Symantec's Public Sector organization provides a comprehensive portfolio of solutions that help federal agencies, state and local governments, and educational institutions access, manage, and secure their information. From Cyberscope to Cloud First to Data Center Consolidation regulations, these organizations must meet their own regulatory mandates. As technologies evolve and IT complexity increases, Symantec is positioned to provide data management and security solutions that support Public Sector's Mobile, Cloud, Data Center Modernization, and Security initiatives.

As Symantec’s largest government distributor, Carahsoft supports an extensive ecosystem of resellers and consulting partners committed to helping government agencies fulfill their mission to keep critical information safe and available to ensure the continuity of government operations.


  • Mobile

    Agencies with mobile initiatives should consider a comprehensive approach to address diverse use cases. An integrated solution that supports management of user and app access, app and data protection, device management, and threat protection provides a complete mobile management solution. Partner with a brand synonymous with trust and information protection and try Symantec products such as AppCenter or Mobile Management Suite.

  • Altiris and Deployment

    The Symantec Endpoint Management software family of products, powered by Altiris technology, can help you drive down IT costs, improve efficiencies with comprehensive configuration management, take control and automate your IT infrastructure, and much more. Ask about Symantec solutions such as: Asset Management Suite, IT Management Suite, Client Management Suite, Deployment Solutions, Ghost Solution, and Patch Management Solution.

  • Backup and Recovery

    Backup and Recovery, an essential component of any data protection strategy, protects your organization's critical data and systems against data loss and disasters. Backing up your organization's critical data ensures that your business is always up and running, no matter what. Carahsoft is pleased to offer Backup Exec, Netbackup, Desktop Laptop Option, and System Recovery.

  • eDiscovery And Archiving

    Archiving and electronic discovery are critical components of a holistic information governance strategy. By leveraging software such as Clearwell and Enterprise Vault, users are able to establish policies to classify and retain electronic information and search that data to identify relevant content in response to litigation or an investigation.

  • Storage Management and High Availability

    The world runs 24/7/365 on applications and data. A high availability architecture with automated service recovery keeps your data, applications, and infrastructure available and optimized as demand grows. Symantec solutions, such as Storage Foundation High Availability and Disaster Recovery, ApplicationHA, and Cluster Server, provide end-to-end visibility and optimization across physical, virtual, and heterogeneous environments. With more than 20 years of experience and innovation, Symantec solutions are trusted by the world’s leading commercial banks, government agencies, financial data services, computer software, and telecommunications companies.

  • Government Risk and Compliance

    With Control Compliance Suite and Risk Automation Suite, customers are able to harden the data center, prioritize security remediation, orchestrate enterprise IT security and risk management, and support continuous assessments for Cyber Security and Continuous Monitoring.

  • Security

    Symantec security solutions are backed by world-class intelligence to help you identify threats in real time and keep your information safe. When you can do it safely, you can do it all. Without complete visibility into your environment and the current threat landscape, it’s easy to be blindsided by an attacker and for security incidents to go undetected. Build a cyber resilience strategy fueled by security intelligence and safeguard your organization from targeted attacks and advanced persistent threats. Ask us about Endpoint Protection, Critical Systems Protection, Protection Suite, Data Center Security, Data Loss Prevention, and, Encryption.

  • Authentication and ID Protection

    Symantec Validation and ID Protection Service is a leading cloud-based strong authentication service that enables enterprises to secure access to networks and applications while preventing access by malicious unauthorized attackers. Built on Symantec’s proven, globally managed, highly reliable infrastructure, Symantec Managed PKI Service reduces the cost and complexity associated with in-house PKI and focuses enterprises on delivering solutions, instead of infrastructure.


GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

SEWP Contracts


Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020

Federal Contracts


ITES-SW Contract # W52P1J-15-D-0008 Term: March 2015 - March 2020

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021


Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Department of General Services PA - Symantec

Contract # 4400004253 Valid through December 19, 2021

eVA- Virginia's Total e-Procurement Solution

Vendor ID #: E51768

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027

National Cooperative Purchasing Alliance (NCPA)

Term: through April 30, 2019

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2019 (with 2 option renewal years)

North Carolina Mass Storage Contract

Contract Number: 204J Term: through March 31, 2019

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Oklahoma DIR Contract # SDD-1803

Vendor: Symantec Term: September 13, 2012 - September 13, 2016

Orange County National IPA Co-Op

Through May 31, 2019 (with 2 option years)

Pennsylvania Office of Administration - ITQ

Pennsylvania Office of Administration Master Contract: 4400004480

State of Alaska Cloud Solutions Contract- NASPO

Alaska Contract Number: NVP-2018-CLOUD-0002 Base Contract Number: AR2472 Contract Expiration: September 15, 2026

