SlideShare a Scribd company logo
Highlights from the TechSoup Catalog
Asana, Endpoint Protection for Nonprofits, and Pledge 1%
Baily Maples, Whittney Tom, Barbara Shaughnessy
Strategic Partnerships
February 2020
2
Asana for Nonprofits
Baily Maples, Program Manager, TechSoup
bmaples@techsoup.org
. © TechSoup Global | All rights reserved3
• Asana is a work management solution
• Collaboration tool that aligns communication,
content, and coordination into one space
Asana: What is it?
Communication Content Coordination
Collaboration
. © TechSoup Global | All rights reserved4
Asana Plans
. © TechSoup Global | All rights reserved5
Asana: There’s a template!
$10.1B
in technology products
and grants employed by
NGOs for the greater
good
39
languages to provide
education and
support
79%
of NGOs have improved
organizational efficiency
with TechSoup’s resource
offering
● Planning a digital fundraiser
● In-Person fundraising event
● Grant tracking
● Board meetings
● Content calendar
● So many more!
. © TechSoup Global | All rights reserved6
Asana: Other Resources
$10.1B
in technology products
and grants employed by
NGOs for the greater
good
39
languages to provide
education and
support
79%
of NGOs have improved
organizational efficiency
with TechSoup’s resource
offering
● Asana Advisors
● Community Events
● On-Demand and Live Webinars
● Nonprofit Forums
● Nonprofit Case Studies
Questions?
8
Security for Nonprofits:
Endpoint Protection
NortonLifeLock
Antivirus solutions for
organizations needing to
protect less than 20 devices
Bitdefender
Antivirus, internet security,
and mobile device security for
up to 50 devices
. © TechSoup Global | All rights reserved9
Infrastructure and Data Security
Azure, AWS, Microsoft Servers, VMware, data backup and recovery
(Veritas), Endpoint Protection
People Security
KnowBe4 Cybersecurity Assessment and Training, TechSoup Digital Security
Bundle Courses, (policies and procedures, 12 steps to safer internet for
nonprofits and 5 steps to cloud security articles)
TechSoup Security Offers Framework
Source: Johns Hopkins University
End User Tools: Data
Management and Use
Storage and productivity software:
O365, Box, DocuSign, Adobe
memberships, Google Drive, DropBox
. © TechSoup Global | All rights reserved10
Web attacks on endpoints increased by 56 percent in 2018
(Internet Security Threat Report, 2019)
Some of the most sophisticated data breaches occur because of simple software
updates and patch maintenance. Don’t be that person...
Products
Norton Security Deluxe (up to 5 devices): You need to protect computers,
tablets, and smartphones against the latest online threats and want tools for
tuning up systems. This product does most of its work in the background while
consuming few system resources and requiring little user interaction.
Norton Small Business (5, 10, 20 devices): You need to protect laptops,
desktops, and mobile devices) and you need the ability to centrally or remotely
manage the security on these devices.
NortonLifeLock
. © TechSoup Global | All rights reserved11
• 24/7 threat protection: Combines several defense and antivirus
technologies based on networks, files, reputation, and behavior.
• Mobile Insight: Checks apps for potential privacy risks, high battery and
data use, and intrusive behavior.
• Mobile device location: Remotely locates lost or stolen devices, locks
them, and wipes them.
• Password management: Remembers, secures, and automatically enters
usernames and passwords; generates new passwords. (Windows only)
• *Only Norton Small Business* - Centralized management: The Norton
Management web portal allows you to view the status of all devices, invite
users to install the product, and fix some security issues remotely.
NortonLifeLock Product Capabilities
. © TechSoup Global | All rights reserved12
Comparing NortonLifeLock Products
Check out our guide here:
https://www.techsoup.org/support/articles-and-how-tos/norton-protection-which-one-is-best
. © TechSoup Global | All rights reserved13
Products
• Bitdefender Antivirus (: Protection
against viruses, spyware, and other
online threats for 1, 3, or 5 Macs
• Bitdfender Internet Security:
Protection against viruses, spyware,
spam, and other risks for up to 1, 3,
and 5 WIndows PCs
• Bitdefender GravityZone Business
Security: Protection for networked
laptops, desktops, servers, and virtual
machines from viruses, worms, Trojan
horses, spyware, adware, rootkits, and
other threats. Network protection is
managed through a central console.
Bitdefender for Nonprofits
. © TechSoup Global | All rights reserved14
Major Capabilities
● Management console: The console, or Control Center, is deployed as an appliance that runs in a virtualized
environment. Control Center provides full visibility into the organization's overall security posture, insight into global
security threats, and control over its security services. When you activate the product, you choose one of two types
of console.
○ Cloud: Bitdefender hosts this console, and the administrator connects to it with a web browser.
○ On-premises: You deploy this console as an appliance that runs in a virtualized environment in your
organization's own infrastructure. You should choose this type only if you have experience with virtualized
environments.
● Antivirus and antispyware
● Behavior-based protection: Security for Endpoints stops emerging threats by analyzing the behavior of a given
program or process in a virtual environment before it is executed.
● Desktop firewall (Windows workstations only): The firewall prevents unauthorized users from accessing users'
computers when roaming or working remotely using unsecured networks.
● Content control (Windows workstations only): Content control allows administrators to define traffic scan options
and schedule web access while blocking or allowing certain web categories or URLs. They can also configure data
protection rules and define permissions for the use of specific applications.
Bitdefender GravityZone
. © TechSoup Global | All rights reserved15
Your staff are your first line of defense!
1. Train and raise awareness with your staff about
cybersecurity vulnerabilities and risks
2. Take inventory of what you need to protect
3. Protect what you can and manage access
Remember to not stop at an antivirus solution!
Questions?
17
Pledge 1%
Barb Shaughnessy
Director, Strategic Partnerships
bshaughnessy@techsoup.org
. © TechSoup Global | All rights reserved18
Pledge 1%
Building a Movement of Corporate Philanthropy
1% 1%1%
Product People Profit/
Equity
Who Takes
the Pledge?
. © TechSoup Global | All rights reserved20
Corporations, Social Enterprises, NGO’s
• Culture of Giving Back
• Crosses Multiple Industries
• Many are Early Stage Startups
(Disruptors)
• Funded by Salesforce or Founders with
Salesforce Background
• Dedicated to Local Community
Engagement
• Employee Recruitment and Retention
• Strong Diversity & Inclusion Programs
• Millennial Workforce
• Impact vs Responsibility
• Are You Ready?!
https://pledge1percent.org/
T
TechSoup
Pledge 1%
Partners
. © TechSoup Global | All rights reserved22
TechSoup.org Product Catalog
. © TechSoup Global | All rights reserved23
NetSquared Engagement Opportunities
with Pledge 1% Companies
● Event Space & Sponsorship
● Product Demos
● Product Discounts/Donations
● Schwag!
● Conference Passes
● Employee Volunteers/Pro
Bono Support
● Customer/Employee Events
● Employment
● Social Impact Best Practices
● Pledge 1% Program
Overviews
Questions?
25
Thank You!!!

