection Management Console:

  • Windows 2000 SP3 or later; Windows XP; Windows Vista; Windows Server 2003
  • JRE 5.0; Update 13 or greater recommended
  • 512 MB or more RAM; 1 GB recommended
  • 40 MB available hard-disk space
  • 1024x768-pixel (or higher) display
  • Internet Explorer 6.0 or later

If you determine that your network requires a central location for all quarantined files, you can install the Quarantine Server and the Quarantine Console. See their system requirements on the Symantec Web site.

Donor & Discount Partners:
Language:
Media:
Platform:
9 SGD
Utilities.png



Description: 

Norton Utilities is a collection of tools that optimize the performance of a PC.

This donation provides a license for the latest version of this product to be used on up to three computers.

Benefits for Organizations:

You can use Norton Utilities to save resources by improving the stability and longevity of your organization's PCs.

Major Capabilities:

  • Registry monitoring and cleaning: Notifies the user when the Windows registry is in need of repair; repairs and cleans it.
  • Registry defragmentation: Removes gaps, wasted space, and corrupt keys from the registry. Like registry cleaning, defragmenting allows programs to launch as quickly as possible.
  • Disk cleaning: Provides options for cleaning Windows settings, browser settings, plug-ins, and custom items. It also allows "bleaching" of free space on drives or partitions, which renders deleted data unrecoverable by standard methods.
  • Disk optimization: Defragments and optimizes files and data for increased performance.
  • Disk repair: Checks hard disks and repairs problems that could lead to crashes.
  • Startup management: Allows startup items to be disabled, deleted, or enabled to maximize startup speed.

Support, Renewals, and Upgrades:

This product is identical to the version sold through the Symantec website and includes the standard support, renewal, and upgrade options available with retail products.

Choose Carefully:

The administrative fee for this product is not refundable, and the product cannot be exchanged.

Obtaining This Product:

Expect two emails. When your donation request has been approved, TechSoup will send a message to your organization email address with preliminary information about obtaining this product. Shortly after, the donor partner will send an email with information needed to complete the installation or activation.

Requirements: 

Hardware:

  • 233-MHz (or higher) processor for Windows XP; 1-GHz (or higher) for all others
  • 64 MB RAM for Windows XP; 1 GB for Windows Vista; 1 GB for 32-bit Windows 7 and Windows 8; 2 GB for 64-bit Windows 7 and Windows 8
  • 100 MB available hard-disk space
  • 1,024 x 768-pixel (or higher) display

Software:

  • Windows XP with SP3 (32-bit); Windows Vista (32-bit or 64-bit); Windows 7 (32-bit or 64-bit); Windows 8 (32-bit or 64-bit)

Other:

  • The capacity to download about 20 MB of data
Syndicate content