• slide
  • slide


The fundamentals of cyber security have evolved greatly in recent years. The number and variety of threat vectors has increased, as has the complexity and sophistication of today’s cyber threats. In an era of cloud and mobile computing, this means that individual products must now work together seamlessly, and public sector security teams need solutions that future-proof their operations so they can defend sensitive information against rapidly-evolving security threats.

Symantec’s Integrated Cyber Defense (ICD) Platform unifies products, services, and partners to drive down the cost and complexity of cyber security, while protecting enterprises against sophisticated threats. ICD combines information protection, threat protection, identity management, compliance and other advanced services, powered by shared intelligence and automation across endpoints, networks, applications, and clouds.

As Symantec’s largest government distributor, Carahsoft supports an extensive ecosystem of resellers and consulting partners committed to helping public sector organizations fulfill their mission to keep critical information safe and available to ensure the continuity of operations.


  • Endpoint Security

    A single agent architecture delivers multi-layered security across all possible endpoints—desktop, server, mobile, and IoT—protecting enterprise and mobile workforces regardless of OS, device, or network security approach. Products and solutions include:

    • Symantec Endpoint Protection (SEP) Family: SEP, SEP Mobile, Endpoint Detection and Response, Threat Defense for Active Directory
    • IOT Family: ICSP Neural
    • Hybrid Cloud Security Family: Storage Protection, Cloud Workload Protection, Data Center Security
    • Endpoint Management Family: Client Management Suite, Server Management Suite, Asset Management Suite, Ghost Solution Suite
  • Web & Network Security

    Cloud and on-premises network security solutions, based on an advanced proxy architecture, provide superior defense against advanced threats, protect critical business information, and help ensure secure and compliant use of the cloud and web. Products and solutions include:·

    • Secure Web Gateway Family: Web Security Service, ProxySG, Web Isolation, Content & Malware Analysis, WebFilter/Intelligence Services, Web Application Firewall & Reverse Proxy, Security Analytics
    • Encrypted Traffic Management Family: SSL Visibility Appliance
    • Network Performance Optimization Family: PacketShaper
    • Cloud Access Security Broker (CASB) Family
    • DLP Family
    • Identity Family

  • Email Security

    Multiple layers of protection (including threat isolation) against ransomware, spear phishing, and business email compromise, together with advanced analytics to identify targeted attacks, protecting email against user error and data leakage. Products and solutions include:

    • Email Security cloud
    • Messaging Gateway
    • Threat Isolation
    • Email Threat Detection and Response
    • Phishing Readiness
    • Mail Security for Microsoft Exchange
    • DLP Family: DLP Cloud Service for Email
    • Encryption Family: Desktop Email Encryption, Gateway Email Encryptio

  • Cloud App Security

    Advanced solutions that secure cloud access, cloud infrastructure, and cloud applications, providing in-depth visibility, data security, and threat protection to safeguard users, information, and workloads across public and private clouds. Products and solutions include:

    • Cloud Access Security Broker (CASB) Family: CloudSOC Audit – Shadow IT, Cloud SOC CASB Gateway, CloudSOC CASB for SaaS, CloudSOC CASB for IaaS
    • Hybrid Cloud Security Family: Cloud Workload Protection, Cloud Workload Assurance, Control Compliance Suite, Storage Protection
    • Secure Web Gateway Family: Web Security Service, Web Isolation, Malware Analysis Service, Trusted Mobile Device Security Service, Web Application Firewall & Revere Proxy
    • DLP Family: DLP Cloud & Symantec CLoudSOC, DLP Cloud Service for Email
    • Email Security Family: Email Security.cloud, Email Threat Detection and Response
    • Identity Family: VIP

  • Information Protection

    Encryption, data loss prevention, multi-factor authentication, tagging, and analytics ensure that confidential information and IT assets are protected and in compliance at all times, wherever it is stored, and that only authenticated users are able to gain access. Products and solutions include:

    • DLP Family: DLP, DLP Cloud & Symantec CloudSOC, DLP Cloud Service for Email
    • Information Centric Security Family: Information Centric Analytics, Information Centric Tagging, Information Centric Encryption
    • Identity Family: VIP, VIP Access Manager
    • Encryption Family: Endpoint Encryption, Gateway Email Encryption
    • Hybrid Cloud Security Family: Control Compliance Suite