More Related Content

What's hot

Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
Dr. Ahmed Al Zaidy
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowRoger Hagedorn
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security Trends
Terra Verde
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
Chinatu Uzuegbu
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
Webroot Antivirus Web Security
Webroot Antivirus Web Security Webroot Antivirus Web Security
Webroot Antivirus Web Security
Andrew Close
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
Ernest Staats
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
Enterprise Management Associates
 
Core_Network_Insight
Core_Network_InsightCore_Network_Insight
Core_Network_InsightTim Bell
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
Priyanka Aash
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
APNIC
 
Cultivating security in the small nonprofit
Cultivating security in the small nonprofitCultivating security in the small nonprofit
Cultivating security in the small nonprofit
Roger Hagedorn
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirt
vngundi
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
Tripwire
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
NetIQ
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 

What's hot (20)

Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security Trends
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Webroot Antivirus Web Security
Webroot Antivirus Web Security Webroot Antivirus Web Security
Webroot Antivirus Web Security
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
Core_Network_Insight
Core_Network_InsightCore_Network_Insight
Core_Network_Insight
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Building CSIRT and its competency
Building CSIRT and its competencyBuilding CSIRT and its competency
Building CSIRT and its competency
 
Cultivating security in the small nonprofit
Cultivating security in the small nonprofitCultivating security in the small nonprofit
Cultivating security in the small nonprofit
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirt
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 

