Partner Technical Support Benefits Quick Guide

Size: px
Start display at page:

Download "Partner Technical Support Benefits Quick Guide"

Transcription

1 PARTNER BRIEF: TECHNICAL SUPPORT BENEFITS Symantec Secure One Partner Technical Support Benefits Who should read this paper Symantec Partners supporting end user customers using Symantec Enterprise Products to take advantage of the Symantec Secure One Technical Support Benefits.

2

3 Content Overview Accessing Technical Support Symantec Knowledge Base Partner Technical and Consulting Forums Help

4 Overview Symantec Secure One TM ("Secure One") partners who hold Silver, Gold or Platinum membership are entitled to Technical Support, a benefit of their competency enrollment. This Guide outlines information pertaining to the Technical Support Benefits for Enterprise solutions, which vary based on membership tier, solution and country. Technical Support access can also vary by product, geography or both. Please refer to the Secure One Technical Support Benefits Competency and Product Matrix on PartnerNet for a complete listing. Symantec Frontline Support Access This benefit is available to Silver, Gold and Platinum tier partners per competency. Frontline Support means access to Symantec's standard customer-facing technical support resources. Symantec Advanced Support Access This benefit is available for Gold and Platinum tier partners with Integrate Competency membership. The benefit can only be used for the solution(s) for which the partner holds a Gold or Platinum Integrate Competency. Advanced Support means direct access to more senior Symantec Technical Support resources rather than routing through Symantec Frontline Technical Support personnel. What Support Resources are available? Multiple access points to receive Technical Support Online priority case management via MySymantec Phone support via Symantec support phone numbers Knowledge Base - Search articles, videos, and downloads that help solve technical issues related to your Symantec solution or product Partner Technical and Consulting Forums Partner online community Symantec Connect Peer-to-peer technical network website Under Symantec Secure One, Technical Support Benefits are available for most Symantec Enterprise Solutions. Please refer to the Secure One Technical Support Benefits Competency and Product Matrix on PartnerNet for a complete listing. How to Access Partner Technical Support Benefits Identify and add Technical Support contacts for the Support Entitlements to your end user customer In order to use your Technical Support Benefit over the phone or via the web (MySymantec) to support your end user customer in respect of its maintenance/support entitlements for the Symantec Enterprise Product (Support Entitlement) you must first be associated with the Support Entitlement. If using the web to log a case, simply select the option indicating your Support Entitlement and a case will be created (more details below). If calling for the first time, please provide the Symantec Agent all information requested. This will typically include your personal details such as name, phone number, and/or address and company information such as name and company address. Information such as your Technical Contact ID and/or your Support ID are also useful to expedite your case. Obtaining Technical Support on Your End User Customer's Behalf End User technical maintenance / support is not a Technical Support Benefit of Secure One. However, when providing post-sales support for an end user customer, you may need to access Symantec Technical Support on their behalf. 1

5 Here's how: Ask the end user customer to add you as a "Designated Contact" on their Support Entitlement. When creating a case online, you will then be able to choose the end user customer's Support Entitlement for which you are a Designated Contact. When calling Symantec Support, provide your Technical Contact Identifier (TCID) or any other requested contact information (name, phone number, address) and you will then be able to log a case on the end user customer's Support Entitlement. Your TCID is available via the Support Portal in MySymantec. End user customers can also update or replace the details of Designated Contacts. Designated Technical Contacts - A Designated Technical Contact is an individual partner employee who has completed the applicable training for the relevant Symantec Product(s)/competencies as further defined in the appropriate Competency Learning Path contained within PartnerNet. The names of the Designated Technical Contacts must be provided to Symantec Support. This can be accomplished by providing those names to Customer Care or your Partner Success Manager. Designated Technical Contacts must be registered in Symantec's records under the partners company's Advanced Support entitlement in order to use this benefit. The number of Designated Technical Contacts associated with a Support Entitlement may vary based on the support level and type of Symantec solution. Accessing Technical Support Accessing your Technical Support Support may be accessed via multiple access points: Online Telephone Service levels and severity ratings remain the same whether a case is logged by phone or online. Online Support MySymantec is the preferred method by which you may obtain Symantec Technical Support. To create, update and manage service requests online, please visit the MySymantec website. If you do not see your Support Entitlement when logging a case, check the "My account is not listed" check box and fill in additional information, such as your company name or contact ID. Symantec can then locate the associated Support Entitlement. If you do not see the applicable Symantec Enterprise Product when prompted, please go to business/support/index?page=home, click on the Symantec Enterprise Product for which you would like to open a case and follow the support instructions provided in the following screens. 2

