• slide
  • slide
  • slide

Overview

A Government Endpoint Security Solution

The fundamentals of cyber security have evolved greatly in recent years. The number and variety of threat vectors has increased, as has the complexity and sophistication of today’s cyber threats. In an era of cloud and mobile computing, this means that individual products must now work together seamlessly, and public sector security teams need solutions that future-proof their operations so they can defend sensitive information against rapidly-evolving security threats.

Symantec’s Integrated Cyber Defense (ICD) Platform unifies products, services, and partners to drive down the cost and complexity of cyber security, while protecting enterprises against sophisticated threats. ICD combines information protection, threat protection, identity management, compliance and other advanced services, powered by shared intelligence and automation across endpoints, networks, applications, and clouds.

As Symantec’s largest government distributor, Carahsoft supports an extensive ecosystem of resellers and consulting partners committed to helping public sector organizations fulfill their mission to keep critical information safe and available to ensure the continuity of operations.

Products

  • Endpoint Security

    Endpoints are the critical last line of defense against cyber attackers. Symantec Endpoint Security solutions prevent, harden, detect, and respond to emerging threats across laptops, desktops, tablets, mobile phones, servers, and cloud workloads.



  • Identity Security

    User identities are under attack by cybercriminals who hope to exploit access and privileges and do harm. Symantec mitigates these attacks by enforcing granular security policies to stop unauthorized access to sensitive resources and data.


  • Information Security

    Symantec offers integrated information security solutions to help you protect sensitive data everywhere it goes - across endpoints, cloud services, private apps, and on-premises.

  • Network Security

    Email and web access are the lifeblood and essential communication means for every modern organization. Symantec has a full array of network security solutions, as well as a shared set of advanced threat protection technologies.


Contracts

Federal

GSA 2GIT

47QTCA21A000R
Mar 31, 2021- Mar 30, 2026

GSA Multiple Award Schedule (MAS)

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2026

GSA Multiple Award Schedule Contract (MAS)

47QSWA18D008F
Aug 22, 2018- Aug 21, 2023

NASA SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2025

ITES-SW2

W52P1J-20-D-0042
Aug 31, 2020- Aug 30, 2025
*Additional Option Years Available

CDM

47QSWA18D008F
Aug 22, 2018- Aug 21, 2023

State and Local

CMAS

3-12-70-2247E
Aug 28, 2012- Dec 19, 2026

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2026

Department of General Services Pennsylvania

4400004253
May 01, 2009- Dec 19, 2026

Fairfax County IT Hardware, Software, & Services

4400006323
Oct 04, 2015- Dec 04, 2023

Maryland Master Contract (COTS)

060B2490021
Oct 01, 2012- Sep 30, 2027

NASPO ValuePoint

AR2472
Oct 14, 2016- Sep 15, 2026

NJEdge

00278834
Dec 20, 2011- Jun 30, 2022

North Carolina Mass Storage Contract 204X

204X
Oct 01, 2018- Jun 30, 2023

OH STS 0119Y

534354
May 31, 2012- Dec 19, 2026

Oklahoma DIR Contract # SW1056A

SW1056A
Feb 22, 2019- Feb 21, 2023
*Additional Option Years Available

Pennsylvania COSTARS-6 IT Software Contract

COSTARS-006-176
Aug 31, 2017- Aug 31, 2022

RCA - Orange County - OMNIA Partners

RCA-017-21010004
May 01, 2021- Apr 30, 2023

RCA - Orange County - OMNIA Partners

RCA-017-21010004
May 01, 2021- Apr 30, 2023

State of Indiana Contract

0000000000000000000021430
Aug 01, 2017- Sep 30, 2022

State of New Mexico Contract

10-00000-21-00098
Aug 01, 2017- Dec 31, 2022

Texas DIR-CPO-4444

DIR-CPO-4444
Jan 28, 2020- Jan 23, 2024
*Additional Option Years Available

Texas DIR-TSO-4288

DIR-TSO-4288
Feb 22, 2019- Feb 21, 2023
*Additional Option Years Available

Education

E&I Carahsoft Cloud Solutions & Services Distributor Contract

EI00063~2021MA
Apr 01, 2021- Mar 31, 2026

Educational Software Solutions and Services - OMNIA Partners, Public Sector

R191902
Feb 27, 2020- Apr 30, 2023
*Additional Option Years Available

Illinois Learning Technology Purchase Program (ILTPP)

ILTPP-19CT011
May 20, 2019- Mar 01, 2023

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022

NJSBA

E-8801-ACESCPS
Oct 20, 2015- Sep 03, 2025

The Quilt

MSA - 05012019F
Apr 01, 2016- May 02, 2025

VASCUPP

UVA1482501
May 02, 2014- Dec 19, 2026

Events

Upcoming Events

Bringing Zero Trust Cybersecurity to the Forefront of Government

August 26, 2021

The White House Executive Order issued in May directs federal agencies to, through bold changes and significant investments, apply zero trust practices to strengthen cybersecurity across government and the private sector. The EO sets objectives and timeframes but does not guide the strategies to achieve those outcomes.

