Overview

The fundamentals of cyber security have evolved greatly in recent years. The number and variety of threat vectors has increased, as has the complexity and sophistication of today’s cyber threats. In an era of cloud and mobile computing, this means that individual products must now work together seamlessly, and public sector security teams need solutions that future-proof their operations so they can defend sensitive information against rapidly-evolving security threats.

Symantec’s Integrated Cyber Defense (ICD) Platform unifies products, services, and partners to drive down the cost and complexity of cyber security, while protecting enterprises against sophisticated threats. ICD combines information protection, threat protection, identity management, compliance and other advanced services, powered by shared intelligence and automation across endpoints, networks, applications, and clouds.

As Symantec’s largest government distributor, Carahsoft supports an extensive ecosystem of resellers and consulting partners committed to helping public sector organizations fulfill their mission to keep critical information safe and available to ensure the continuity of operations.

Products

  • Endpoint Security

    A single agent architecture delivers multi-layered security across all possible endpoints—desktop, server, mobile, and IoT—protecting enterprise and mobile workforces regardless of OS, device, or network security approach. Products and solutions include:

    • Symantec Endpoint Protection (SEP) Family: SEP, SEP Mobile, Endpoint Detection and Response, Threat Defense for Active Directory
    • IOT Family: ICSP Neural
    • Hybrid Cloud Security Family: Storage Protection, Cloud Workload Protection, Data Center Security
    • Endpoint Management Family: Client Management Suite, Server Management Suite, Asset Management Suite, Ghost Solution Suite
  • Web & Network Security

    Cloud and on-premises network security solutions, based on an advanced proxy architecture, provide superior defense against advanced threats, protect critical business information, and help ensure secure and compliant use of the cloud and web. Products and solutions include:·

    • Secure Web Gateway Family: Web Security Service, ProxySG, Web Isolation, Content & Malware Analysis, WebFilter/Intelligence Services, Web Application Firewall & Reverse Proxy, Security Analytics
    • Encrypted Traffic Management Family: SSL Visibility Appliance
    • Network Performance Optimization Family: PacketShaper
    • Cloud Access Security Broker (CASB) Family
    • DLP Family
    • Identity Family

  • Email Security

    Multiple layers of protection (including threat isolation) against ransomware, spear phishing, and business email compromise, together with advanced analytics to identify targeted attacks, protecting email against user error and data leakage. Products and solutions include:

    • Email Security cloud
    • Messaging Gateway
    • Threat Isolation
    • Email Threat Detection and Response
    • Phishing Readiness
    • Mail Security for Microsoft Exchange
    • DLP Family: DLP Cloud Service for Email
    • Encryption Family: Desktop Email Encryption, Gateway Email Encryptio

  • Cloud App Security

    Advanced solutions that secure cloud access, cloud infrastructure, and cloud applications, providing in-depth visibility, data security, and threat protection to safeguard users, information, and workloads across public and private clouds. Products and solutions include:

    • Cloud Access Security Broker (CASB) Family: CloudSOC Audit – Shadow IT, Cloud SOC CASB Gateway, CloudSOC CASB for SaaS, CloudSOC CASB for IaaS
    • Hybrid Cloud Security Family: Cloud Workload Protection, Cloud Workload Assurance, Control Compliance Suite, Storage Protection
    • Secure Web Gateway Family: Web Security Service, Web Isolation, Malware Analysis Service, Trusted Mobile Device Security Service, Web Application Firewall & Revere Proxy
    • DLP Family: DLP Cloud & Symantec CLoudSOC, DLP Cloud Service for Email
    • Email Security Family: Email Security.cloud, Email Threat Detection and Response
    • Identity Family: VIP

  • Information Protection

    Encryption, data loss prevention, multi-factor authentication, tagging, and analytics ensure that confidential information and IT assets are protected and in compliance at all times, wherever it is stored, and that only authenticated users are able to gain access. Products and solutions include:

    • DLP Family: DLP, DLP Cloud & Symantec CloudSOC, DLP Cloud Service for Email
    • Information Centric Security Family: Information Centric Analytics, Information Centric Tagging, Information Centric Encryption
    • Identity Family: VIP, VIP Access Manager
    • Encryption Family: Endpoint Encryption, Gateway Email Encryption
    • Hybrid Cloud Security Family: Control Compliance Suite

  • Cyber Security Services

    Integrated portfolio including Managed Security Services (MSS), Incident Response (IR), and DeepSight Threat Intelligence, driven by our unequaled cyber security warrior network. Products and solutions include:

    • Managed Endpoint Detection and Response
    • MSS
    • Managed Cloud Defense
    • Managed Network Forensics
    • IR Advanced Threat Hunting
    • DeepSight Threat Intelligence

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Department of General Services PA - Symantec

Contract # 4400004253 Valid through December 19, 2021

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Illinois Public Higher Education Cooperative (IPHEC)