  • Cyber Security Services

    Integrated portfolio including Managed Security Services (MSS), Incident Response (IR), and DeepSight Threat Intelligence, driven by our unequaled cyber security warrior network. Products and solutions include:

    • Managed Endpoint Detection and Response
    • MSS
    • Managed Cloud Defense
    • Managed Network Forensics
    • IR Advanced Threat Hunting
    • DeepSight Threat Intelligence



GSA Schedule 70

Dec 20, 2011- Dec 19, 2021


May 01, 2015- Apr 30, 2025

State and Local


Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

May 01, 2009- Dec 19, 2021

Fairfax County IT Hardware, Software, & Services

Oct 04, 2015- Dec 04, 2021
*Additional Option Years Available

Kentucky COT - NASPO

Jun 21, 2017- Sep 15, 2026

Maryland Master Contract (COTS)

Oct 01, 2012- Sep 30, 2027

NASPO ValuePoint

Oct 14, 2016- Sep 15, 2026

North Carolina Mass Storage Contract 204J

204J (ITS-006498)
Sep 20, 2012- Mar 31, 2020

North Carolina Mass Storage Contract 204X

Oct 01, 2018- Jun 30, 2023

Orange County National IPA Co-Op

Jun 01, 2015- May 31, 2021

Pennsylvania COSTARS-6 IT Software Contract

Aug 31, 2017- Aug 31, 2021

State of Alaska Cloud Solutions Contract- NASPO

Aug 07, 2017- Sep 16, 2026

State of Arkansas Cloud Solutions Contract- NASPO

Jul 01, 2017- Sep 15, 2026

State of California Cloud Solutions Contract- NASPO

Sep 15, 2017- Sep 15, 2026

State of Delaware Cloud Solutions Contract- NASPO

Jun 30, 2017- Sep 15, 2026

State of Florida Department of Management Services Cloud Solutions Contract- NASPO

Aug 01, 2017- Sep 30, 2020

State of Hawaii Cloud Solutions Contract - NASPO

Jul 01, 2017- Sep 15, 2026

State of Indiana Contract

Aug 01, 2017- Jul 31, 2021

State of Kansas Cloud Solutions Contract- NASPO

Jul 01, 2017- Sep 15, 2026

State of Louisiana Cloud Solutions Contract- NASPO

Mar 03, 2017- Sep 15, 2026

State of Minnesota Cloud Solutions Contract- NASPO

Aug 16, 2017- Sep 16, 2026

State of Missouri Cloud Solutions Contract- NASPO

Apr 21, 2018- Sep 10, 2026

State of Nebraska Cloud Solutions Contract- NASPO

78128 O4
Jul 19, 2017- Sep 16, 2026

State of Nevada Cloud Solutions Contract- NASPO

Jun 15, 2017- Sep 15, 2026

State of New Mexico Cloud Solutions Contract- NASPO

May 10, 2018- Sep 16, 2026

State of New Mexico Contract

Aug 01, 2017- Aug 01, 2021

State of Oklahoma Cloud Solutions Contract- NASPO

May 17, 2017- Sep 15, 2026

State of Washington Cloud Solutions Contract- NASPO

Jul 17, 2017- Sep 15, 2026

Texas DIR-TSO-4288

Feb 22, 2019- Feb 21, 2021
*Additional Option Years Available


Massachusetts Higher Education Consortium (MHEC)