6 MySymantec can be used to update and manage all of your open incidents and to create the incidents you determine to be Severity 2 or lower. Severity 2 issues are those where a major functionality is severely impaired and operations can continue in a restricted fashion, although long-term productivity might be adversely affected. For Severity 2 issues, you will generally receive an acknowledgment of contact within 2 hours. To register for a SymAccount To take advantage of Web-based support, you must have an account registered on MySymantec. To register a new account 1. Go to the MySymantec website and click Register Now. 2. Complete all fields on the registration page, including your address, name and company information then create a password. 3. Click Submit. 4. The Create Account Success page will be displayed and a confirmation will be sent to the address provided with the user ID. You can now click on the Continue button to begin accessing Technical Support. 5. You have now completed registration and your access to online Technical Support is enabled. After the SymAccount is created, upon the first time creating a support case, a one-time registration process will be required. Simply populate the required information to request access and submit your Technical Support case. 3

7 To register if you have an account in another Symantec system If you already have an account in another Symantec system, such as PartnerNet or the Symantec Connect site, simply log in at MySymantec using the credentials for your existing account. Your other account credentials already work at MySymantec. Telephone Support Technical Support contact details for your country is available from the Symantec Technical Support website. When contacting Technical Support by phone, ensure you provide your Technical Contact Identifier (TCID). 4

8 Symantec Knowledge Base The Symantec Knowledge Base provides a source of information that will help answer your questions regarding a range of Symantec Enterprise Products. Information, such as product updates, security alerts, and manuals, along with suggested resolutions to previous partner and customer issues, are available on the site. Subscription or login is not required to access the Knowledge Base. Partner Technical and Consulting Forums Symantec Partners can participate in several online areas within the Symantec Connect Community. Partners can choose to have business conversations within the general partner community or technical conversations with members of the Partner Technical Group. Symantec Connect Symantec Connect is the peer-to-peer community site for Symantec's business customers, partners and Symantec employees. Participants can connect and share technical information with other Symantec Enterprise Product users, including creating forum posts, articles, videos, downloads, blogs and suggesting ideas, as well as interact with Symantec product teams and Technical Support. 5

9 Partner Technical Group The Symantec Partner Technical Group is a private discussion environment provided exclusively for partners within Symantec Connect. The Partner Technical Group provides partners with a private online vehicle to engage with other technical experts, gain support and further enhance knowledge of Symantec solutions. Typical content includes questions and answers related to installation, deployment, configuration and troubleshooting. Help More information about Technical Support Benefits is available from the Technical Support Benefits Supplement on the Technical Support section of PartnerNet. For assistance with accessing Partner Technical Support Benefits, please contact the team in your region as indicated below. Europe, Middle East and Africa: support_solutions@symantec.com The Americas: valuedpartner@symantec.com Asia Pacific: support_solutions@symantec.com Japan: japan.support@symantec.com 6

10

11 About Symantec Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses, and governments seeking the freedom to unlock the opportunities technology brings anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company operating one of the largest global data-intelligence networks, has provided leading security, backup, and availability solutions for where vital information is stored, accessed, and shared. The company s more than 19,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2015, it recorded revenues of $6.5 billion. To learn more go to or connect with Symantec at: go.symantec.com/socialmedia For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 9/

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built

More information

Cyber Security Services: Data Loss Prevention Monitoring Overview

Cyber Security Services: Data Loss Prevention Monitoring Overview WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in

More information

ADVANCING SECURITY, TOGETHER ADVANCING. THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards

