Video Screencast Help
Symantec Appoints Michael A. Brown CEO. Learn more.
Partners Community Blog
Showing posts tagged with EMEA
Showing posts in English
Robert Mencini | 29 Apr 2013 | 1 comment

Here is a great resourse from the Archiving and eDiscovery Community for those of you that are working with Enterprise Vault and come acros 8390 Errors.

Need Help Troubleshooting Enterprise Vault Event 8390 Errors?

Thanks,

Eileen

Christy Loerzel | 11 Apr 2013 | 0 comments

You’ve seen the headlines and heard your friends buzzing about it, but have you checked out Reddit? Everyone from U.S. President Barak Obama to Microsoft founder Bill Gates is using it to engage, answer questions and promote initiatives. But have you considered how to incorporate it into your social media program as a Symantec partner?

If you are unfamiliar with Reddit, it is an online social media community where users vote on content. There are sub-communities, or subreddits, that any user may create that are independent and moderated by a team of volunteers. Some subreddits cater to a more technical audience – such as r/sysadmin and r/vmware subreddits. Reddit users...

Eddie_Toro | 25 Mar 2013 | 0 comments

Deepen your trusted advisor relationship and confidently guide your customers through Mobility challenges with critical information and resources that align with, and support your sales cycle.  Download Symantec’s Mobility Specialist Activation Module to your desktop, get specialized, and deliver superior value to your customers more quickly and easily. 

The Mobility Resource Guide has been updated to include an overview of the Specialist Activation Module and contains details on how to access the module within the Symantec Enablement Toolkit.

Christy Loerzel | 18 Mar 2013 | 0 comments

 

Hashtags—or # symbols, such as #SYMCPartners—are digital markers used to identify keywords or topics in a Tweet on Twitter. They were created organically on Twitter by users as a way to categorize and find messages more easily.

According to Twitter:

  • People use the hashtag symbol # before a relevant keyword or phrase (no spaces) in a Tweet to categorize the Tweet and help it show up more easily in a Twitter Search—think of it as you would a keyword entered into a search in Google or Bing—an identifiable word or phrase so you can more quickly find what you’re looking for.
  • Clicking on a “hashtagged” word in any message shows you all other Tweets marked with that tag or keyword.
  • Hashtags can be used anywhere in a Tweet—at the beginning, middle or end.
  • “...
Eileen | 14 Mar 2013 | 2 comments

Hello Partners,

As part of my new role on Connect managing the Archiving and eDiscovery Community (and Partner Community) I've just learned about a new set of documents created by the EV Content Council that you may find helpful:

You can find the necessary information on the various accounts and users that are involved in an Enterprise Vault environment, as well as the permissions required by each.
 
Enterprise Vault Accounts and Permissions
http://www.symantec.com/docs/TECH76700
 
Compliance Accelerator and Discovery Accelerator Accounts and Permissions
http://www.symantec.com/docs/TECH200788

As always, if you have any feedback on the documents or suggestions  please do leave a comment.
 
 

Caroline_Garrett | 08 Mar 2013 | 3 comments

 

The biggest mobile industry event took place last month in Barcelona when Mobile World Congress came to town!  
 
More than 72,000 attendees from 200 countries were treated to a wealth of learning and networking opportunities; product showcases and announcements; inspiration and innovation during the 4 day event.
 
The Symantec stand generated lots of attention from customers, partners, press and analysts, all keen to hear about a solution to secure mobile information traffic.  The most popular request for information was around how to respond to the increasing appetite for secure applications and data providing in a self service environment.  Many organisations today are becoming overwhelmed with maintaining proper security and governance while still ensuring they provide services that meet their customers' expectations for productivity and innovation...
Christy Loerzel | 06 Mar 2013 | 0 comments

 

Chances are, you’re used to measuring your success or progress both personally and professionally. Personally, you might measure success by how well you’re doing toward paying down a credit card or mortgage or putting money in savings. Professionally, you may measure success by meeting a sales quota, hitting a deadline or delivering a projected number of leads on an email campaign. Regardless of where and what you measure, success typically comes down to meeting a goal or progressing toward it.

Social media success is the same; it’s about having a goal and meeting that goal or, at least, seeing regular improvement toward that goal.

You can break down measuring your success with social media into a few simple steps:

  • Determining what social goals will contribute to improving your ...
Eddie_Toro | 27 Feb 2013 | 1 comment

Capitalize On The Market’s Rapid Adoption Of Mobile Devices

Drive increased revenue and become your customers’ trusted advisor by providing the integrated mobile management, protection, and security solutions they need to confidently deliver and manage applications to users anywhere, anytime.

More:

 

Increase Revenue by Helping Customers Realize the Promise of Virtualization

Help your customers’ take decisive steps in extending the benefits of virtualization to even their most business-critical applications and build desired private cloud services on existing infrastructure that are both secure and compliant.

Learn about the latest trends and best practices in selling virtualization solutions.

...

NatalieM | 27 Feb 2013 | 0 comments

 

According to IDC*, over $12bn will be spent on virtualization in 2013 and so it appears that the key benefits of space reduction, improved asset utilization and reduced power consumption are pretty well accepted in the market.  So with these benefits in mind, telling them that applying IT Security Controls to the new infrastructure will hardly fill them with joy.  But why is this the case? Surely everything is more efficient in such an environment? Not quite the case and here are some of the challenges faced:

 

  Challenge Options
Endpoint Security Organizations that wish to run virtualized endpoints can find that machines all scan the same content and often, because they are completely independent from each other.  Scans will run at the same time crippling the physical server’s...
Eddie_Toro | 26 Feb 2013 | 0 comments

The ramifications of unauthorized access to confidential information are dire: non-compliance, financial penalties, and theft of intellectual property. Sophisticated network attacks have rendered simple password authentication insufficient to protect an organization against unauthorized access to its network and applications.

Symantec™ Validation and ID Protection Service (VIP) is a leading cloud-based strong authentication service that can enable your customer’s enterprises to secure access to networks and applications while preventing access by malicious unauthorized attackers.

Go to Symantec.com for more:

Go to PartnerNet for sales tools, training, and other partner-specific materials.