Aug 10, 2019- Jun 30, 2022

NJEdge Cisco

Dec 20, 2011- Jun 30, 2021

The Quilt

MSA - 05012019F
Apr 01, 2016- Apr 30, 2022


May 02, 2014- Dec 19, 2021


Archived Events


Latest News

Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, today announced that it has been awarded a blanket purchase agreement (BPA) via the Space and Naval Warfare Systems Center ...
Program promotes the sharing of valuable threat information between DOD and industry
Symantec’s Annual Threat Report Reveals More Ambitious, Destructive, and Stealthy Attacks, Raising the Stakes for Organizations
MOUNTAIN VIEW, Calif. – Feb. 12, 2019 – Symantec Corp. (NASDAQ: SYMC), the world’s leading cyber security company, today announced the acquisition of Luminate Security, a privately held company ...
New endpoint security offerings now available as part of Symantec’s Integrated Cyber Defense Platform
MOUNTAIN VIEW and SUNNYVALE, Calif., Dec. 11, 2018 (GLOBE NEWSWIRE) -- Symantec Corp. (NASDAQ: SYMC), the world’s leading cyber security company, and Fortinet (NASDAQ: FTNT), a global leader in ...
Symantec Industrial Control System Protection Neural to defend against USB-borne malware, network intrusion and zero-day attacks on operational technology
DHS to sponsor the company’s cloud and data-level security products through the authorization process
Symantec supports law enforcement to dismantle cyber crime ring responsible for tens of millions of dollars in losses, resulting in three arrests
Symantec’s Artificial Intelligence-based Targeted Attacks Analytics spotted the previously unknown Gallmaker group and its under-the-radar techniques
Integrated approach to cloud security, compliance and management delivers ‘no compromises’ visibility and control to IaaS, PaaS and SaaS applications
Cyber experts from federal civilian, defense, intelligence and state/local agencies to discuss the need to redefine how government approaches security
Alleged Fraudsters Arrested in The United States and Abroad for Business Email Compromise Schemes
Only cloud solution to integrate security into DevOps workflows to protect cloud workloads and storage against malware and threats
Innovation represents major step forward in the fight against sophisticated phishing, account takeover, and ransomware attacks
Law Enforcement Learn How to Thwart Identity Thieves Who’ve Affected Nearly 60 million Americans
Symantec’s AI-based Targeted Attack Analytics spotted the malicious behavior hidden in legitimate IT administration tools
Network Security for the Cloud Generation delivers comprehensive, cloud-based protection from network to endpoint to reduce risk and protect enterprises as businesses move to the cloud
AI and machine learning innovations automate capabilities of Symantec’s world-class investigations team to zero in on the most pressing threats
Annual Threat Report from Symantec Reveals One in Ten Targeted Attack Groups Use Malware Designed to Disrupt
This is the first step in the company’s cloud security certification strategy
Symantec integrates applications with advanced threat protection features to bring improved performance and lower costs for cloud applications



It's an exciting time in education. Teachers are leveraging technology for initiatives such as e-learning and flipped classrooms. Students are using smartphones, laptops, and tablets to conduct research, take tests, and team up on assignments via social media platforms. To help institutions embrace ...

Formerly Skycure Mobile Threat Defense, Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown thre...

Symantec CloudSOC Audit discovers and monitors all the cloud apps being used in your organization and highlights any risks and compliance issues they may pose. View our datasheet to learn more.

To secure physical and virtual servers, IT professionals have relied on traditional protection technologies such as antivirus. While these remain essential layers of defense and hygiene, today’s threat landscape warrants augmenting with real-time and proactive security to provide sufficient protec...

Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that cannot be stopped by antivirus alone. It’s time to move beyond antivirus. Symantec’s unique ability to provide intelligent security leverages the collective wisdom of the world...

Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high1. The threat environment is evolving quickly and given the size and complexity of today's networks, organizations are struggling to keep up. Symantec™ Endpoint Protection ...

Are you paying for unused software licenses? Are you prepared for your next vendor software audit? Take control with Symantec™ Asset Management Suite 7.6 powered by Altiris™ technology. In combination with Symantec™ Client Management Suite 7.6 powered by Altiris™ technology...

Smart, comprehensive email security—whether your email system is on-premises, cloud-based, or both—begins with a clear, realistic understanding of what you’re up against. Email is still the most popular and pervasive tool cybercriminals use to launch and distribute threats including spear phis...

As agencies migrate email to the cloud—a move viewed by the administration as an integral element of modernization—cyber security must be part of the strategy. Although malicious actors now exploit a growing range of attack vectors, email remains by far the most popular.View this data sheet to l...


When it comes to responding to the current cyber threat landscape, innovation is a must. The problem is not just that threats are growing more numerous and sophisticated, it’s also that agencies have an increasingly complex environment to secure. Each aspect of the enterprise—from the data cente...