Video Screencast Help
Partners Community Blog
Showing posts tagged with EMEA
Showing posts in English
Eileen | 14 Mar 2013 | 2 comments

Hello Partners,

As part of my new role on Connect managing the Archiving and eDiscovery Community (and Partner Community) I've just learned about a new set of documents created by the EV Content Council that you may find helpful:

You can find the necessary information on the various accounts and users that are involved in an Enterprise Vault environment, as well as the permissions required by each.
 
Enterprise Vault Accounts and Permissions
http://www.symantec.com/docs/TECH76700
 
Compliance Accelerator and Discovery Accelerator Accounts and Permissions
http://www.symantec.com/docs/TECH200788

As always, if you have any feedback on the documents or suggestions  please do leave a comment.
 
 

Caroline_Garrett | 08 Mar 2013 | 3 comments

 

The biggest mobile industry event took place last month in Barcelona when Mobile World Congress came to town!  
 
More than 72,000 attendees from 200 countries were treated to a wealth of learning and networking opportunities; product showcases and announcements; inspiration and innovation during the 4 day event.
 
The Symantec stand generated lots of attention from customers, partners, press and analysts, all keen to hear about a solution to secure mobile information traffic.  The most popular request for information was around how to respond to the increasing appetite for secure applications and data providing in a self service environment.  Many organisations today are becoming overwhelmed with maintaining proper security and governance while still ensuring they provide services that meet their customers' expectations for productivity and innovation...
Christy Loerzel | 06 Mar 2013 | 0 comments

 

Chances are, you’re used to measuring your success or progress both personally and professionally. Personally, you might measure success by how well you’re doing toward paying down a credit card or mortgage or putting money in savings. Professionally, you may measure success by meeting a sales quota, hitting a deadline or delivering a projected number of leads on an email campaign. Regardless of where and what you measure, success typically comes down to meeting a goal or progressing toward it.

Social media success is the same; it’s about having a goal and meeting that goal or, at least, seeing regular improvement toward that goal.

You can break down measuring your success with social media into a few simple steps:

  • Determining what social goals will contribute to improving your ...
Eddie_Toro | 27 Feb 2013 | 1 comment

Capitalize On The Market’s Rapid Adoption Of Mobile Devices

Drive increased revenue and become your customers’ trusted advisor by providing the integrated mobile management, protection, and security solutions they need to confidently deliver and manage applications to users anywhere, anytime.

More:

 

Increase Revenue by Helping Customers Realize the Promise of Virtualization

Help your customers’ take decisive steps in extending the benefits of virtualization to even their most business-critical applications and build desired private cloud services on existing infrastructure that are both secure and compliant.

Learn about the latest trends and best practices in selling virtualization solutions.

...

NatalieM | 27 Feb 2013 | 0 comments

 

According to IDC*, over $12bn will be spent on virtualization in 2013 and so it appears that the key benefits of space reduction, improved asset utilization and reduced power consumption are pretty well accepted in the market.  So with these benefits in mind, telling them that applying IT Security Controls to the new infrastructure will hardly fill them with joy.  But why is this the case? Surely everything is more efficient in such an environment? Not quite the case and here are some of the challenges faced:

 

  Challenge Options
Endpoint Security Organizations that wish to run virtualized endpoints can find that machines all scan the same content and often, because they are completely independent from each other.  Scans will run at the same time crippling the physical server’s...
Eddie_Toro | 26 Feb 2013 | 0 comments

The ramifications of unauthorized access to confidential information are dire: non-compliance, financial penalties, and theft of intellectual property. Sophisticated network attacks have rendered simple password authentication insufficient to protect an organization against unauthorized access to its network and applications.

Symantec™ Validation and ID Protection Service (VIP) is a leading cloud-based strong authentication service that can enable your customer’s enterprises to secure access to networks and applications while preventing access by malicious unauthorized attackers.

Go to Symantec.com for more:

Go to PartnerNet for sales tools, training, and other partner-specific materials.
 

Christy Loerzel | 25 Feb 2013 | 0 comments

In January, the Symantec Partner Communication team hosted its first ever Google+ Hangout. It was a great success and a great way to connect face to face with partners and customers. On February 19, we did it again focusing this time on Backup Exec V-Ray Edition, “So what, exactly, is this Backup Exec V-Ray Edition?”

Matt Stephenson, Product Marketing Manager and Scott Baker, Product Manager from Symantec's Backup Exec team came together to help users and partners understand Symantec Backup Exec V-Ray Edition and its licensing options.

Some of the topics discussed were:

  • The meaning of ‘per processor’ licensing
  • Features included in the Backup Exec V-Ray Edition
  • How the Backup Exec V-Ray Edition works in virtual and physical environments
  • Licensing scenarios for Backup Exec V-Ray Edition

Check out the...

Eddie_Toro | 07 Feb 2013 | 0 comments

Securing access to networks and applications.

Sophisticated network attacks have rendered simple password authentication insufficient to protect an organization against unauthorized access to its network and applications. The ramifications of unauthorized access to confidential information are dire: non-compliance, financial penalties, and theft of intellectual property.

Symantec™ Validation and ID Protection Service (VIP) is a leading cloud-based strong authentication service that can enable your customer’s enterprises to secure access to networks and applications while preventing access by malicious unauthorized attackers.

Features:

  • Cloud-based infrastructure—Secure, reliable, and scalable service delivers authentication without requiring dedicated on-premise server hardware.
  • Transparent risk-based token-less authentication— Leverage device and behavior profiling to block risky...
Eddie_Toro | 25 Jan 2013 | 0 comments

On January 23, Symantec announced a new strategy to significantly improve performance for you and your customers. We plan to improve existing products and services, and at the same time develop new, innovative products and services. We will also transform the Partner Program to better support your business. Partner Program changes will occur in phases. We’ll keep you informed as details are available. For now, it is business as usual. 

 Read  more.

KellyM | 17 Jan 2013 | 1 comment

To help our valued partners better understand and utilize social media to connect with current and prospective customers, Symantec has kicked off a social media blog series just for you here on Symantec Connect. Find the full series content here. And bookmark this page as we'll be adding new posts as we make them.

In the series so far—from newest to oldest: