Integrated Cyber Defense

Unifying cloud and on-premises security to provide advanced threat protection and information protection across all endpoints, networks, email, and cloud applications.

arrows

Control Points

Endpoint Security

A single agent architecture delivers multi-layered security across all possible endpoints - desktop, server, mobile, and IoT - protecting enterprise and mobile workforces regardless of OS, device, or network security approach.

Learn More >

Network Security

Cloud and on-premises network security solutions, based on an advanced proxy architecture, provide superior defense against advanced threats, protect critical business information, and help ensure secure and compliant use of the cloud and web.

Learn More >

Email Security

Multiple layers of protection (including threat isolation) against ransomware, spear phishing and business email compromise, together with advanced analytics to identify targeted attacks, protecting email against user error and data leakage.

Learn More >

Cloud Security

Advanced solutions that secure cloud access, cloud infrastructure and cloud applications, providing in-depth visibility, data security, and threat protection to safeguard users, information and workloads across public and private clouds.

Learn More >

Core Functions

Threat Protection

Multiple layers of threat prevention, detection and recovery, and forensic technologies provide a complete view of malicious activities across control points, so all instances of a threat can be contained, investigated and remediated.

Learn More >

Information Protection

Encryption, data loss prevention, multi-factor authentication, tagging, and analytics ensure that confidential information and IT assets are protected and in compliance at all times, wherever it is stored, and that only authenticated users are able to gain access.

Learn More >

Compliance Enforcement

A suite of governance, risk and compliance tools help customers inventory their IT assets, evaluate vulnerabilities, govern information access, and automate compliance reporting for more than 100 regulatory and best practice frameworks including GDPR, HIPAA, NIST, PCI and SWIFT.


Foundations

Threat Intelligence

The world's largest civilian threat intelligence network applies deep security research, expert analysis and artificial intelligence to monitor and synthesize 9 trillion rows of telemetry daily, helping discover and block targeted attacks and cyber crime that would otherwise go undetected.

Learn More >

Security Operations Services

A combination of global cyber defense centers, certified cyber security professionals, and proven processes that deliver the deep visibility and expertise required to stay ahead of today's advanced threats.

Learn More >

Open Ecosystem

A rich set of open APIs (application programming interfaces) with over 100 certified technology partners creating the broadest ecosystem in cyber security, enabling a coordinated and best-in-class approach to threat protection, detection and response.

Learn More >

BLOG

The Story Behind Symantec’s Full-Court Press on Innovation

Read More

BLOG

There Are No Heroes: The Industry-Wide Move to Integrated Cyber Defense

Read More