ADVANCING SECURITY, TOGETHER ADVANCING. THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards SYMANTEC SECURE ONE GUIDE DECEMBER 2 0 1 5 ADVANCING SECURITY, TOGETHER ADVANCING THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards Symantec Secure One Guide

More information

ADVANCING SECURITY, TOGETHER

ADVANCING SECURITY, TOGETHER SY M A N T E C S E C U RE ON E G U ID E LAST REVISED J U N E 2016 ADVANCING SECURITY, TOGETHER T H R I V E I N T H E F A S T - G R O W T H S E C U R I T Y M A R K E T S e c urit y Focused E a s ie r Ac

More information

Symantec Licensing Portal and License Management User Guide

Symantec Licensing Portal and License Management User Guide Symantec Licensing Portal and User Guide Symantec Licensing Confidence in a connected world. Symantec Licensing Portal and User Guide the Symantec Licensing Portal The Symantec Licensing Portal enables

More information

How to Unlock Agility by Backing up to, from, and in the Cloud

How to Unlock Agility by Backing up to, from, and in the Cloud WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper

More information

Host-based Protection for ATM's

Host-based Protection for ATM's SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................

More information

Symantec Managed PKI for SSL Support Overview. How to get quick and convenient customer support

Symantec Managed PKI for SSL Support Overview. How to get quick and convenient customer support WHITE PAPER: SYMANTEC MANAGED PKI FOR SSL SUPPORT OVERVIEW Symantec Managed PKI for SSL Support Overview How to get quick and convenient customer support Symantec Managed PKI for SSL Support Overview CONTENTS

More information

Microsoft Office 365 Migrations with Symantec Enterprise Vault.cloud

Microsoft Office 365 Migrations with Symantec Enterprise Vault.cloud WHITE PAPER: MICROSOFT OFFICE 365 MIGRATIONS WITH SYMANTEC........... ENTERPRISE........... VAULT.CLOUD.................. Microsoft Office 365 Migrations with Symantec Enterprise Vault.cloud Who should

More information

Symantec Cyber Security Services: DeepSight Intelligence

Symantec Cyber Security Services: DeepSight Intelligence Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with

More information

Delivering Performance and Value through Multiple Deduplication Pools

Delivering Performance and Value through Multiple Deduplication Pools SOLUTION BRIEF: SYMANTEC NETBACKUP........................................ Delivering Performance and Value through Multiple Deduplication Pools Who should read this paper - Directors of IT and IT Managers

More information

Symantec Control Compliance Suite Standards Manager

Symantec Control Compliance Suite Standards Manager Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance

More information

Symantec Backup Exec.cloud Partner Pricing and Licensing Guide

Symantec Backup Exec.cloud Partner Pricing and Licensing Guide WHITE PAPER: SYMANTEC BACKUP EXEC.CLOUD PARTNER PRICING........ AND.... LICENSING.......... GUIDE.................. Symantec Backup Exec.cloud Partner Pricing and Licensing Guide Who should read this paper

More information

Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA

Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA WHITE PAPER: VIRTUALIZE BUSINESS-CRITICAL APPLICATIONS.............. WITH..... CONFIDENCE..................... Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA

More information

Symantec Backup Exec.cloud Customer Pricing and Licensing Guide

Symantec Backup Exec.cloud Customer Pricing and Licensing Guide WHITE PAPER: SYMANTEC BACKUP EXEC.CLOUD CUSTOMER PRICING........ AND.... LICENSING.......... GUIDE.................. Symantec Backup Exec.cloud Customer Pricing and Licensing Guide Who should read this

More information

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5 SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5 Simplify continuous security monitoring for physical and virtual servers as well as private and public clouds. Data Sheet: Security Management Symantec

More information

Achieving Business Agility Through An Agile Data Center

Achieving Business Agility Through An Agile Data Center Achieving Business Agility Through An Agile Data Center Overview: Enable the Agile Data Center Business Agility Is Your End Goal In today s world, customers expect or even demand instant gratification

More information

Backup Exec 2014: Protecting Microsoft SQL

Backup Exec 2014: Protecting Microsoft SQL TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SQL........................................ Backup Exec 2014: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed

