
We stop threats hiding in plain sight.
Endpoint, Network, Email, Cloud. However they attack, we've got you covered.
Welcome to Integrated Cyber Defense
The strongest cyber defense platform powered by the world's largest and most dynamic civilian threat intelligence network.
A Leader In More Cyber Security Categories Than Any Other Company
Endpoint Security
Symantec is named a Leader once again in 2019 Gartner Magic Quadrant for Endpoint Protection Platforms
Data Loss Prevention
Symantec positioned as a Leader in The Forrester Wave?: Data Security Portfolio Vendors, Q2 2019
Secure Web Gateway
11 Times Running, Gartner Magic Quadrant Leader for Secure Web Gateways
Cloud Access Security Broker
Symantec Named a Leader Again in the Gartner Magic Quadrant for CASB
Email Security
Symantec named a Leader in The Forrester Wave?: Enterprise Email Security, Q2 2019
Managed Security Services
For 15 years running, Symantec is a Leader in Gartner's 2019 Magic Quadrant for Managed Security Services, Worldwide.
Symantec Product Categories
Our integrated products offer unparalleled protection and insight to reduce risk and lower costs across your entire organization.
Advanced Threat Protection
Gain control with multiple layers of threat prevention, detection, and forensic technology
Information Protection
Shield your critical data, wherever it lives
Endpoint Security
Protect your users and critical assets with multilayered security
Email Security
Protect your email in the cloud and on-premises
Web & Network Security
Secure Web Gateway (SWG) for the Cloud Generation
Cloud App Security
Safeguard users, information, and workloads across public and private clouds
Cyber Security Services
Depend on our warriors to fortify your security
Symantec Blogs: Feature Stories
Symantec Mobile Threat Defense: Using Mobile to Stay One Step Ahead of PC Attacks
SEP Mobile detects harmful PC files on Android devices, stopping attackers from reaching their traditional endpoint...
Posted: 09 Sep, 2019 | 5 Min Read
Phishing for a Proactive Security Culture
How to drive a measurable reduction in security risk using phishing simulations
Posted: 05 Sep, 2019 | 5 Min Read
Fighting Ransomware? Get Ready for the Hunt
State and local governments should implement two-factor authentication, adopt a defense-in-depth security approach
Posted: 03 Sep, 2019 | 3 Min Read