Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Partners Community Blog
Showing posts in English
John Eldh | 14 Apr 2014 | 0 comments

I’m excited to announce that today Symantec was selected by CRN as a 5-star Partner Program Guide Winner in recognition of Symantec’s superior partner program and the support we offer our channel partners. This is just the latest in a string of recent award wins that highlight the focused commitment we’ve made in the past several months to better support the way our partners do business through our redesigned Partner Program.

I’m very proud of the hard work that has gone into our Partner Program. Additional recent achievements include:   

CRN Channel Chiefs: In late February, my colleague Garrett Jones, Vice President of Global Channel Operations, and I were honored as CRN Channel Chiefs. This was a tremendous honor and...

A L Johnson | 10 Apr 2014 | 0 comments

Hi all,

I am sharing a video from Bloomberg, where Symantec Chief Operating Officer Stephen Gillett discusses online security threats, a very important topic today. He speaks with Emily Chang and Cory Johnson on Bloomberg Television’s “Bloomberg West.” (Source: Bloomberg)  Perhaps a great tool to share with our customers.



John Eldh | 08 Apr 2014 | 0 comments

In our daily activities, our team is so focused on keeping our partners and customers safe that we sometimes need to take a step back to look at the larger security trends and anticipate any new threats on the horizon. For this reason, Symantec’s latest Internet Security Threat Report (ISTR), Volume 19 provides a snapshot of the current global threat landscape, helping to pinpoint where companies need to focus their energy.

This year’s ISTR shows that we’re now living in the era of the “Mega Data Breach.” According to our latest report, the total number of data breaches increased 62 percent, amounting to more than 552 million records exposed. In fact, the top eight breaches exposed more than 10 million identities. These breaches often exposed real names, birth dates and/or government ID numbers (e.g. social security numbers). Some records also exposed other highly sensitive data, such as...

LeslieMiller | 26 Feb 2014 | 0 comments

The new Bring Your Customer Advocate to Vision program offers Symantec partners the opportunity to receive a free pass to Vision 2014 for your customer in exchange for a qualifying reference submission. Interested in participating? Follow the simple instructions below.

  1. Go to the “Get Started” link below and complete the Customer Reference Nomination Form
  2. Confirm the types of reference activities that your customer is willing to participate in for at least one year in the online form
  3. Submit the completed form by clicking the “Register” button

IMPORTANT: Last chance to submit the Customer Reference Nomination Form is 12:00pm PST on Tuesday, April 15, 2014.

Get Started>

Looking for additional details on Symantec’s Vision 2014 event? Visit the website at...

Symantec Corp. | 19 Feb 2014 | 0 comments

By Garrett Jones, Vice President of Global Channel Operations

I had a great time at last week’s Symantec Partner Engage event in Budapest visiting with more than 300 of our top partners from across the EMEA region.  In addition to sharing more about our company’s strategy and vision, it was also exciting to share the details around our redesigned Partner Program framework.  Built on Symantec’s Global Channel Strategy announced in November, the new Partner Program will better support the way our partners do business by fostering stronger partnerships that enable growth and delivering differentiated value to our customers. 

As we consider the breadth of our portfolio, we need partners who are focused on each type of customer across all levels of complexity.  We need partners that understand and can solve the needs of an SMB just as much as we need partners with deep relationships in the enterprise space to help with more complex solutions....

TSE_AREAD | 20 Jan 2014 | 1 comment
Hello all,
I thought this maybe useful as it caused a lot of grief that took several days to fix.
After Disabling UAC via Domain GPO and Re-enabling it Users that logged in with account when UAC was disabled are now broken and need to be recreated.
When I realized that UAC is required for Windows 8 Metro to function I immediately remedied my mistake. However, the damage was already done and my client's profiles that use the Windows 8 machines are at this point broken.
I found an article that talks reports "Disabling UAC via this method also breaks many elements in Windows 8."
After enabling UAC for the windows 8 machines all profiles were damaged to the point where a "Temp" profile would be created to login to the affected systems. I then renamed the profile...
KJLTD | 05 Dec 2013 | 2 comments

I thought I would write this small blog as a way to voice my exsaperation over the extremely poor service I am receiving from Symantec.

We have recently take over a business that is running Message Filtering thorugh the Symantec Cloud.  This product is in itself excellent and the support and montioring on it is first class.  The business in question was using their old IT provider for this service and hence required us to take up the administration.

I have therefore set about getting us setup as a cloud partner so we can offer the service to this customer and hopefully others.  This is where the compliments end I'm afraid...

My original submission was on the 29th October.  Initially I had correspondance from Symantec on my progress, there were various questions being passed around determining what we needed etc.  It then got to the stage where we had to enter into a credit check (4/11/13).  I must admit I never knew it took 16...

John Eldh | 22 Nov 2013 | 0 comments

Last week at our annual North America Partner Engage event, we pulled back the curtain on Symantec’s new Global Channel Strategy and shared how we are changing the way we go to market. We have committed to delivering more than 5 percent organic revenue growth with operating margins better than 30 percent, and we can’t achieve this goal without our partners. I’d like to take this opportunity to share more details about the new Global Channel Strategy and explain how it represents an important step forward in Symantec’s 4.0 journey.

But first, let me take a brief step back to provide some context around how we got to this point. When Steve Bennett, our CEO, joined Symantec over a year ago, he embarked on a global listening tour where partners, customers and employees voiced a need for Symantec to change. He learned that Symantec had great technology and great people, but we needed to do more to help our customers solve their bigger jobs. In...

dougbowers | 19 Nov 2013 | 0 comments

Most people today rely on email as their method for business communication – sending and receiving hundreds of emails every day. This dependence on email can create a weak link in securing corporate information and expose a company to attacks. While hackers still use general spam emails and social engineering (or phishing) attacks against organizations, they are now increasingly pursuing sophisticated and targeted attacks that are far more difficult to differentiate from the emails we typically receive. In fact, Symantec’s 2013 Internet Security Threat Report found a 42 percent increase in targeted attacks in 2012.  

Most spam emails are relatively easy to identify and quarantine, but targeted attacks are customized for their recipients, making them harder to spot. For example, a company’s HR department could receive an email that requests that they click on a...

IMG_Shawn | 18 Nov 2013 | 0 comments

Many understand how archiving can complement messaging platforms like Microsoft Exchange Server – the value it delivers to IT Admins and teams that manage these systems. But others still don’t realize the benefits archiving offers beyond email, for other teams inside and outside IT. Valued Symantec resellers – if you have customers or prospects considering information archiving, or are just curious about it, have them attend this webcast for a refresher on the core value of archiving. We’ll also discuss how archiving helps:

  • Manage unstructured data beyond email, such as SharePoint, File Systems and even social media
  • Improve backup and recovery
  • Stop end users from bugging the IT Admin by enhancing user experience and productivity
  • Simplify Compliance and eDiscovery

We’ll take you through common use cases and scenarios that showcase how archiving can help reduce costs and improve operational...