Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Partners Community Blog
Showing posts in English
Christy Loerzel | 18 Oct 2012 | 0 comments

There are a lot of social networking platforms on the web today—Facebook, Twitter, LinkedIn, Google+, Pinterest, YouTube, Myspace, Meetup, myLife and the new Pheed to name only a few. Unless you have unlimited headcount, chances are, you can’t possibly create and maintain a social presence for your company on all of them, let alone more than one or two. That’s why, in this week’s addition to the partner social media series, I start addressing some of the most popular platforms—Twitter, Facebook and LinkedIn.

I’ll say that with the caveat that overall Facebook, Twitter, LinkedIn, blogs and YouTube were the top five social media tools used by marketers, with Facebook leading the pack. But if you break it down by business-to-business marketers—like you and myself—marketers are more focused on LinkedIn, Twitter and blogging. That’s, at least, according to...

Charla Bunton-Johnson | 09 Oct 2012 | 3 comments

The Best Blacklist Protection—Symantec Website Security

Search engines, the heart of the internet, reserve the right to blacklist websites. Blacklisting can mean that a company does not show in search results or that a warning is given if a user clicks on a blacklisted website. Websites become blacklisted for a variety of reasons. The two most frequent reasons are:
  • Failing to meet search engine usage guidelines (i.e. overly aggressive search engine optimizations [SEO] that violate a search engine's terms of service)
  • Websites being shown as a source of malware

The malware could be intentional (i.e. phishing, spoofed websites) or unintentional (i.e. website has been hacked or otherwise infected by a third party). A surefire way to get blacklisted is to harbor a website being infected with malware.

...
Christy Loerzel | 08 Oct 2012 | 0 comments

Interested in learning more about social media for your business? Watch Social Media Training for Symantec Partners, a recorded webcast, or join us on November 7 for a live webcast, for those who manage social media for a Symantec Partner company, discover how to use social media to reach and engage with your customers.

What's your favorite social media tip? Share your thoughts below...we looking forward to hearing from you...

Christy Loerzel | 02 Oct 2012 | 0 comments

Social media—by now almost every company knows they need to get on board in some way, but many don’t know where to start. Many have started that Facebook page or put out a few tweets only to lose momentum. Others inspire envy in their seemingly effortless success with thousands of followers and comments galore.

To help you be the latter instead of  the former,  the Symantec Partner Digital Strategy team and I will be offering tips and tricks in a series of posts starting today, complete with guidance and case studies to help you better navigate how to use social media for your business and connect with your customers. We’ll start small and drill down over time.

And we’d love to hear from you—what are your own successes, challenges, what would you like to know more about. We also invite you to join us online on Twitter and...

jennifer_penney | 28 Sep 2012 | 2 comments

Partners,

If you have an existing customer who previously purchased support for one of Symantec's products, or had interacted with Symantec Enterprise Support Services (ESS) they most likely received an email from Symantec saying that an online self-service account—or SymAccount—had been created for them.  Please know that this was a valid email and  part of the upgrade to Symantec's tech support experience. Symantec  created these new accounts as part of the migration effort to the new platform.
 
If you have questions about the upgrade, please visit PartnerNet, where you can access the latest information.  You can direct your customers to...

Fabiano.Pessoa | 22 Sep 2012 | 0 comments

Dear, good day.

Performing some tests a few days ago based on the operation of virtual machines performed the test regarding the transfer of files from virtual machine to real machine and vice versa.

Aware that when it comes to attacks on companies 80% of them occur within the same company was able to observe that XP Mode (virtual machine with Windows XP OS) can seamlessly receive data transfer etc. to copy a real machine.

Most of the competitors tested antivirus did not detect an intrusion of this type of transfer (copy) to the real machine as treating infection. Can not have this new code in its database or not but it was done and still leaving in fact the same as treating process network.

The test was conducted using a backdoor to open a specific port (15) and make a "Reverse Shell".

Some just because it was only identified with this code in its database to 2 days only but not detected and started to treat this code as the normal PC...

Fabiano.Pessoa | 19 Sep 2012 | 0 comments

You've probably been surprised at some site with messages like "your computer is not protected" or "your computer is infected". Behind these scary messages (scare) are hiding the real threats. When you accept the recommendation of the site and download the program to the "cleaning" of your hard programinha the malicious suggests that you are with malware - and it's true, he undertook to install - only to remove this malware is necessary "pay for the full version."

 The care that you have to have: Obviously, do not trust programs that appear from nowhere and promise to clean your computer from threats. Serious companies will never offer you protection without request.

These following programs say they solved problems of viruses, but are actually malicious software that have the purpose of attacking a PC and say they are security solutions...

Fabiano.Pessoa | 10 Sep 2012 | 0 comments

Good morning,
 It would not be important in similar forensic software security solution to point some strange movement in net for manual configuration?
 Would not it be nice to send this log to the administrator so that it has real science of what happens on their machines?
 The fact that even happens that the only security solution for password and disable it is discovered any protection software with password folder can hold a virus where this solution can not be detected due to have a password contained
 Performing a test in a given security software that will not mention the name says it the same as the high power of detection can not detect which way the folder with password there is a virus code that I created is not the same as new I sent them to the database and still is not detected because the folder containing password.
 In this case the solution would be important to periodically report to the administrator the...

KellyM | 30 Aug 2012 | 0 comments

The world is becoming more and more social, and so is the sales process. More than 93% of B2B marketers are using social media to reach customers. And more than 56% of B2B marketers acquired new customers using social media in 2011, while almost 60% of B2B marketers saw their search rankings improve after going social. Facebook, LinkedIn and Twitter are the most popular platforms for B2B companies*.

Whether you agree with the Conan O’Brien Show that in the year 3000, “YouTube, Twitter and Facebook will merge to form one super time wasting web site called YouTwitFace.” (Or as I prefer, LinkedIn, YouTube, Twitter and Facebook will merge into “InYouTwitFace.”) And whether your company has already jumped on the social bandwagon or not, as part of your partnership with Symantec, we want to help you go social or reinforce your social...

Susie Spencer - BE Product Marketing | 21 Aug 2012 | 0 comments

It’s been just over 5 months now since Backup Exec 2012 became generally available, and we’ve seen a lot of exciting air cover regarding this release. If you are one of the few partners who haven’t heard about it yet, in this new version we introduced a brand new user interface, physical to virtual conversion, bare metal recovery, dissimilar hardware recovery and many other key features that continue to make Backup Exec stand out against the competition. Backup Exec 2012 was designed specifically to help customers and partners around the globe discover a new, easier way of managing backup and recovery.
 
Many customers, partners and third party reviewers talked about how much they loved the great new interface and the dramatic change that was introduced. As is the case with change however, some customers were frustrated with this transformation and expressed their dissatisfaction through many social media platforms. What I personally love about...