More information

Symantec Server Management Suite 7.6 powered by Altiris technology

Symantec Server Management Suite 7.6 powered by Altiris technology Symantec Server Management Suite 7.6 powered by Altiris technology Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Management Overviewview Symantec Server Management

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Top 5 Reasons to Choose User-Friendly Strong Authentication

Top 5 Reasons to Choose User-Friendly Strong Authentication SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts

More information

DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1

DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 Continuously Assess, Monitor, & Secure Your Information Supply Chain and Data Center Data Sheet: Security Management Is your organization able

More information

Securing Mobile App Data - Comparing Containers and App Wrappers

Securing Mobile App Data - Comparing Containers and App Wrappers WHITE PAPER: SECURING MOBILE APP DATA - COMPARING CONTAINERS............ AND..... APP... WRAPPERS.................... Securing Mobile App Data - Comparing Containers and App Wrappers Who should read this

More information

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 November 2011 Veritas Operations Manager Package Anomaly Add-on User's Guide The software described in this book is furnished under a

More information

Backup Exec 15: Protecting Microsoft SQL

Backup Exec 15: Protecting Microsoft SQL TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT SQL........................................ Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed

More information

Symantec Endpoint Protection 12.1.6

Symantec Endpoint Protection 12.1.6 Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly

More information

Symantec Mobile Management for Configuration Manager

Symantec Mobile Management for Configuration Manager Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software

More information

Backup Exec 2014: Protecting Microsoft SharePoint

Backup Exec 2014: Protecting Microsoft SharePoint TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SHAREPOINT........................................ Backup Exec 2014: Protecting Microsoft SharePoint Who should read this paper Technical White Papers

More information

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 Advanced protection and hardening for advanced threats. Data Sheet: Security Management Symantec Data Center Security: Server Advanced 6.5 Solution Overviewview

More information

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is

More information

Symantec University for Partners Frequently Asked Questions

Symantec University for Partners Frequently Asked Questions Symantec University for Partners Frequently Asked Questions Contents SYMANTEC UNIVERSITY FOR PARTNERS OVERVIEW... 1 TRAINING... 2 INTELLIGENCE... 4 COLLABORATION... 5 Symantec University for Partners Overview

More information

Keeping GE Healthcare Universal Viewer Highly Available with Symantec ApplicationHA

Keeping GE Healthcare Universal Viewer Highly Available with Symantec ApplicationHA Keeping GE Healthcare Universal Viewer Highly Available with Symantec ApplicationHA Solution Overview: High Availability Introduction Providing high availability to clinical applications like GE Universal

More information

5 Must-Haves for an Enterprise Mobility Management (EMM) Solution

5 Must-Haves for an Enterprise Mobility Management (EMM) Solution SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and

More information

Overview of Autodesk Subscription with Gold Support

Overview of Autodesk Subscription with Gold Support Overview of Autodesk Subscription with Gold Support For Former Platinum Membership Customers Welcome Platinum Members to Autodesk Subscription with Gold Support. This Program Guide will help you become

More information

VERITAS PARTNER FORCE PROGRAM GUIDE. Grow your business with the Veritas Partner Force Program Rewarding Capability, Commitment & Growth

VERITAS PARTNER FORCE PROGRAM GUIDE. Grow your business with the Veritas Partner Force Program Rewarding Capability, Commitment & Growth VERITAS PARTNER FORCE PROGRAM GUIDE Grow your business with the Veritas Partner Force Program Rewarding Capability, Commitment & Growth Contents Veritas Partner Force Program Overview... 3 About this Veritas

More information

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase

More information

650-527-5152 650-527-6273 SYMANTEC REPORTS FIRST QUARTER FISCAL YEAR 2016 RESULTS

650-527-5152 650-527-6273 SYMANTEC REPORTS FIRST QUARTER FISCAL YEAR 2016 RESULTS FOR IMMEDIATE RELEASE MEDIA CONTACT: INVESTOR CONTACT: Kristen Batch Sean Hazlett Symantec Corp. Symantec Corp. 650-527-5152 650-527-6273 kristen_batch@symantec.com sean_hazlett@symantec.com SYMANTEC REPORTS