Similar to Highlights from the TechSoup Catalog [webinar slides]

Security stronghold presentation smart uac
Security stronghold presentation   smart uacSecurity stronghold presentation   smart uac
Security stronghold presentation smart uacw_harker
 
Security stronghold presentation smart uac
Security stronghold presentation   smart uacSecurity stronghold presentation   smart uac
Security stronghold presentation smart uacw_harker
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
TechSoup
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
SolarWinds
 
7 Things Your Nonprofit Can Do to Get the Most out of Your Website in 2020
7 Things Your Nonprofit Can Do to Get the Most out of Your Website in 20207 Things Your Nonprofit Can Do to Get the Most out of Your Website in 2020
7 Things Your Nonprofit Can Do to Get the Most out of Your Website in 2020
TechSoup
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 
Anti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsAnti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsUltraUploader
 
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
Marcel Hoffmann
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
SolarWinds
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
Cloudera, Inc.
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
ssusera76ea9
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Executive Leaders Network
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
SecPod Technologies
 
Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentationDarshan Khant
 
Efficient Management of Your Technology Devices.pdf
Efficient Management of Your Technology Devices.pdfEfficient Management of Your Technology Devices.pdf
Efficient Management of Your Technology Devices.pdf
TechSoup
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
abe8512000
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
Mohd Anwar Jamal Faiz
 

Similar to Highlights from the TechSoup Catalog [webinar slides] (20)

Security stronghold presentation smart uac
Security stronghold presentation   smart uacSecurity stronghold presentation   smart uac
Security stronghold presentation smart uac
 
Security stronghold presentation smart uac
Security stronghold presentation   smart uacSecurity stronghold presentation   smart uac
Security stronghold presentation smart uac
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
7 Things Your Nonprofit Can Do to Get the Most out of Your Website in 2020
7 Things Your Nonprofit Can Do to Get the Most out of Your Website in 20207 Things Your Nonprofit Can Do to Get the Most out of Your Website in 2020
7 Things Your Nonprofit Can Do to Get the Most out of Your Website in 2020
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Anti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documentsAnti spyware coalition definitions and supporting documents
Anti spyware coalition definitions and supporting documents
 
OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentation
 
Efficient Management of Your Technology Devices.pdf
Efficient Management of Your Technology Devices.pdfEfficient Management of Your Technology Devices.pdf
Efficient Management of Your Technology Devices.pdf
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 

More from NetSquared

#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
NetSquared
 
Nonprofit Tech Club Austin - Maximizing Tech to Save Money
Nonprofit Tech Club Austin - Maximizing Tech to Save MoneyNonprofit Tech Club Austin - Maximizing Tech to Save Money
Nonprofit Tech Club Austin - Maximizing Tech to Save Money
NetSquared
 
Digital Accessibility: Introduction to Law and Process
Digital Accessibility: Introduction to Law and ProcessDigital Accessibility: Introduction to Law and Process
Digital Accessibility: Introduction to Law and Process
NetSquared
 
NPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden Gems
NPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden GemsNPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden Gems
NPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden Gems
NetSquared
 
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit EventsNPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NetSquared
 
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit EventsNPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NetSquared
 
NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...
NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...
NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...
NetSquared
 
NPTechClubATX: Social Media During Emergencies
NPTechClubATX: Social Media During EmergenciesNPTechClubATX: Social Media During Emergencies
NPTechClubATX: Social Media During Emergencies
NetSquared
 
NPTechClubATX: Transforming Board Management
NPTechClubATX: Transforming Board ManagementNPTechClubATX: Transforming Board Management
NPTechClubATX: Transforming Board Management
NetSquared
 
NPTechClubATX: Getting Out of the Alligator Pit
NPTechClubATX: Getting Out of the Alligator PitNPTechClubATX: Getting Out of the Alligator Pit
NPTechClubATX: Getting Out of the Alligator Pit
NetSquared
 
NPTechClubATX - Engaging Communities of Color
NPTechClubATX - Engaging Communities of ColorNPTechClubATX - Engaging Communities of Color
NPTechClubATX - Engaging Communities of Color
NetSquared
 
Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...
Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...
Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...
NetSquared
 
Social Engineering 101: Don't Get Manipulated by Attackers
Social Engineering 101: Don't Get Manipulated by AttackersSocial Engineering 101: Don't Get Manipulated by Attackers
Social Engineering 101: Don't Get Manipulated by Attackers
NetSquared
 
