Darren,
There shouldn't be any need to create separate keys to be used by vendors to encrypt files to you. I have seen customers that do so if they want to have a name that sounds specific to the third parties or separate keys by department if only certain groups are supposed to have access to the key, but public keys are just that. Public. Any number of third parties should be able to use your same public key to encrypt to you unless you have a specific business need to use different keys. If the recipient of the encrypted files stays the same, the same key should be used to keep it simple.
An example of using different keys:
Company A works with your HR department. Users in HR have shared access to a server where Symantec Encryption Desktop is installed. They can each log in to the server to decrypt incoming files. Company A also works with your IT department, and the setup is similar. I would recommend having an IT key and an HR key. If you then have Company B start working with HR for a similar purpose, you could use the existing HR key, and would not necessarily need a different key. Company C starts working with your IT department, but has a security policy that they can only encrypt to a key that will not be used by any other company for encryption (it seems silly if you think about it, since all of the incoming encrypted files can still only be decrypted by the private key holder, which would be the same in this case regardless of what keypair is used for encryption, but I have seen this type of policy out there). Since they have a policy in place requiring that, you could generate a new key.
If you want to have a different key for each company, be sure to keep track of all the passphrases, and you could use the same email address for each if you choose to.