Video Screencast Help
Symantec Appoints Michael A. Brown CEO. Learn more.
Partners Community Blog
Showing posts tagged with Asia Pacific
Showing posts in English
Eddie_Toro | 25 Mar 2013 | 0 comments

Deepen your trusted advisor relationship and confidently guide your customers through Mobility challenges with critical information and resources that align with, and support your sales cycle.  Download Symantec’s Mobility Specialist Activation Module to your desktop, get specialized, and deliver superior value to your customers more quickly and easily. 

The Mobility Resource Guide has been updated to include an overview of the Specialist Activation Module and contains details on how to access the module within the Symantec Enablement Toolkit.

Christy Loerzel | 18 Mar 2013 | 0 comments

 

Hashtags—or # symbols, such as #SYMCPartners—are digital markers used to identify keywords or topics in a Tweet on Twitter. They were created organically on Twitter by users as a way to categorize and find messages more easily.

According to Twitter:

  • People use the hashtag symbol # before a relevant keyword or phrase (no spaces) in a Tweet to categorize the Tweet and help it show up more easily in a Twitter Search—think of it as you would a keyword entered into a search in Google or Bing—an identifiable word or phrase so you can more quickly find what you’re looking for.
  • Clicking on a “hashtagged” word in any message shows you all other Tweets marked with that tag or keyword.
  • Hashtags can be used anywhere in a Tweet—at the beginning, middle or end.
  • “...
Eileen | 14 Mar 2013 | 2 comments

Hello Partners,

As part of my new role on Connect managing the Archiving and eDiscovery Community (and Partner Community) I've just learned about a new set of documents created by the EV Content Council that you may find helpful:

You can find the necessary information on the various accounts and users that are involved in an Enterprise Vault environment, as well as the permissions required by each.
 
Enterprise Vault Accounts and Permissions
http://www.symantec.com/docs/TECH76700
 
Compliance Accelerator and Discovery Accelerator Accounts and Permissions
http://www.symantec.com/docs/TECH200788

As always, if you have any feedback on the documents or suggestions  please do leave a comment.
 
 

Christy Loerzel | 06 Mar 2013 | 0 comments

 

Chances are, you’re used to measuring your success or progress both personally and professionally. Personally, you might measure success by how well you’re doing toward paying down a credit card or mortgage or putting money in savings. Professionally, you may measure success by meeting a sales quota, hitting a deadline or delivering a projected number of leads on an email campaign. Regardless of where and what you measure, success typically comes down to meeting a goal or progressing toward it.

Social media success is the same; it’s about having a goal and meeting that goal or, at least, seeing regular improvement toward that goal.

You can break down measuring your success with social media into a few simple steps:

  • Determining what social goals will contribute to improving your ...
Eddie_Toro | 27 Feb 2013 | 1 comment

Capitalize On The Market’s Rapid Adoption Of Mobile Devices

Drive increased revenue and become your customers’ trusted advisor by providing the integrated mobile management, protection, and security solutions they need to confidently deliver and manage applications to users anywhere, anytime.

More:

 

Increase Revenue by Helping Customers Realize the Promise of Virtualization

Help your customers’ take decisive steps in extending the benefits of virtualization to even their most business-critical applications and build desired private cloud services on existing infrastructure that are both secure and compliant.

Learn about the latest trends and best practices in selling virtualization solutions.

...

Christy Loerzel | 27 Feb 2013 | 0 comments

We’ve all read books or stumbled on to what seemed to be a great web site only to close the cover or our browser and find another topic. Why? Because the content, the story, what we were reading, just didn’t grab us or deliver on our expectations.

It’s not terribly different with social media. If the tweet or the post doesn’t resonate, readers/fans won’t like it or retweet it and eventually, they may stop reading that author altogether. This is one of the major things that makes our roles as social media managers—whether as part of a bigger job or as a dedicated gig—the most challenging, finding what our audience—our customer—will respond to, today, tomorrow and next week.

Ultimately though, it doesn’t have to be that hard, and we can always benefit from experimentation and refinement. Few companies enjoy the luxury of enough budget to do deep customer research, but customer research doesn’t have to be...

Eddie_Toro | 26 Feb 2013 | 0 comments

The ramifications of unauthorized access to confidential information are dire: non-compliance, financial penalties, and theft of intellectual property. Sophisticated network attacks have rendered simple password authentication insufficient to protect an organization against unauthorized access to its network and applications.

Symantec™ Validation and ID Protection Service (VIP) is a leading cloud-based strong authentication service that can enable your customer’s enterprises to secure access to networks and applications while preventing access by malicious unauthorized attackers.

Go to Symantec.com for more:

Go to PartnerNet for sales tools, training, and other partner-specific materials.
 

Christy Loerzel | 25 Feb 2013 | 0 comments

In January, the Symantec Partner Communication team hosted its first ever Google+ Hangout. It was a great success and a great way to connect face to face with partners and customers. On February 19, we did it again focusing this time on Backup Exec V-Ray Edition, “So what, exactly, is this Backup Exec V-Ray Edition?”

Matt Stephenson, Product Marketing Manager and Scott Baker, Product Manager from Symantec's Backup Exec team came together to help users and partners understand Symantec Backup Exec V-Ray Edition and its licensing options.

Some of the topics discussed were:

  • The meaning of ‘per processor’ licensing
  • Features included in the Backup Exec V-Ray Edition
  • How the Backup Exec V-Ray Edition works in virtual and physical environments
  • Licensing scenarios for Backup Exec V-Ray Edition

Check out the...

Eileen | 22 Feb 2013 | 0 comments

APJ partners, Nexus, eNerds, and 9spheres face diverse challenges from their myriad of customers. Though each company has varied customer demands, each company found the confidence, credibility, and efficiency from being part of Symantec’s SMB Partner Program. Learn more about how these partners are benefiting from the SMB Partner Program in this video:

 

...

Eddie_Toro | 07 Feb 2013 | 0 comments

Securing access to networks and applications.

Sophisticated network attacks have rendered simple password authentication insufficient to protect an organization against unauthorized access to its network and applications. The ramifications of unauthorized access to confidential information are dire: non-compliance, financial penalties, and theft of intellectual property.

Symantec™ Validation and ID Protection Service (VIP) is a leading cloud-based strong authentication service that can enable your customer’s enterprises to secure access to networks and applications while preventing access by malicious unauthorized attackers.

Features:

  • Cloud-based infrastructure—Secure, reliable, and scalable service delivers authentication without requiring dedicated on-premise server hardware.
  • Transparent risk-based token-less authentication— Leverage device and behavior profiling to block risky...