NetSquared Athens: Everything You Always Wanted to Know About Tech and Nonprofit
NetSquared Athens: Everything You Always Wanted to Know About Tech and NonprofitNetSquared Athens: Everything You Always Wanted to Know About Tech and Nonprofit
NetSquared Athens: Everything You Always Wanted to Know About Tech and Nonprofit
NetSquared
 
Community Isn't Cancelled — Q3 FY20 NetSquared Report
Community Isn't Cancelled —  Q3 FY20 NetSquared ReportCommunity Isn't Cancelled —  Q3 FY20 NetSquared Report
Community Isn't Cancelled — Q3 FY20 NetSquared Report
NetSquared
 
How NGOs and Charities Can Implement Budget Video Conference Software
How NGOs and Charities Can Implement Budget Video Conference SoftwareHow NGOs and Charities Can Implement Budget Video Conference Software
How NGOs and Charities Can Implement Budget Video Conference Software
NetSquared
 
Desire seyram sackitey — NetSquared productivity tools and tips for non pro...
Desire seyram sackitey —  NetSquared  productivity tools and tips for non pro...Desire seyram sackitey —  NetSquared  productivity tools and tips for non pro...
Desire seyram sackitey — NetSquared productivity tools and tips for non pro...
NetSquared
 
NetSquared Report: July 1 - December 31 2019
NetSquared Report: July 1 - December 31 2019NetSquared Report: July 1 - December 31 2019
NetSquared Report: July 1 - December 31 2019
NetSquared
 
Tech4goodPGH – Rapid Prototyping Workshop
Tech4goodPGH – Rapid Prototyping WorkshopTech4goodPGH – Rapid Prototyping Workshop
Tech4goodPGH – Rapid Prototyping Workshop
NetSquared
 
NetSquared Quarterly Report: January 1 – March 31 2019
NetSquared Quarterly Report: January 1 – March 31 2019NetSquared Quarterly Report: January 1 – March 31 2019
NetSquared Quarterly Report: January 1 – March 31 2019
NetSquared
 

More from NetSquared (20)

#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
#NPTechClubATX: 5G: What Is It and Why Is It a Game Changer?
 
Nonprofit Tech Club Austin - Maximizing Tech to Save Money
Nonprofit Tech Club Austin - Maximizing Tech to Save MoneyNonprofit Tech Club Austin - Maximizing Tech to Save Money
Nonprofit Tech Club Austin - Maximizing Tech to Save Money
 
Digital Accessibility: Introduction to Law and Process
Digital Accessibility: Introduction to Law and ProcessDigital Accessibility: Introduction to Law and Process
Digital Accessibility: Introduction to Law and Process
 
NPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden Gems
NPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden GemsNPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden Gems
NPTechClubATX: Prospecting - Reviewing Your Own Databases for Hidden Gems
 
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit EventsNPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
 
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit EventsNPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
NPTechClubATX: 7 Simple Secrets to Successful Nonprofit Events
 
NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...
NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...
NPTechClubATX: Engaging Communities of Color with Gabryella Desporte of Latin...
 
NPTechClubATX: Social Media During Emergencies
NPTechClubATX: Social Media During EmergenciesNPTechClubATX: Social Media During Emergencies
NPTechClubATX: Social Media During Emergencies
 
NPTechClubATX: Transforming Board Management
NPTechClubATX: Transforming Board ManagementNPTechClubATX: Transforming Board Management
NPTechClubATX: Transforming Board Management
 
NPTechClubATX: Getting Out of the Alligator Pit
NPTechClubATX: Getting Out of the Alligator PitNPTechClubATX: Getting Out of the Alligator Pit
NPTechClubATX: Getting Out of the Alligator Pit
 
NPTechClubATX - Engaging Communities of Color
NPTechClubATX - Engaging Communities of ColorNPTechClubATX - Engaging Communities of Color
NPTechClubATX - Engaging Communities of Color
 
Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...
Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...
Net2 Toronto: Digital Donor Acquisition — Tips, Tricks, Pitfalls & Problem-So...
 
