Symantec Integrated Cyber Defense 在「2018 年第 4 季 The Forrester Wave™︰Zero Trust eXtended (ZTX) 生態系統供應商報告」中被評選為領導者



Integrated Cyber Defense

Symantec’s Integrated Cyber Defense (ICD) Platform unifies products, services and partners to drive down the cost and complexity of cyber security, while protecting enterprises against sophisticated threats. ICD combines information protection, threat protection, identity management, compliance and other advanced services, powered by shared intelligence and automation across endpoints, networks, applications, and clouds.


Control Points

Endpoint Security

A single agent architecture delivers multi-layered security across all possible endpoints - desktop, server, mobile, and IoT - protecting enterprise and mobile workforces regardless of OS, device, or network security approach.

Learn More >

Web & Network Security

Cloud and on-premises network security solutions, based on an advanced proxy architecture, provide superior defense against advanced threats, protect critical business information, and help ensure secure and compliant use of the cloud and web.

Learn More >

Email Security

Multiple layers of protection (including threat isolation) against ransomware, spear phishing and business email compromise, together with advanced analytics to identify targeted attacks, protecting email against user error and data leakage.

Learn More >

Cloud App Security

Advanced solutions that secure cloud access, cloud infrastructure and cloud applications, providing in-depth visibility, data security, and threat protection to safeguard users, information and workloads across public and private clouds.

Learn More >

Advanced Services

Information Protection

Encryption, data loss prevention, multi-factor authentication, tagging, and analytics ensure that confidential information and IT assets are protected and in compliance at all times, wherever it is stored, and that only authenticated users are able to gain access.

Learn More >

Threat Protection

Multiple layers of threat prevention, detection and recovery, and forensic technologies provide a complete view of malicious activities across control points, so all instances of a threat can be contained, investigated and remediated.

Learn More >

Identity Management

Cloud-based authentication service with multi-factor authentication to cloud apps, network, and VPN to reduce the risk of breaches and unauthorized access.

Compliance Enforcement

A suite of governance, risk and compliance tools help customers inventory their IT assets, evaluate vulnerabilities, govern information access, and automate compliance reporting for more than 100 regulatory and best practice frameworks including GDPR, HIPAA, NIST, PCI and SWIFT.

Third-Party Applications

Over 250 TIPP-certified integrations enhance productivity for Security Operations and Incident Response teams while extending the value of current cyber investments.

Learn More >

Cyber Security Services

Cyber Security Services

Integrated portfolio including Managed Security Services, Incident Response, and DeepSight Threat Intelligence, driven by our unequaled cyber security warrior network.

Learn More >

Platform Foundations

Threat Intelligence

The world's largest civilian threat intelligence network applies deep security research, expert analysis and artificial intelligence to monitor and synthesize 9 trillion rows of telemetry daily, helping discover and block targeted attacks and cyber crime that would otherwise go undetected.

Learn More >

AI and Machine Learning

Artificial Intelligence and Machine Learning analyze massive amounts of control point data and sift through Symantec's entire telemetry set to identify potential threats and accelerate response and remediation.

APIs and ICD Exchange

APIs and the ICD Exchange vastly simplify integrations with ICD, providing enhanced protection, investigation, and remediation across Symantec endpoints, networks, email, cloud applications, and third-party products.

ICD Manager

Shared management capabilities that will provide customers with unified visibility into threats, policies and incidents, helping them to reduce incident response times from days to minutes.


Built-in automation simplifies investigation, accelerates response times and minimizes damages from attacks, while reducing manual processes and cost of security operations.

Open Ecosystem

Open Ecosystem

A rich set of open APIs (application programming interfaces) with over 100 certified technology partners creating the broadest ecosystem in cyber security, enabling a coordinated and best-in-class approach to threat protection, detection and response.

Learn More >