• slide
  • slide
  • slide

Overview

The fundamentals of cyber security have evolved greatly in recent years. The number and variety of threat vectors has increased, as has the complexity and sophistication of today’s cyber threats. In an era of cloud and mobile computing, this means that individual products must now work together seamlessly, and public sector security teams need solutions that future-proof their operations so they can defend sensitive information against rapidly-evolving security threats.

Symantec’s Integrated Cyber Defense (ICD) Platform unifies products, services, and partners to drive down the cost and complexity of cyber security, while protecting enterprises against sophisticated threats. ICD combines information protection, threat protection, identity management, compliance and other advanced services, powered by shared intelligence and automation across endpoints, networks, applications, and clouds.

As Symantec’s largest government distributor, Carahsoft supports an extensive ecosystem of resellers and consulting partners committed to helping public sector organizations fulfill their mission to keep critical information safe and available to ensure the continuity of operations.

Products

  • Endpoint Security

    Endpoints are the critical last line of defense against cyber attackers. Symantec Endpoint Security solutions prevent, harden, detect, and respond to emerging threats across laptops, desktops, tablets, mobile phones, servers, and cloud workloads.



  • Identity Security

    User identities are under attack by cybercriminals who hope to exploit access and privileges and do harm. Symantec mitigates these attacks by enforcing granular security policies to stop unauthorized access to sensitive resources and data.


  • Information Security

    Symantec offers integrated information security solutions to help you protect sensitive data everywhere it goes - across endpoints, cloud services, private apps, and on-premises.

  • Network Security

    Email and web access are the lifeblood and essential communication means for every modern organization. Symantec has a full array of network security solutions, as well as a shared set of advanced threat protection technologies.


Contracts

Federal

GSA 2GIT

47QTCA21A000R
Mar 31, 2021- Mar 30, 2026

GSA Multiple Award Schedule (MAS)

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2021

NASA SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2025

ITES-SW2

W52P1J-20-D-0042
Aug 31, 2020- Aug 30, 2025
*Additional Option Years Available

State and Local

CMAS

3-12-70-2247E
Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

4400004253
May 01, 2009- Dec 19, 2021

Fairfax County IT Hardware, Software, & Services

4400006323
Oct 04, 2015- Dec 04, 2021
*Additional Option Years Available

Maryland Master Contract (COTS)

060B2490021
Oct 01, 2012- Sep 30, 2027

NJEdge

00278834
Dec 20, 2011- Jun 30, 2022

North Carolina Mass Storage Contract 204X

204X
Oct 01, 2018- Jun 30, 2023

OH STS 0119Y

534354
May 31, 2012- Dec 19, 2021

Pennsylvania COSTARS-6 IT Software Contract

COSTARS-006-176
Aug 31, 2017- Aug 31, 2021

State of Indiana Contract

0000000000000000000021430
Aug 01, 2017- Jul 31, 2021

State of Maine Cloud Solutions Contract- NASPO

AR2472
Feb 23, 2018- Sep 16, 2026

State of New Mexico Contract

80-000-18-00002
Aug 01, 2017- Aug 01, 2021

State of Wyoming Cloud Solutions Contract- NASPO

AR2472
Oct 14, 2016- Sep 15, 2026

Texas DIR-CPO-4444

DIR-CPO-4444
Jan 28, 2020- Jan 23, 2022
*Additional Option Years Available

Texas DIR-TSO-4288

DIR-TSO-4288
Feb 22, 2019- Feb 21, 2023
*Additional Option Years Available

The Quilt

MSA - 05012019F
Apr 01, 2016- Apr 30, 2022

Education

Illinois Learning Technology Purchase Program (ILTPP)