Social Engineering 101: Don't Get Manipulated by Attackers
Social Engineering 101: Don't Get Manipulated by AttackersSocial Engineering 101: Don't Get Manipulated by Attackers
Social Engineering 101: Don't Get Manipulated by Attackers
 
NetSquared Athens: Everything You Always Wanted to Know About Tech and Nonprofit
NetSquared Athens: Everything You Always Wanted to Know About Tech and NonprofitNetSquared Athens: Everything You Always Wanted to Know About Tech and Nonprofit
NetSquared Athens: Everything You Always Wanted to Know About Tech and Nonprofit
 
Community Isn't Cancelled — Q3 FY20 NetSquared Report
Community Isn't Cancelled —  Q3 FY20 NetSquared ReportCommunity Isn't Cancelled —  Q3 FY20 NetSquared Report
Community Isn't Cancelled — Q3 FY20 NetSquared Report
 
How NGOs and Charities Can Implement Budget Video Conference Software
How NGOs and Charities Can Implement Budget Video Conference SoftwareHow NGOs and Charities Can Implement Budget Video Conference Software
How NGOs and Charities Can Implement Budget Video Conference Software
 
Desire seyram sackitey — NetSquared productivity tools and tips for non pro...
Desire seyram sackitey —  NetSquared  productivity tools and tips for non pro...Desire seyram sackitey —  NetSquared  productivity tools and tips for non pro...
Desire seyram sackitey — NetSquared productivity tools and tips for non pro...
 
NetSquared Report: July 1 - December 31 2019
NetSquared Report: July 1 - December 31 2019NetSquared Report: July 1 - December 31 2019
NetSquared Report: July 1 - December 31 2019
 
Tech4goodPGH – Rapid Prototyping Workshop
Tech4goodPGH – Rapid Prototyping WorkshopTech4goodPGH – Rapid Prototyping Workshop
Tech4goodPGH – Rapid Prototyping Workshop
 
NetSquared Quarterly Report: January 1 – March 31 2019
NetSquared Quarterly Report: January 1 – March 31 2019NetSquared Quarterly Report: January 1 – March 31 2019
NetSquared Quarterly Report: January 1 – March 31 2019
 

Recently uploaded

RFP for Reno's Community Assistance Center
RFP for Reno's Community Assistance CenterRFP for Reno's Community Assistance Center
RFP for Reno's Community Assistance Center
This Is Reno
 
State crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public financesState crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public finances
ResolutionFoundation
 
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHOMonitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Christina Parmionova
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
Invitation Letter for an alumni association
Invitation Letter for an alumni associationInvitation Letter for an alumni association
Invitation Letter for an alumni association
elmerdalida001
 
2024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 392024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 39
JSchaus & Associates
 
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
Congressional Budget Office
 
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
OECDregions
 
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
johnmarimigallon
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
Donate to charity during this holiday season
Donate to charity during this holiday seasonDonate to charity during this holiday season
Donate to charity during this holiday season
SERUDS INDIA
 
About Potato, The scientific name of the plant is Solanum tuberosum (L).
About Potato, The scientific name of the plant is Solanum tuberosum (L).About Potato, The scientific name of the plant is Solanum tuberosum (L).
About Potato, The scientific name of the plant is Solanum tuberosum (L).
Christina Parmionova
 
Transit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group MeetingTransit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group Meeting
Cuyahoga County Planning Commission
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
AjayVejendla3
 
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC CharlotteA Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
University of North Carolina at Charlotte
 
2024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 382024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 38
JSchaus & Associates
 
A guide to the International day of Potatoes 2024 - May 30th
A guide to the International day of Potatoes 2024 - May 30thA guide to the International day of Potatoes 2024 - May 30th
A guide to the International day of Potatoes 2024 - May 30th
Christina Parmionova
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
ARCResearch
 
A proposed request for information on LIHTC
A proposed request for information on LIHTCA proposed request for information on LIHTC
A proposed request for information on LIHTC
Roger Valdez
 

Recently uploaded (20)

RFP for Reno's Community Assistance Center
RFP for Reno's Community Assistance CenterRFP for Reno's Community Assistance Center
RFP for Reno's Community Assistance Center
 
State crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public financesState crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public finances
 
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHOMonitoring Health for the SDGs - Global Health Statistics 2024 - WHO
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHO
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
Invitation Letter for an alumni association
Invitation Letter for an alumni associationInvitation Letter for an alumni association
Invitation Letter for an alumni association
 
2024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 392024: The FAR - Federal Acquisition Regulations, Part 39
2024: The FAR - Federal Acquisition Regulations, Part 39
 
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
CBO’s Outlook for U.S. Fertility Rates: 2024 to 2054
 
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...
 