Contract Number: #1818GAL Term: July 3, 2018 - May 31, 2020

Jacksonville Electric Cloud Solutions Contract- NASPO

Lousiana Contract Number: 4400010663 Base Contract Number: AR2472 Contract Expiration: September 16, 2016

Kentucky COT - NASPO

Kentucky Contract Number: MA7581700001211 Contract Expiration: September 16, 2026

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027

NASPO ValuePoint

Term: through September 15, 2026

National Cooperative Purchasing Alliance (NCPA)

Term: through November 30, 2021

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2019 (with 2 option renewal years)

North Carolina Mass Storage Contract 204J

Contract Number: 204J Term: through March 31, 2019

North Carolina Mass Storage Contract 204X

Contract Number: 204X Term: through

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2019 (with 2 option years)

Pennsylvania Office of Administration

Contract Number: 4400004252, Contract Expiration: December 19, 2021

State of Alaska Cloud Solutions Contract- NASPO

Alaska Contract Number: NVP-2018-CLOUD-0002 Base Contract Number: AR2472 Contract Expiration: September 15, 2026

State of Arkansas Cloud Solutions Contract- NASPO

Arkansas Contract Number: 4400010663 Base Contract Number: AR2472 Contract Expiration: September 16, 2026

State of Delaware Cloud Solutions Contract- NASPO

Delaware Contract Number: GSS177930CLOUD_SOL Base Contract Number: AR2472 Contract Expiration: September 16, 2026

State of Florida Department of Management Services Cloud Solutions Contract- NASPO

The State of Florida has entered into a contract with Carahsoft for Cloud Solutions. This contract vehicle is an Alternate Contract Source that acts as an extension of Carahsoft’s NASPO ValuePoint contract. All public agencies within the State of Florida are able to utilize this contract vehicle to procure cloud solutions via a state contract.

State of Hawaii Cloud Solutions Contract - NASPO

Hawaii Contract Number: 17-18 Base Contract Number: AR2472 Terms: September 16, 2026

State of Indiana Contract

Contract Number: 0000000000000000000021430 Term: August 1, 2017 – July 31, 2019

State of Kansas Cloud Solutions Contract- NASPO

Kansas Contract Number: 0000000000000000000043262 Base Contract Number: AR2472 Contract Expiration: September 16, 2026

State of Louisiana Cloud Solutions Contract- NASPO

Lousiana Contract Number: 4400010663 Base Contract Number: AR2472 Contract Expiration: September 16, 2026

State of Minnesota Cloud Solutions Contract- NASPO

MINNESOTA CONTRACT NUMBER:128340 CONTRACT EXPIRATION: September 15, 2026

State of Nebraska Cloud Solutions Contract- NASPO

The State of Nebraska has entered into a contract with Carahsoft for Cloud Solutions. This contract vehicle is an Alternate Contract Source that acts as an extension of Carahsoft’s NASPO ValuePoint contract. All public agencies within the State of Nebraska are able to utilize this contract vehicle to procure cloud solutions via a state contract.

State of Nevada Cloud Solutions Contract- NASPO

Nevada Contract Number: 4400010663 Base Contract Number: AR2472 Contract Expiration: September 16, 2026

State of New Mexico Contract

Contract Number: 80-000-18-00002 Contract Period: August 1, 2017 – August 1, 2021

State of Oklahoma Cloud Solutions Contract- NASPO

Oklahoma Contract Number: SW10022C Base Contract Number: AR2472 Contract Expiration: September 16, 2026

State of Utah Cloud Solutions Contract - NASPO

Contract Number: AR2472 Contract Expiration: September 16, 2026

State of Virginia Cloud Solutions Contract- NASPO

Washington Contract Number: VA-170801-CARA Base Contract Number: AR2472 Contract Expiration: September 15, 2026

State of Washington Cloud Solutions Contract- NASPO

Washington Contract Number: 05116 Base Contract Number: AR2472 Contract Expiration: September 16, 2026

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021


Education Contracts

Massachusetts Higher Education Consortium (MHEC)

MHEC is a state purchasing consortium comprised of Massachusetts public institutions of higher education as well as a few private colleges known as the Five Colleges, Inc buying group, including Amherst College, Smith College, Mount Holyoke College, Hampshire College, and the University of Massachusetts Amherst. The organization goal is to provide and manage contracts for goods and services using group buying practices for its member institutions.

