Previous
Microsoft Logo

Microsoft Defender for Nonprofit

How It Works

Microsoft NCE Defender for Nonprofit is a comprehensive security solution designed specifically for nonprofit organizations under the New Commerce Experience (NCE) model. It offers advanced threat protection, including antivirus, anti-malware, and anti-phishing capabilities. The solution helps safeguard email, data, and endpoints from cyber threats, ensuring that nonprofit organizations can operate securely. Integrated with Microsoft 365, it provides a unified security management experience, helping nonprofits protect sensitive information, maintain compliance, and reduce the risk of cyberattacks.

Pricing

Microsoft Defender for Business (Non-Profit Pricing)

Starting at

USD1.26

/ USER / Month

12 Month contract

Microsoft Defender for Cloud Apps (Non-Profit Pricing)

Starting at

USD0.92

/ USER / Month

12 Month contract

Microsoft Defender for Endpoint P2 (Non-Profit Pricing)

Starting at

USD2.21

/ USER / Month

12 Month contract

Microsoft Defender for Endpoint Server (Non-Profit Pricing)

Starting at

USD2.21

/ USER / Month

12 Month contract

Microsoft Defender for Endpoint P1 (Non-Profit Pricing)

Starting at

USD0.79

/ USER / Month

12 Month contract

Microsoft Defender for Identity (Non-Profit Pricing)

Starting at

USD2.31

/ USER / Month

12 Month contract

Microsoft Defender Vulnerability Management Add-on (Non-Profit Pricing)

Starting at

USD0.53

/ USER / Month

12 Month contract

Features

Operate security and IT teams in tandem

Simplify security and IT collaboration using unified endpoint management to prevent confusion, misconfigurations, and potential security gaps.

Leave no device undetected

See and manage your cyberattack surface from a single view across all managed and unmanaged Windows, macOS, Linux, iOS, Android, IoT, and network devices.

Configure flexible controls for your enterprise

Balance protection and productivity with granular controls including settings, policies, web and network access, cyberthreat detection, and automated workflows.

Gallery