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
2017 Omnibus Rules on Appointments and Other Human Resource Actions, As Amended
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
Donate to charity during this holiday season
Donate to charity during this holiday seasonDonate to charity during this holiday season
Donate to charity during this holiday season
 
About Potato, The scientific name of the plant is Solanum tuberosum (L).
About Potato, The scientific name of the plant is Solanum tuberosum (L).About Potato, The scientific name of the plant is Solanum tuberosum (L).
About Potato, The scientific name of the plant is Solanum tuberosum (L).
 
Transit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group MeetingTransit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group Meeting
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
 
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC CharlotteA Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
A Guide to AI for Smarter Nonprofits - Dr. Cori Faklaris, UNC Charlotte
 
2024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 382024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 38
 
A guide to the International day of Potatoes 2024 - May 30th
A guide to the International day of Potatoes 2024 - May 30thA guide to the International day of Potatoes 2024 - May 30th
A guide to the International day of Potatoes 2024 - May 30th
 
Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023Opinions on EVs: Metro Atlanta Speaks 2023
Opinions on EVs: Metro Atlanta Speaks 2023
 
A proposed request for information on LIHTC
A proposed request for information on LIHTCA proposed request for information on LIHTC
A proposed request for information on LIHTC
 

Highlights from the TechSoup Catalog [webinar slides]