State of Arkansas Cloud Solutions Contract- NASPO

Arkansas Contract Number: 4400010663 Base Contract Number: AR2472 Contract Expiration: September 16, 2026

State of Delaware Cloud Solutions Contract- NASPO

Delaware Contract Number: GSS177930CLOUD_SOL Base Contract Number: AR2472 Contract Expiration: September 16, 2026

State of Hawaii Cloud Solutions Contract - NASPO

Hawaii Contract Number: 17-18 Base Contract Number: AR2472 Terms: September 16, 2026

State of Kansas Cloud Solutions Contract- NASPO

Kansas Contract Number: 0000000000000000000043262 Base Contract Number: AR2472 Contract Expiration: September 16, 2026

State of Louisiana Cloud Solutions Contract- NASPO

Lousiana Contract Number: 4400010663 Base Contract Number: AR2472 Contract Expiration: September 16, 2026

State of Nebraska Cloud Solutions Contract- NASPO

The State of Nebraska has entered into a contract with Carahsoft for Cloud Solutions. This contract vehicle is an Alternate Contract Source that acts as an extension of Carahsoft’s NASPO ValuePoint contract. All public agencies within the State of Nebraska are able to utilize this contract vehicle to procure cloud solutions via a state contract.

State of Nevada Cloud Solutions Contract- NASPO

Nevada Contract Number: 4400010663 Base Contract Number: AR2472 Contract Expiration: September 16, 2026

State of Oklahoma Cloud Solutions Contract- NASPO

Oklahoma Contract Number: SW10022C Base Contract Number: AR2472 Contract Expiration: September 16, 2026

State of Utah Cloud Solutions Contract - NASPO

Contract Number: AR2472 Contract Expiration: September 16, 2026


Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021

Education Contracts

Washington Learning Source Contract

Contract Number: WLS260 Contract Period: 7/23/13 - 7/22/19


Archived Events


Latest News

The full-day conference will be kicked off by a keynote address from Gigi Schumm. Ms. Schumm is in charge of all sales, strategic, and operational functions associated with Symantec's Public Sector ...
Carahsoft Technology Corp., the trusted government IT solutions provider, is proud to host--for the fourth consecutive year--the Symantec Government Technology Summit. This seminar will outline the ...


SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC


John Moore’s presentation highlights Symantec Web Isolation. Web Isolation enables your organization to:-Secure access to uncategorized and risky sites-Protect your most privileged users-Prevent phishing and ransomware attacks


Organizations should learn from the common pitfalls encountered by peers to ensure they get the most out of their investment when incorporating threat intelligence into their security programs. Mistakes include not aligning threat intelligence efforts with strategic business goals, relying on poor o...

How do agencies ensure that only the correct people are provided with access to information? How do they keep data from falling into the wrong hands? How do they maintain their core focus on security while still allowing fast, easy access to critical information? The data sheet looks to answer all o...

The cybersecurity posture of medical devices has increasingly become a concern to healthcare providers, device manufacturers, regulators, and patients. Due to their long useful life, unique care-critical use case, and strict regulatory oversight, these devices tend to have a low security maturity, s...

Email is the most popular and pervasive tool cybercriminals use to launch and distribute threats. According to the Symantec Internet Security Threat Report (ISTR), 1 out of every 244 emails in 2014 contained a malware attack and 5 out of 6 large enterprises were targeted by spear phishing campaigns....

Symantec(tm) Advanced Threat Protection: Network is a new solution, available in either a hardware appliance or virtual machine (VM) form factor, which uncovers and prioritizes advanced attacks entering the organization through the network. The product automatically sends all suspicious files to the...

Symantec(tm) Advanced Threat Protection: Email that uncovers advanced attacks entering your organization through email, by adding unique targeted attack identification and Symantec Cynic(tm) sandbox detection capabilities to existing installations of Symantec(tm) Email Security.cloud. In addition, y...

Symantec(tm) Advanced Threat Protection: Endpoint is a new solution to uncover, prioritize, and remediate advanced attacks across all of your endpoints, leveraging existing investments in Symantec(tm) Endpoint Protection. With one click of a button, you can search for, discover, and remediate any at...

Symantec’s 2017 Internet Security Threat Report (ISTR) offers a comprehensive view of today’s threat landscape, covering topics such as:

Mobile Devices and the Internet of ThingsWeb ThreatsSocial Media, Scams, and Email ThreatsTargeted AttacksData Breaches and PrivacyCloud and Infrastruct...

Facing challenges passing a comprehensive cybersecurity bill, the 112th Congress provided DHS with a preliminary budget to begin work: $183 million to bolster implementation of a federal Continuous Diagnostics and Mitigation (CDM) program that would provide tested continuous monitoring, diagnosis...