Help & Support Register Login
AA

Data Security and Privacy

82 SGD
Bitdefender GravityZone Business Security, 10 Users.product-image.png
Description: 

Bitdefender GravityZone Business Security is software that protects networked laptops, desktops, servers, and virtual machines from viruses, worms, Trojan horses, spyware, adware, rootkits, and other threats. Network protection is managed through a central console.

This donation provides a one-year GravityZone Business Security subscription for up to 10 devices. Of these devices, 3 can be servers or Linux machines. The product will cease to function entirely after one year unless the subscription is renewed.

 

Benefits for Organizations

If you have experience with network administration, you can use Bitdefender GravityZone Business Security to reduce resource costs and centrally manage protection for your organization's network.

 

Major Capabilities

  • Management console: The console, or Control Center, is deployed as an appliance that runs in a virtualized environment. Control Center provides full visibility into the organization's overall security posture, insight into global security threats, and control over its security services. When you activate the product, you choose one of two types of console.
    • Cloud: Bitdefender hosts this console, and the administrator connects to it with a web browser.
    • On-premises: You deploy this console as an appliance that runs in a virtualized environment in your organization's own infrastructure. You should choose this type only if you have experience with virtualized environments.
  • Antivirus and antispyware: Security scanners can detect and clean viruses and quarantine viruses, spyware, adware, Trojans, and rootkits on all endpoints and servers.    
  • Behavior-based protection: Security for Endpoints stops emerging threats by analyzing the behavior of a given program or process in a virtual environment before it is executed. If it is deemed safe to run, Bitdefender continues to analyze the process while it's running to identify likely threats that have not yet been reported.
  • Desktop firewall (Windows workstations only): The firewall prevents unauthorized users from accessing users' computers when roaming or working remotely using unsecured networks. Configuration settings include Internet blocking and access by IP address, application, port, or protocol to protect against inbound and outbound threats.
  • Content control (Windows workstations only): Content control allows administrators to define traffic scan options and schedule web access while blocking or allowing certain web categories or URLs. They can also configure data protection rules and define permissions for the use of specific applications.
  • Device control (Windows desktop and server operating systems only): Device control applies security policies to devices attached to endpoints. It prevents data leakage and malware infections that can result from using USB flash drives, Bluetooth devices, CD or DVD players, storage devices, and so on.

 

Additional Users

If your organization requires more than 10 users on a single network, TechSoup also offers GravityZone Business Security for 25 users and 50 users.

If your organization requires more than 50 users on a single network, please contact Bitdefender directly.

You cannot add more users once you have installed this product on your network. You can request a product with more users and install it, but it will replace the product that you previously installed. You will not receive a refund for the previous product.

 

Existing Subscribers

Current subscribers to GravityZone Business Security or Bitdefender Small Office Security can use this donation to add another year of protection. Small Office Security users will need to upgrade to GravityZone. After the upgrade, only 3 of the protected devices can be servers or Linux machines.

 

Choose Carefully

The administrative fee for this product is not refundable, and the product cannot be exchanged. Please be sure that you have requested a subscription that will cover all the users on your network.

 

Obtaining This Product

When TechSoup approves your donation request, we will send a message to your organization email address with instructions for obtaining and activating this product.

Requirements: 
  • See the system requirements at the bottom of this GravityZone Business Security page.
  • Bitdefender cannot run alongside other antivirus programs. In order to use Bitdefender, you must first uninstall them.
Restrictions: 
6 SGD
Symantec current pic.jpg



Description: 

Symantec Endpoint Protection Small Business Edition is security software that protects networked laptops, desktops, and servers ("endpoints"). It defends against viruses, worms, Trojan horses, spyware, adware, rootkits, and threats not seen before ("zero-day attacks"). This product is most suitable for organizations with between 5 and 100 endpoints.

This donation provides a one-year subscription for use of the product on a single endpoint. The subscription includes protection updates and new product features.

Benefits for Organizations:

If you have network administration experience, you can use Symantec Endpoint Protection to:

  • Centrally manage protection for all the endpoints in your organization's network
  • Manage endpoints from anywhere and minimize maintenance costs through cloud-based management rather than installing software locally on a management server

Major Capabilities:

Symantec Endpoint Protection Small Business Edition incorporates many of the technologies of the standard Endpoint Protection application, all manageable through a single console:

  • Cloud-based or on-premises management:Network administrators have the option to manage endpoint protection through a web browser using a cloud management service or through a locally managed deployment on a server. Note that if you have any endpoints running Mac OS X, you cannot use cloud-based management.
  • Antivirus and antispyware:Endpoint Protection scans for both viruses and security risks.
  • Desktop firewall:The firewall prevents unauthorized users from accessing the computers and the networks that connect to the Internet.
  • Intrusion prevention:The intrusion prevention system (IPS) acts as a second layer of network defense after the firewall.
  • Proactive threat scanning: This scan analyzes the behavior of an application or process to determine if it exhibits characteristics of threats.

The Small Business Edition does not include device control or application control technologies, which are more suited to larger organizations.