  • 1. Highlights from the TechSoup Catalog Asana, Endpoint Protection for Nonprofits, and Pledge 1% Baily Maples, Whittney Tom, Barbara Shaughnessy Strategic Partnerships February 2020
  • 2. 2 Asana for Nonprofits Baily Maples, Program Manager, TechSoup bmaples@techsoup.org
  • 3. . © TechSoup Global | All rights reserved3 • Asana is a work management solution • Collaboration tool that aligns communication, content, and coordination into one space Asana: What is it? Communication Content Coordination Collaboration
  • 4. . © TechSoup Global | All rights reserved4 Asana Plans
  • 5. . © TechSoup Global | All rights reserved5 Asana: There’s a template! $10.1B in technology products and grants employed by NGOs for the greater good 39 languages to provide education and support 79% of NGOs have improved organizational efficiency with TechSoup’s resource offering ● Planning a digital fundraiser ● In-Person fundraising event ● Grant tracking ● Board meetings ● Content calendar ● So many more!
  • 6. . © TechSoup Global | All rights reserved6 Asana: Other Resources $10.1B in technology products and grants employed by NGOs for the greater good 39 languages to provide education and support 79% of NGOs have improved organizational efficiency with TechSoup’s resource offering ● Asana Advisors ● Community Events ● On-Demand and Live Webinars ● Nonprofit Forums ● Nonprofit Case Studies
  • 8. 8 Security for Nonprofits: Endpoint Protection NortonLifeLock Antivirus solutions for organizations needing to protect less than 20 devices Bitdefender Antivirus, internet security, and mobile device security for up to 50 devices
  • 9. . © TechSoup Global | All rights reserved9 Infrastructure and Data Security Azure, AWS, Microsoft Servers, VMware, data backup and recovery (Veritas), Endpoint Protection People Security KnowBe4 Cybersecurity Assessment and Training, TechSoup Digital Security Bundle Courses, (policies and procedures, 12 steps to safer internet for nonprofits and 5 steps to cloud security articles) TechSoup Security Offers Framework Source: Johns Hopkins University End User Tools: Data Management and Use Storage and productivity software: O365, Box, DocuSign, Adobe memberships, Google Drive, DropBox
  • 10. . © TechSoup Global | All rights reserved10 Web attacks on endpoints increased by 56 percent in 2018 (Internet Security Threat Report, 2019) Some of the most sophisticated data breaches occur because of simple software updates and patch maintenance. Don’t be that person... Products Norton Security Deluxe (up to 5 devices): You need to protect computers, tablets, and smartphones against the latest online threats and want tools for tuning up systems. This product does most of its work in the background while consuming few system resources and requiring little user interaction. Norton Small Business (5, 10, 20 devices): You need to protect laptops, desktops, and mobile devices) and you need the ability to centrally or remotely manage the security on these devices. NortonLifeLock
  • 11. . © TechSoup Global | All rights reserved11 • 24/7 threat protection: Combines several defense and antivirus technologies based on networks, files, reputation, and behavior. • Mobile Insight: Checks apps for potential privacy risks, high battery and data use, and intrusive behavior. • Mobile device location: Remotely locates lost or stolen devices, locks them, and wipes them. • Password management: Remembers, secures, and automatically enters usernames and passwords; generates new passwords. (Windows only) • *Only Norton Small Business* - Centralized management: The Norton Management web portal allows you to view the status of all devices, invite users to install the product, and fix some security issues remotely. NortonLifeLock Product Capabilities
  • 12. . © TechSoup Global | All rights reserved12 Comparing NortonLifeLock Products Check out our guide here: https://www.techsoup.org/support/articles-and-how-tos/norton-protection-which-one-is-best
  • 13. . © TechSoup Global | All rights reserved13 Products • Bitdefender Antivirus (: Protection against viruses, spyware, and other online threats for 1, 3, or 5 Macs • Bitdfender Internet Security: Protection against viruses, spyware, spam, and other risks for up to 1, 3, and 5 WIndows PCs • Bitdefender GravityZone Business Security: Protection for networked laptops, desktops, servers, and virtual machines from viruses, worms, Trojan horses, spyware, adware, rootkits, and other threats. Network protection is managed through a central console. Bitdefender for Nonprofits
  • 14. . © TechSoup Global | All rights reserved14 Major Capabilities ● Management console: The console, or Control Center, is deployed as an appliance that runs in a virtualized environment. Control Center provides full visibility into the organization's overall security posture, insight into global security threats, and control over its security services. When you activate the product, you choose one of two types of console. ○ Cloud: Bitdefender hosts this console, and the administrator connects to it with a web browser. ○ On-premises: You deploy this console as an appliance that runs in a virtualized environment in your organization's own infrastructure. You should choose this type only if you have experience with virtualized environments. ● Antivirus and antispyware ● Behavior-based protection: Security for Endpoints stops emerging threats by analyzing the behavior of a given program or process in a virtual environment before it is executed. ● Desktop firewall (Windows workstations only): The firewall prevents unauthorized users from accessing users' computers when roaming or working remotely using unsecured networks. ● Content control (Windows workstations only): Content control allows administrators to define traffic scan options and schedule web access while blocking or allowing certain web categories or URLs. They can also configure data protection rules and define permissions for the use of specific applications. Bitdefender GravityZone
  • 15. . © TechSoup Global | All rights reserved15 Your staff are your first line of defense! 1. Train and raise awareness with your staff about cybersecurity vulnerabilities and risks 2. Take inventory of what you need to protect 3. Protect what you can and manage access Remember to not stop at an antivirus solution!
  • 17. 17 Pledge 1% Barb Shaughnessy Director, Strategic Partnerships bshaughnessy@techsoup.org
  • 18. . © TechSoup Global | All rights reserved18 Pledge 1% Building a Movement of Corporate Philanthropy 1% 1%1% Product People Profit/ Equity
  • 20. . © TechSoup Global | All rights reserved20 Corporations, Social Enterprises, NGO’s • Culture of Giving Back • Crosses Multiple Industries • Many are Early Stage Startups (Disruptors) • Funded by Salesforce or Founders with Salesforce Background • Dedicated to Local Community Engagement • Employee Recruitment and Retention • Strong Diversity & Inclusion Programs • Millennial Workforce • Impact vs Responsibility • Are You Ready?! https://pledge1percent.org/
  • 22. . © TechSoup Global | All rights reserved22 TechSoup.org Product Catalog
  • 23. . © TechSoup Global | All rights reserved23 NetSquared Engagement Opportunities with Pledge 1% Companies ● Event Space & Sponsorship ● Product Demos ● Product Discounts/Donations ● Schwag! ● Conference Passes ● Employee Volunteers/Pro Bono Support ● Customer/Employee Events ● Employment ● Social Impact Best Practices ● Pledge 1% Program Overviews