NJEdge

NJEDGE VMware Contract: 00278834 Contract Period: Through June 30, 2020

The Quilt

The Quilt


Events

Upcoming Events

August 01, 2019 at 2:00 PM ET

Archived Events

News

Latest News

Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, today announced that it has been awarded a blanket purchase agreement (BPA) via the Space and Naval Warfare Systems Center ...
READ MORE >
Program promotes the sharing of valuable threat information between DOD and industry
READ MORE >
Symantec’s Annual Threat Report Reveals More Ambitious, Destructive, and Stealthy Attacks, Raising the Stakes for Organizations
READ MORE >
MOUNTAIN VIEW, Calif. – Feb. 12, 2019 – Symantec Corp. (NASDAQ: SYMC), the world’s leading cyber security company, today announced the acquisition of Luminate Security, a privately held company ...
READ MORE >
New endpoint security offerings now available as part of Symantec’s Integrated Cyber Defense Platform
READ MORE >
MOUNTAIN VIEW and SUNNYVALE, Calif., Dec. 11, 2018 (GLOBE NEWSWIRE) -- Symantec Corp. (NASDAQ: SYMC), the world’s leading cyber security company, and Fortinet (NASDAQ: FTNT), a global leader in ...
READ MORE >
Symantec Industrial Control System Protection Neural to defend against USB-borne malware, network intrusion and zero-day attacks on operational technology
READ MORE >
DHS to sponsor the company’s cloud and data-level security products through the authorization process
READ MORE >
Symantec supports law enforcement to dismantle cyber crime ring responsible for tens of millions of dollars in losses, resulting in three arrests
READ MORE >
Symantec’s Artificial Intelligence-based Targeted Attacks Analytics spotted the previously unknown Gallmaker group and its under-the-radar techniques
READ MORE >
Integrated approach to cloud security, compliance and management delivers ‘no compromises’ visibility and control to IaaS, PaaS and SaaS applications
READ MORE >
Cyber experts from federal civilian, defense, intelligence and state/local agencies to discuss the need to redefine how government approaches security
READ MORE >
Alleged Fraudsters Arrested in The United States and Abroad for Business Email Compromise Schemes
READ MORE >
Only cloud solution to integrate security into DevOps workflows to protect cloud workloads and storage against malware and threats
READ MORE >
Innovation represents major step forward in the fight against sophisticated phishing, account takeover, and ransomware attacks
READ MORE >
Law Enforcement Learn How to Thwart Identity Thieves Who’ve Affected Nearly 60 million Americans
READ MORE >
Symantec’s AI-based Targeted Attack Analytics spotted the malicious behavior hidden in legitimate IT administration tools
READ MORE >
Network Security for the Cloud Generation delivers comprehensive, cloud-based protection from network to endpoint to reduce risk and protect enterprises as businesses move to the cloud
READ MORE >
AI and machine learning innovations automate capabilities of Symantec’s world-class investigations team to zero in on the most pressing threats
READ MORE >
Annual Threat Report from Symantec Reveals One in Ten Targeted Attack Groups Use Malware Designed to Disrupt
READ MORE >
This is the first step in the company’s cloud security certification strategy
READ MORE >
Symantec integrates applications with advanced threat protection features to bring improved performance and lower costs for cloud applications
READ MORE >

Resources

SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC

Datasheet

It's an exciting time in education. Teachers are leveraging technology for initiatives such as e-learning and flipped classrooms. Students are using smartphones, laptops, and tablets to conduct research, take tests, and team up on assignments via social media platforms. To help institutions embrace ...

Formerly Skycure Mobile Threat Defense, Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown thre...

Symantec CloudSOC Audit discovers and monitors all the cloud apps being used in your organization and highlights any risks and compliance issues they may pose. View our datasheet to learn more.

To secure physical and virtual servers, IT professionals have relied on traditional protection technologies such as antivirus. While these remain essential layers of defense and hygiene, today’s threat landscape warrants augmenting with real-time and proactive security to provide sufficient protec...

Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that cannot be stopped by antivirus alone. It’s time to move beyond antivirus. Symantec’s unique ability to provide intelligent security leverages the collective wisdom of the world...

Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high1. The threat environment is evolving quickly and given the size and complexity of today's networks, organizations are struggling to keep up. Symantec™ Endpoint Protection ...

Are you paying for unused software licenses? Are you prepared for your next vendor software audit? Take control with Symantec™ Asset Management Suite 7.6 powered by Altiris™ technology. In combination with Symantec™ Client Management Suite 7.6 powered by Altiris™ technology...

Smart, comprehensive email security—whether your email system is on-premises, cloud-based, or both—begins with a clear, realistic understanding of what you’re up against. Email is still the most popular and pervasive tool cybercriminals use to launch and distribute threats including spear phis...

As agencies migrate email to the cloud—a move viewed by the administration as an integral element of modernization—cyber security must be part of the strategy. Although malicious actors now exploit a growing range of attack vectors, email remains by far the most popular.View this data sheet to l...

Infographic

When it comes to responding to the current cyber threat landscape, innovation is a must. The problem is not just that threats are growing more numerous and sophisticated, it’s also that agencies have an increasingly complex environment to secure. Each aspect of the enterprise—from the data cente...