Symantec Integrated Cyber-Defense Platform
Find Integrations by:
Symantec Products
Certified Partner Solutions
Symantec Products

Cloud Workload Protection
Automates security for public cloud workloads, enabling business agility, risk reduction, and cost savings for organizations
Confidently leverage cloud applications and services while staying safe, secure and compliant
Content Analysis & Malware Analysis
Detect and block advanced threats with multiple-layer inspection and customizable sandboxing
Control Compliance Suite
Automate security and compliance assessments across physical and virtual data centers, and across public clouds
Cyber Security Services
Strengthen your security posture by allowing for a quicker and more comprehensive response to emerging threats
Data Center Security
Complete server protection, monitoring, and workload micro-segmentation for private cloud and physical on-premises data center environments
Via API integration, DeepSight intelligence provides threat insights which improve detection, prioritization and remediation
Discover, monitor and protect your sensitive data with the industry’s leading data loss prevention solution
Email Security
Safeguard your cloud-based email with our industry-leading threat and anti-spam protection for Office 365, Google Apps, and more
Safeguard data on computers, laptops, tablets, hard drives, removable media, files, email systems, and SaaS
Endpoint Detection and Response (EDR)
Uncover, prioritize, investigate, remediate complex attacks across endpoint, email, network, and web from one console
Global Intelligence Network (GIN)
GIN synthesizes intelligence from 175 million endpoints to stop 99.9 percent of new and emerging threats every day
Information Centric Security
Protect data shared outside the organization with policy driven encryption and identity-based access
IT Management Suite
Securely manage all your endpoints — deploy new devices and apps, manage software licenses, and remediate vulnerabilities
Secure Web Gateway
Protect your organization in the cloud, from the web to social media to mobile networks, with the industry leading on-premises secure web gateway
Security Analytics
Deliver enriched packet capture for full network security visibility, advanced network forensics, anomaly detection, and real-time content inspection for all network traffic
SEP (Endpoint Protection)
Multilayered endpoint security combining advanced signatureless protections including Advanced Machine Learning with critical endpoint technologies
SEP Mobile
Helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyber attacks
SSL Visibility
Gain visibility into the blind-spot impacting your security tools while maintaining privacy compliance
Symantec Protection Engine
A flexible and feature-rich client/server application that allows customers to incorporate malware and threat detection technologies into almost any application
Prevent unauthorized access to networks, applications, and the cloud with easy to use multi-factor and risk-based authentication
Web Isolation
Prevent malware and phishing threats while allowing broad web access by remotely executing web sessions, away from users' devices
Web Security Service
Enterprise-class, cloud-based, secure web gateway service integrating web/cloud access control with advanced threat protection
Certified Partner Solutions

Anti-Virus/Anti-Malware software security vendors
Automation & Orchestration
Security Orchestration & Response (SOAR) vendors
Certificate & Key Management
Cryptographic key & digital certificate management vendors
Cloud Apps (SaaS)
Software as a Service applications, SFDC, Box, Dropbox etc.
Cloud Infrastructure (IaaS)
Cloud Infrastructure as a Service providers, AWS, Azure, GCP etc.
Data Classification and Protection
Data classification & tagging vendors
Data Storage
Storage Area Network, Local attached storage vendors
Database Security
Vendors providing database monitoring and security
Email Authentication
Domain-based Message Authentication, Reporting & Conformance email authentication vendors
Vendors providing encryption technology and services
Endpoint Detection/Response (EDR)
EDR vendors focusing on detecting, investigating and mitigating suspicious activities
Enterprise Mobility Management (EMM)
EMM is the set of people, processes and technology to manage computers and mobile devices
GRC & Vulnerability Mgmt
Governance, Risk Management and Compliance Management & Vulnerability Management
Hardware Security Module (HSM)
Certified security storage for managing digital keys
Vendors specializing in healthcare and medical applications
Identity, Access & Privilege Mgmt
Identity, Access & Privilege management vendors providing tools for controlling user access to critical systems
Load Balancer
Allowing distribution of workloads across multiple compute/security tools and resources
Malware Sandboxing
Vendors focused on dynamic or behavioural malware analysis
Networking Devices
Networking equipment including switches, routers, Firewalls, IDS/IPS, Cluster servers, etc.
OS Platforms
Operating Systems, including Linux, Microsoft etc.
Policy Mgmt & Reporting
Security Management & Automation vendors
Software-defined WAN and/or perimeter vendors
Secure File Transfer
Vendors focused on secure data movement
SIEM / Visualization
Security, Information and Event Management Vendors & SOC Tools
Threat Intelligence
Vendors focused on aggregating, correlating and analyzing threat data
User & Entity Behavior Analytics
Virtualization / Containers
Application & OS virtualization or container based virtualization companies