Symantec Integrated Cyber-Defense Platform
Find Integrations by:
Symantec Products
Certified Partner Solutions
Back
Symantec Products

Advanced Threat Protection (ATP)
Uncover, prioritize, investigate, remediate complex attacks across endpoint, email, network, and web from one console
Cloud Data Protection
Selectively encrypt or tokenize field-level information in SaaS applications to achieve cloud data protection and compliance
Cloud Workload Protection
Automates security for public cloud workloads, enabling business agility, risk reduction, and cost savings for organizations
CloudSOC
Confidently leverage cloud applications and services while staying safe, secure and compliant
Content Analysis & Malware Analysis
Detect and block advanced threats with multiple-layer inspection and customizable sandboxing
Control Compliance Suite
Automate security and compliance assessments across physical and virtual data centers, and across public clouds
Data Center Security
Complete server protection, monitoring, and workload micro-segmentation for private cloud and physical on-premises data center environments
DeepSight
Via API integration, DeepSight intelligence provides threat insights which improve detection, prioritization and remediation
DLP
Discover, monitor and protect your sensitive data with the industry’s leading data loss prevention solution
Email Security.Cloud
Safeguard your cloud-based email with our industry-leading threat and anti-spam protection for Office 365, Google Apps, and more
Encryption
Safeguard data on computers, laptops, tablets, hard drives, removable media, files, email systems, and SaaS
Global Intelligence Network (GIN)
GIN synthesizes intelligence from 175 million endpoints to stop 99.9 percent of new and emerging threats every day
Incident Response Service
Strategically enable continual security program maturity by identifying recommendations to prevent incident reoccurrence
Information Centric Security
Protect data shared outside the organization with policy driven encryption and identity-based access
IT Management Suite
Securely manage all your endpoints — deploy new devices and apps, manage software licenses, and remediate vulnerabilities
Managed Security Services
Strengthen your security posture by allowing for a quicker and more comprehensive response to emerging threats
Management Center
Unified management and reporting to simplifly web security, mitigate cloud access risks, and enhance threat defenses while reducing management costs
PacketShaper
Protect critical application performance and ensure user experience. Align your network resources with the business priorities.
ProxySG/ASG
Protect your organization in the cloud, from the web to social media to mobile networks, with the industry leading on-premises secure web gateway
Security Analytics
Deliver enriched packet capture for full network security visibility, advanced network forensics, anomaly detection, and real-time content inspection for all network traffic
SEP (Endpoint Protection)
Multilayered endpoint security combining advanced signatureless protections including Advanced Machine Learning with critical endpoint technologies
SEP Cloud
Endpoint Security as a Service for small and medium businesses that provides advanced protection for Windows, Mac, and mobile devices and servers
SEP Mobile
Helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyber attacks
SSL Visiblity
Gain visibility into the blind-spot impacting your security tools while maintaining privacy compliance
Symantec Messaging Gateway
Delivers inbound and outbound messaging security, real-time antimalware protection, advanced threat protection, and data loss prevention
VIP
Prevent unauthorized access to networks, applications, and the cloud with easy to use multi-factor and risk-based authentication
WAN Optimization
Improve user experience, optimize content delivery for WAN & Internet links, accelerate pre-positioned & live video streams
Web Isolation
Prevent malware and phishing threats while allowing broad web access by remotely executing web sessions, away from users' devices
Web Security Services
Enterprise-class, cloud-based, secure web gateway service integrating web/cloud access control with advanced threat protection
Certified Partner Solutions

Anti-Virus
Anti-Virus/Anti-Malware software security vendors
Automation / Orchestration
Security Orchestration & Response (SOAR) vendors
Certificate & Key Management
Cryptographic key & digital certificate management vendors
Cloud Apps (SaaS)
Software as a Service applications, SFDC, Box, Dropbox etc.
Cloud Infrastructure (IaaS)
Cloud Infrastructure as a Service providers, AWS, Azure, GCP etc.
Data Classification
Data classification & tagging vendors
Data Storage
Storage Area Network, Local attached storage vendors
Database Security
Vendors providing database monitoring and security
Deception
Vendors that automate the creation of traps/decoys to stop attackers that have penetrated the network
DMARC
Domain-based Message Authentication, Reporting & Conformance email authentication vendors
Encryption
Vendors providing encryption technology and services
Endpoint Detection/Response (EDR)
EDR vendors focusing on detecting, investigating and mitigating suspicious activities
Enterprise Mobility Management (EMM)
EMM is the set of people, processes and technology to manage computers and mobile devices
GRC & Vulnerability Mgmt
Governance, Risk Management and Compliance Management & Vulnerability Management
Hardware Security Module (HSM)
Certified security storage for managing digital keys
Identity, Access & Privilege Mgmt
Identity, Access & Privilege management vendors providing tools for controlling user access to critical systems
Load Balancer
Allowing distribution of workloads across multiple compute/security tools and resources
Malware Sandboxing
Vendors focused on dynamic or behavioural malware analysis
Networking Devices
Networking equipment including switches, routers, Firewalls, IDS/IPS etc.
OS Platforms
Operating Systems, including Linux, Microsoft etc.
Phishing
Vendors specializing in Phishing intelligence
Policy Mgmt & Reporting
Security Management & Automation vendors
SD-WAN
Software-defined WAN and/or perimeter vendors
Secure File Transfer
Vendors focused on secure data movement
SIEM / Visualization
Security, Information and Event Management Vendors & SOC Tools
Threat Intelligence Platforms
Vendors focused on aggregating, correlating and analyzing threat data
UEBA
User & Entity Behavior Analytics
Virtualization / Containers
Application & OS virtualization or container based virtualization companies

 

Our Product Management and Business Development teams are hard at work bringing more integrations to market for our customers. Check back regularly for new updates.

Learn more about the Symantec Technology Integration Partner Program