Unlike many EOs, however, the administration is allocating funding to help agencies undertake the work – from the edge all the way back to the mainframes hosting their most crucial data and apps. This multi-level effort must encompass every type of information technology that comprises government systems, regardless of location, whether remote or on-premises.

Join us as agency and industry leaders offer pragmatic guidance on how to move forward – what to do first, second, third, and so on.

Register Now

Past Events, Webinars & Trainings

News

Latest News

Broadcom Inc. today announced its global cyber security aggregator program (CSAP) to expand its market reach and deliver enhanced levels of service to a subset of commercial enterprises with unique ...
READ MORE >
Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, today announced that it has been awarded a blanket purchase agreement (BPA) via the Space and Naval Warfare Systems Center ...
READ MORE >
Program promotes the sharing of valuable threat information between DOD and industry
READ MORE >
Symantec’s Annual Threat Report Reveals More Ambitious, Destructive, and Stealthy Attacks, Raising the Stakes for Organizations
READ MORE >
MOUNTAIN VIEW, Calif. – Feb. 12, 2019 – Symantec Corp. (NASDAQ: SYMC), the world’s leading cyber security company, today announced the acquisition of Luminate Security, a privately held company ...
READ MORE >
New endpoint security offerings now available as part of Symantec’s Integrated Cyber Defense Platform
READ MORE >
MOUNTAIN VIEW and SUNNYVALE, Calif., Dec. 11, 2018 (GLOBE NEWSWIRE) -- Symantec Corp. (NASDAQ: SYMC), the world’s leading cyber security company, and Fortinet (NASDAQ: FTNT), a global leader in ...
READ MORE >
Symantec Industrial Control System Protection Neural to defend against USB-borne malware, network intrusion and zero-day attacks on operational technology
READ MORE >
DHS to sponsor the company’s cloud and data-level security products through the authorization process
READ MORE >
Symantec supports law enforcement to dismantle cyber crime ring responsible for tens of millions of dollars in losses, resulting in three arrests
READ MORE >
Symantec’s Artificial Intelligence-based Targeted Attacks Analytics spotted the previously unknown Gallmaker group and its under-the-radar techniques
READ MORE >
Integrated approach to cloud security, compliance and management delivers ‘no compromises’ visibility and control to IaaS, PaaS and SaaS applications
READ MORE >
Cyber experts from federal civilian, defense, intelligence and state/local agencies to discuss the need to redefine how government approaches security
READ MORE >
Alleged Fraudsters Arrested in The United States and Abroad for Business Email Compromise Schemes
READ MORE >
Only cloud solution to integrate security into DevOps workflows to protect cloud workloads and storage against malware and threats
READ MORE >
Innovation represents major step forward in the fight against sophisticated phishing, account takeover, and ransomware attacks
READ MORE >
Law Enforcement Learn How to Thwart Identity Thieves Who’ve Affected Nearly 60 million Americans
READ MORE >
Symantec’s AI-based Targeted Attack Analytics spotted the malicious behavior hidden in legitimate IT administration tools
READ MORE >
Network Security for the Cloud Generation delivers comprehensive, cloud-based protection from network to endpoint to reduce risk and protect enterprises as businesses move to the cloud
READ MORE >
AI and machine learning innovations automate capabilities of Symantec’s world-class investigations team to zero in on the most pressing threats
READ MORE >
Annual Threat Report from Symantec Reveals One in Ten Targeted Attack Groups Use Malware Designed to Disrupt
READ MORE >
This is the first step in the company’s cloud security certification strategy
READ MORE >
Symantec integrates applications with advanced threat protection features to bring improved performance and lower costs for cloud applications
READ MORE >

Resources

Resources

Adapting to the New Reality of Evolving Cloud Threats. Cloud is the center of IT and increasingly, the foundation for cyber security. Understanding how threat vectors are shifting in cloud is fundamental to making the necessary updates to your security program and strategy. Symantec’s CSTR shines a ...

Solutions Brief

As Internet accessibility and mobile technology adoption have increased in the United States, governments at all levels are embarking upon or extending e-Government initiatives to provide a higher, more convenient level of service to the public and lower the cost of those services. The best practice...

This new era of cyber threats is raising questions about whether current security measures are adequate. The CDG survey, underwritten by Symantec, uncovered four key concerns among government leaders about the state of cybersecurity in their organizations.Read this solution brief to learn more about...

Video


Join Sr. Systems Enginner at FSi, Yoon Kim, as he discusses advanced cloud-delivered network security service.

Webinar


Whitepaper

The following white paper details the importance of broad cipher suite support when inspecting SSL encrypted traffic.

Healthcare organizations are awash with data. However, electronic health records (EHRs) and digital clinical systems in many healthcare organizations have been deployed without strategic data and IT infrastructure security planning. As a result, chief information security officers (CISOs) frequent...

Faced with a profoundly hostile threat climate, state and local organizations are increasingly cognizant of the need to bolster defensive measures. The good news is that they are making tangible progress: the vast majority of state government cybersecurity programs have formulated strategic plans, d...

View this whitepaper to learn more about how strong data-layer security can improve enterprise security and enable new workflows.