ILTPP-19CT011
May 20, 2019- Mar 01, 2022

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022

NJSBA

E-8801-ACESCPS
Oct 20, 2015- Sep 03, 2025

VASCUPP

UVA1482501
May 02, 2014- Dec 19, 2021

Events

Archived Events

News

Latest News

Broadcom Inc. today announced its global cyber security aggregator program (CSAP) to expand its market reach and deliver enhanced levels of service to a subset of commercial enterprises with unique ...
READ MORE >
Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, today announced that it has been awarded a blanket purchase agreement (BPA) via the Space and Naval Warfare Systems Center ...
READ MORE >
Program promotes the sharing of valuable threat information between DOD and industry
READ MORE >
Symantec’s Annual Threat Report Reveals More Ambitious, Destructive, and Stealthy Attacks, Raising the Stakes for Organizations
READ MORE >
MOUNTAIN VIEW, Calif. – Feb. 12, 2019 – Symantec Corp. (NASDAQ: SYMC), the world’s leading cyber security company, today announced the acquisition of Luminate Security, a privately held company ...
READ MORE >
New endpoint security offerings now available as part of Symantec’s Integrated Cyber Defense Platform
READ MORE >
MOUNTAIN VIEW and SUNNYVALE, Calif., Dec. 11, 2018 (GLOBE NEWSWIRE) -- Symantec Corp. (NASDAQ: SYMC), the world’s leading cyber security company, and Fortinet (NASDAQ: FTNT), a global leader in ...
READ MORE >
Symantec Industrial Control System Protection Neural to defend against USB-borne malware, network intrusion and zero-day attacks on operational technology
READ MORE >
DHS to sponsor the company’s cloud and data-level security products through the authorization process
READ MORE >
Symantec supports law enforcement to dismantle cyber crime ring responsible for tens of millions of dollars in losses, resulting in three arrests
READ MORE >
Symantec’s Artificial Intelligence-based Targeted Attacks Analytics spotted the previously unknown Gallmaker group and its under-the-radar techniques
READ MORE >
Integrated approach to cloud security, compliance and management delivers ‘no compromises’ visibility and control to IaaS, PaaS and SaaS applications
READ MORE >
Cyber experts from federal civilian, defense, intelligence and state/local agencies to discuss the need to redefine how government approaches security
READ MORE >
Alleged Fraudsters Arrested in The United States and Abroad for Business Email Compromise Schemes
READ MORE >
Only cloud solution to integrate security into DevOps workflows to protect cloud workloads and storage against malware and threats
READ MORE >
Innovation represents major step forward in the fight against sophisticated phishing, account takeover, and ransomware attacks
READ MORE >
Law Enforcement Learn How to Thwart Identity Thieves Who’ve Affected Nearly 60 million Americans
READ MORE >
Symantec’s AI-based Targeted Attack Analytics spotted the malicious behavior hidden in legitimate IT administration tools
READ MORE >
Network Security for the Cloud Generation delivers comprehensive, cloud-based protection from network to endpoint to reduce risk and protect enterprises as businesses move to the cloud
READ MORE >
AI and machine learning innovations automate capabilities of Symantec’s world-class investigations team to zero in on the most pressing threats
READ MORE >
Annual Threat Report from Symantec Reveals One in Ten Targeted Attack Groups Use Malware Designed to Disrupt
READ MORE >
This is the first step in the company’s cloud security certification strategy
READ MORE >
Symantec integrates applications with advanced threat protection features to bring improved performance and lower costs for cloud applications
READ MORE >

Resources

Datasheet

Symantec-Broadcom.png
Symantec Datasheet
It's an exciting time in education. Teachers are leveraging technology for initiatives such as e-learning and flipped classrooms. Students are using smartphones, laptops, and tablets to conduct research, take tests, and team up on assignments via social media platforms. To help institutions embrace ...

Formerly Skycure Mobile Threat Defense, Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown thre...

Symantec-Broadcom.png
Symantec Datasheet
Symantec CloudSOC Audit discovers and monitors all the cloud apps being used in your organization and highlights any risks and compliance issues they may pose. View our datasheet to learn more.

To secure physical and virtual servers, IT professionals have relied on traditional protection technologies such as antivirus. While these remain essential layers of defense and hygiene, today’s threat landscape warrants augmenting with real-time and proactive security to provide sufficient protecti...

Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that cannot be stopped by antivirus alone. It’s time to move beyond antivirus. Symantec’s unique ability to provide intelligent security leverages the collective wisdom of the world’s lar...

Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high1. The threat environment is evolving quickly and given the size and complexity of today's networks, organizations are struggling to keep up. Symantec™ Endpoint Protection ...

Are you paying for unused software licenses? Are you prepared for your next vendor software audit? Take control with Symantec™ Asset Management Suite 7.6 powered by Altiris™ technology. In combination with Symantec™ Client Management Suite 7.6 powered by Altiris™ technology...

Smart, comprehensive email security—whether your email system is on-premises, cloud-based, or both—begins with a clear, realistic understanding of what you’re up against. Email is still the most popular and pervasive tool cybercriminals use to launch and distribute threats including spear phishing, ...

As agencies migrate email to the cloud—a move viewed by the administration as an integral element of modernization—cyber security must be part of the strategy. Although malicious actors now exploit a growing range of attack vectors, email remains by far the most popular.View this data sheet to learn...

Infographic

When it comes to responding to the current cyber threat landscape, innovation is a must. The problem is not just that threats are growing more numerous and sophisticated, it’s also that agencies have an increasingly complex environment to secure. Each aspect of the enterprise—from the data center an...