Select the product you wish to order from the list below under the “Software” column. Once selected, you will be directed to the Base Software Order Page. (Note: Multiple products belonging to the same publisher are separated by “,” and you can move the mouse cursor horizontally to do your selection)
if the requested title not found under the base software, click the In-Scope Software
if the requested title not found under the base software, click the In-Scope Software
01- Client operating system softwareDesktop operating systems software solutions are operating systems designed for client workstation devices, such as desktops, notebooks and laptops.
02- Client operating system utility softwareSoftware designed to help analyze, configure, optimize and maintain a client computer. Typical client operating system software utilities include backup and recovery, data compression, disk checkers, disk cleaners, disk compression, disk defragmenters, disk partitioners, disk space analyzers, disk storage, archives, file managers, memory testers, registry cleaners, system monitors and system profilers, power management.
if the requested title not found under the base software, click the In-Scope Software
01- Desktop management softwareDesktop management software solutions provide functionality and features to manage the desktop remotely from a central administrative location. Remote desktop software solutions provide access and a graphical interface to another computer.
05- Desktop software imaging softwareSoftware solutions that create a standard image (set of applications, drivers, etc.) to be deployed on multiple computers.
06- Configuration management softwareA software tool used to apply technical and administrative controls to: a) identify and document physical and functional characteristics of configuration items (a configuration item is a hardware or a software, or an aggregate of both, which is designated by the project configuration manager for configuration management); b) identify any changes to characteristics of those configuration items; and, c) record and report change processing and implementation of the system.
07- Desktop software/hardware asset management softwareDesktop software/hardware asset management software solutions manage and optimize the purchase, deployment, maintenance, utilization and disposal of software applications within an organization. They are also software tools used by vendors or end-user organizations to control where and how software products are able to run. License managers protect software vendors from losses due to software piracy and enable end-user organizations to enforce compliance with software license agreements.
if the requested title not found under the base software, click the In-Scope Software
02- Desktop virtualization softwareDesktop virtualization software solutions allow for the creation and modification of an operating system independent from the hardware. The virtual desktop should be able to run on multiple different hardware platforms and move freely from one to another when required without modifications. This type of software is only for virtualization of other WTD operating systems or WTD applications.
if the requested title not found under the base software, click the In-Scope Software
02- Office automation suite software Office automation suite software are licensed software applications that bundle common office functions such as word processing, spreadsheets, presentation graphics.
07- Portable document software readersPortable document software solutions deliver, enable and support software and are licensed software applications that enables users to view portable document format (PDF) files.
08- Desktop publishing softwareEntry-level document and form production software to create, manipulate, view and save portable document format files based primarily on page layout.
if the requested title not found under the base software, click the In-Scope Software
01- Host security softwareDesktop anti-virus and content-scanning software solutions usually operate on files, either stored on a device or in-transit. They detect the presence of malicious software through various techniques, such as attackignatures and heuristics. Note: Only client computer software is included here. Server anti-virus and security applications are included in the Security Software category. Firewall software solutions are designed to prevent unauthorized access to or from a private network by permitting or denying computer applications based upon a set of rules and other criteria. Firewalls typically function as filters, gateways and/or proxies. Application whitelisting software solutions permit only authorized applications to run on a system. There are also security software solutions that enable and manage security authentication and that are used to assign, maintain and revoke access to information and computer resources to an authenticated user or computer resource. Identity management software solutions identify individuals in a system and control access to resources in that system by placing restrictions on the established identities. These applications allow users to sign on once and gain access to multiple applications for which they are authorized. Security incident monitoring is included.
Endpoint security software solutions support security at the desktop network boundary by distributing security applications to end-user devices (endpoints) on a network in a centrally managed fashion. Endpoint software determines the security posture of IT systems by passively scanning each device for service and OS-related vulnerabilities.
Mobility security software solutions provide automatic security controls for mobile users that allow enterprises to deploy wireless tools that maintain security rules. In addition, these applications provide reporting tools to ensure that users are maximizing and controlling wireless costs.
02- Identification, authentication and authorization softwareSoftware used to ensure that only authenticated, authorized users can access information, applications and networks. Security software used to track and enforce access to software and information resources. Client-only software to be included.
03- Encryption softwareEncryption and cryptographic utilities software encrypts and decrypts data, usually in the form of files on (or sectors of) hard drives and removable media, email messages or network transmissions.
04- Public Key Infrastructure (PKI) softwarePublic Key Infrastructure software solutions create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority. Client-only software to be included.
05- Data loss prevention softwareDesignated data loss prevention software solutions detect and prevent unauthorized attempts to copy or send sensitive data, intentionally or unintentionally, without authorization, mainly by personnel who are authorized to access the sensitive information. In order to classify certain information as sensitive, these solutions use mechanisms, such as exact data matching, structured data fingerprinting, statistical methods, rule and regular expression matching, published lexicons, conceptual definitions and keywords.
Such systems run on end-user workstations or servers in the organization. Like network-based systems, endpoint-based can address internal as well as external communications and can, therefore, be used to control information flow between groups or types of users. They can also control email and Instant Messaging communications before they are stored in the corporate archive, such that a blocked communication (i.e., one that was never sent and, therefore, not subject to retention rules) will not be identified in a subsequent legal discovery situation. Endpoint systems have the advantage that they can monitor and control access to physical devices (such as mobile devices with data storage capabilities) and, in some cases, can access information before it has been encrypted. Some endpoint-based systems can also provide application controls to block attempted transmissions of confidential information and provide immediate feedback to the user. They have the disadvantage that they need to be installed on every workstation in the network, cannot be used on mobile devices (e.g. cell phones and PDAs) or where they cannot be practically installed (for example on a workstation in an Internet caf).