Support, Renewals, and Upgrades:

This product is identical to the version sold through the Symantec website and includes the standard support, renewal, and upgrade options available with retail products.

Choose Carefully:

The administrative fee for this product is not refundable, and the product cannot be exchanged.

Obtaining This Product:

Expect two emails. When TechSoup approves your donation request, we will send a message to your organization email address with preliminary information about obtaining this product.

Shortly after, the donor partner Symantec will send an email with information needed to complete the installation or and activation. This email will include a serial number certificate as a PDF file and and a license file in zip form. If your organization uses a firewall, be sure it is configured to accept files from symantec.com.

Requirements: 

Endpoint Protection consists of client software that runs on the endpoints and management software that runs on a cloud-based or local server.

Cloud Management Service Option

Client workstations:

Hardware:

  • 300-MHz processor for Windows XP; 1-GHz processor for Windows Vista or later
  • 256 MB or more RAM
  • 300 MB available hard-disk space

Software:

  • Windows XP with SP2 or later (32-bit only); Windows Vista with SP1 or later; Windows 7; Windows 8

Client servers:

Hardware:

  • 1-GHz or higher Pentium III processor (32-bit); 2-GHz or higher Pentium 4 processor with x86-64 support (64-bit); Itanium processors not supported
  • 512 MB or more RAM; 1 GB recommended
  • 700 MB available hard-disk space

Software:

  • Windows Server 2003; Windows Small Business Server 2003; Windows Server 2008; Windows Small Business Server 2008; Windows Small Business Server 2011; Windows Essential Business Server 2008

 

On-Premises Management Service Option

Client workstations and servers:

Hardware for Windows:

  • 1-GHz or higher Pentium III processor (32-bit); 2-GHz or Pentium 4 processor with x86-64 support (64-bit); Itanium processors are not supported

Software for Windows:

  • Windows XP Home or Professional with SP2 or later (32-bit); Windows XP Home or Professional with any SP (64-bit); Windows XP Embedded with SP3 or later; Windows Vista; Windows 7; Windows Embedded Standard 7; Windows Server 2003; Windows Small Business Server 2003; Windows Server 2008; Windows Small Business Server 2008; Windows Essential Business Server 2008; Windows Small Business Server 2011; Windows 8; Windows Server 2012

Hardware for Mac:

  • Core Solo or Core Duo processor (32-bit); Core 2 Duo or Quad-Core Xeon processor (64-bit); PowerPC processors not supported
  • 512 MB or more RAM; 1 GB recommended
  • 700 MB or more available hard-disk space

Software for Mac:

·          Mac OS X v10.5 to v10.7; Mac OS X Server v10.5 to v10.7

Management server:

Hardware:

  • 1-GHz or higher Pentium III processor, Pentium 4 recommended (32-bit); 2-GHz Pentium 4 processor with x86-64 support (64-bit)
  • 1 GB or more RAM (32-bit); 2 GB or more RAM (64-bit)
  • 8 GB or more available hard-disk space

Software:

  • Windows XP Professional with SP3 or later; Windows Server 2003 with SP1 or later; Windows Small Business Server 2003; Windows Server 2008; Windows Small Business Server 2008; Windows Essential Business Server 2008; Windows 7 (all editions except Home); Windows Small Business Server 2011; Windows Server 2012; Windows 8
Donor & Discount Partners:
Language:
Media:
Platform:
7 SGD
Symantec Vertical logo



Description: 

Symantec Mail Security for Microsoft Exchange combines antivirus and anti-spam technologies with flexible content filtering. It can be used with Exchange Server 2007, 2010, 2013 or 2016.

This donation includes a one-year subscription for use of the product, protection updates, and new product features. This product does NOT contain Microsoft Exchange software.

Benefits for Organisations:

You can use Symantec Mail Security to:

  • Protect your organisation against security threats and malware transmitted through email
  • Better guard against annoying and harmful junk mail and spam

Major Capabilities:

  • Antivirus technologies:
    • Scans both inbound and outbound email, including attachments, before any other process or client application takes effect.
    • Detects viruses, worms, Trojan horses, spyware, phishing, and denial of service attacks and acts on them according to policies specified by administrators.
    • Allows administrators to develop a whitelist of trusted senders and recipients.
    • Automatically updates virus definitions.
  • Spam protection: Stops 99 percent of spam (unwanted bulk email).
  • Content filtering: Filters and block inappropriate content as well as confidential information in both inbound and outbound messages. The customizable filter can examine attachment names, attachment content, specific words, phrases, subject lines, and senders.
  • Management console: Allows centralized management of multiple Exchange servers or just one. Administrators can manage server group policy configuration, notifications, alerts, and reporting. The console does not have to be installed on a computer that is running Mail Security.
  • Reports: Allows creation of reports for individual servers or summary reports that consolidate data from all servers within a group.

NFR Version:

The version of this product available through TechSoup is the Not for Resale (NFR) version. You cannot upgrade NFR products to new releases. If you are seeking a new release, you will need to request a new donation through TechSoup. In addition, NFR products do not include telephone assistance with product issues or add-ons; however, free online technical support is available at Symantec's website through its knowledge bases and discussion forums.

Choose Carefully:

The administrative fee for this product is not refundable, and the product cannot be exchanged.

Obtaining This Product:

Expect two emails. When TechSoup approves your donation request, we will send a message to your organization email address with preliminary information about obtaining this product.

Shortly after, the donor partner Symantec will send an email with information needed to complete the installation or and activation. This email will include a serial number certificate as a PDF file and and a license file in zip form. If your organization uses a firewall, be sure it is configured to accept files from symantec.com.

9 SGD
Untitled design.jpg



Description: 

Symantec Endpoint Protection 14.1 protects networked laptops, desktops, and servers ("endpoints") against viruses, worms, Trojan horses, spyware, adware, rootkits, and threats not seen before ("zero-day attacks"). It consists of client software that runs on the endpoints and management software that runs on a server. This product is most suitable for organizations with 100 or more endpoints.

This donation includes a one-year subscription for use of the product, protection updates, and new product features.

 

Benefits for Organizations:

If you have network administration experience, you can use Symantec Endpoint Protection to centrally manage protection for all the endpoints in your organization's network.

 

Major Capabilities

Symantec Endpoint Protection combines several Symantec technologies, all manageable through a single console.

  • Multilayered protection: Endpoint Protection analyzes the attributes, behavior, and reputation of potential malware files. It also provides a system firewall and prevents intrusions and exploits.
  • Artificial intelligence and machine learning: The product deploys machine learning on both the endpoint and in the cloud and adds artificial intelligence mechanisms in the cloud. Symantec collects threat insights from over 175 million endpoints and 57 million attack sensors.
  • Device control: Endpoint Protection blocks or allows access from devices, such as connections through USB, infrared, FireWire, SCSI, serial ports, and parallel ports
  • Application control: This feature blocks or allows applications that try to access system resources
  • Turnable security: Administrators can tune the level of detection and blocking to optimize protection and gain enhanced visibility into suspicious files. They can do this through a cloud console that integrates with the on-premises SEP manager.
  • Small footprint: Cloud lookup capabilities reduce bandwidth usage and the size of definition files 70 percent over the previous generation.

Learn more about Symantec Endpoint Protection 14.1.

 

Support and Renewals

This product includes 12 months of support. You are entitled to update to the latest version of the product, including regular definition updates.

You may renew your subscription by requesting another product through TechSoup each year before the subscription expires.

 

Choose Carefully

The administrative fee for this downloaded product is not refundable.

 

Obtaining this Product

Expect two emails. When TechSoup approves your donation request, we will send a message to your organization email address with preliminary information about obtaining this product.

Shortly after, the donor partner Symantec will send an email with information needed to complete the installation or and activation. This email will include a serial number certificate as a PDF file and and a license file in zip form. If your organization uses a firewall, be sure it is configured to accept files from symantec.com.

This donation includes a one-year subscription for use of the product, protection updates, and new product features. 

Requirements: 

Symantec Endpoint Protection Client (32-Bit and 64-Bit):

  • Windows 2000 Professional, Server, Advanced Server, Datacenter Server, Small Business Server SP3 or later; Windows XP Home, Tablet PC, Media Center, Professional SP1 or later; Windows Vista Home Basic, Home Premium, Business, Enterprise, Ultimate, 32-bit or x64 edition; Windows Server 2003 Standard, Enterprise, Datacenter, Storage, Web, Cluster, Small Business Server, 32-bit or x64 edition
  • For Terminal Server clients connecting to a computer with antivirus protection — Microsoft Terminal Server RDP client; Citrix Metaframe (ICA) client 1.8 or later
  • 256 MB or more RAM
  • 600 MB available hard-disk space (32-bit)
  • 700 MB available hard-disk space (64-bit)
  • 1024x768-pixel (or higher) display
  • Internet Explorer 6.0 or later

Symantec Endpoint Protection Manager (32-Bit and 64-Bit):

  • Windows 2000 Professional, Server, Advanced Server, Datacenter Server, Small Business Server SP3 or later; Windows XP Professional SP1 or later, 32-bit edition or x64 edition; Windows Server 2003 Standard, Enterprise, Datacenter, Storage, Web, Cluster, Small Business Server, 32-bit edition or x64 edition
  • Internet Information Services server 5.0 (or later) with World Wide Web services enabled
  • 1 GB or more RAM; 2 – 4 GB recommended
  • 4 GB available hard-disk space for the server plus an additional 4 GB for the database
  • 1024x768-pixel (or higher) display
  • Internet Explorer 6.0 or later
  • Static IP address recommended

Symantec Endpoint Protection Management Console:

  • Windows 2000 SP3 or later; Windows XP; Windows Vista; Windows Server 2003
  • JRE 5.0; Update 13 or greater recommended
  • 512 MB or more RAM; 1 GB recommended
  • 40 MB available hard-disk space
  • 1024x768-pixel (or higher) display
  • Internet Explorer 6.0 or later

If you determine that your network requires a central location for all quarantined files, you can install the Quarantine Server and the Quarantine Console. See their system requirements on the Symantec Web site.

Syndicate content