More information

Incident Response. Summary of Expertise and Experience

Incident Response. Summary of Expertise and Experience Incident Response Summary of Expertise and Experience 2015 The copyright to this document is owned by Symantec. No part of this document may be reproduced, stored in a retrieval system, or transmitted,

More information

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide The software

More information

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened

More information

Asset Discovery with Symantec Control Compliance Suite

Asset Discovery with Symantec Control Compliance Suite WHITE PAPER: ASSET DISCOVERY WITH SYMANTEC CONTROL COMPLIANCE............. SUITE........................... Asset Discovery with Symantec Control Compliance Suite Who should read this paper IT Operations

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Endpoint Protection Small Business Edition 2013?

Endpoint Protection Small Business Edition 2013? Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,

More information

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in

More information

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Getting Started Guide Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished

More information

Symantec Enterprise Vault for Microsoft Exchange Server

Symantec Enterprise Vault for Microsoft Exchange Server Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy

More information

Backup Exec 15: Protecting Microsoft Hyper-V

Backup Exec 15: Protecting Microsoft Hyper-V TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT HYPER-V........................................ Backup Exec 15: Protecting Microsoft Hyper-V Who should read this paper Technical White Papers are

More information

Realizing the True Potential of Software-Defined Storage

Realizing the True Potential of Software-Defined Storage Realizing the True Potential of Software-Defined Storage Who should read this paper Technology leaders, architects, and application owners who are looking at transforming their organization s storage infrastructure

More information

Technical Support User Guide

Technical Support User Guide Technical Support User Guide 2015 Websense, Inc. Page 1 BRAVE THE NEW WORLD. 2015 Websense, Inc. All rights reserved. Websense, the Websense logo, TRITON and ThreatSeeker are registered trademarks of Websense,

More information

Technical Support User Guide

Technical Support User Guide Technical Support User Guide Lightspeed Systems Technical Support User Guide 1 Table of Contents Welcome... 3 Technical Support Overview... 3 Lightspeed Systems Global Technical Support Program... 3 Hardware

More information

Symantec Data Center Security: Server Advanced v6.0. Agent Guide

Symantec Data Center Security: Server Advanced v6.0. Agent Guide Symantec Data Center Security: Server Advanced v6.0 Agent Guide Symantec Data Center Security: Server Advanced Agent Guide The software described in this book is furnished under a license agreement and

More information

Datacane - When the bits hit the fan!

Datacane - When the bits hit the fan! TECHNICAL BRIEF: DATACANE........................................ Datacane - When the bits hit the fan! Who should read this paper This paper is intended for those who have seen the Symantec Datacane video

More information

Delivering a New Level of Data Protection Resiliency with Appliances

Delivering a New Level of Data Protection Resiliency with Appliances SOLUTION BRIEF: SYMANTEC NETBACKUP........................................ Delivering a New Level of Data Protection Resiliency with Appliances Who should read this paper - Directors of IT and IT Managers

More information

Direct virtual machine creation from backup with BMR

Direct virtual machine creation from backup with BMR NETBACKUP 7.6 FEATURE BRIEFING DIRECT VIRTUAL MACHINE CREATION FROM BACKUP WITH BMR NetBackup 7.6 Feature Briefing Direct virtual machine creation from backup with BMR Version number: 1.0 Issue date: 5

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

Web Protection for Your Business, Customers and Data

Web Protection for Your Business, Customers and Data WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision

More information

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0 Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Capstone Compliance Using Symantec Archiving and ediscovery Solutions

Capstone Compliance Using Symantec Archiving and ediscovery Solutions WHITE PAPER: CAPSTONE COMPLIANCE........................................ Capstone Compliance Using Symantec Archiving and ediscovery Solutions Who should read this paper IT decision-makers, architects,

More information

How Drive Encryption Works

How Drive Encryption Works WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................

More information

Symantec Endpoint Protection Integration Component 7.5 Release Notes

Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Legal Notice Copyright 2013 Symantec Corporation. All rights reserved.

More information

Symantec Protection Center Enterprise 3.0. Release Notes

Symantec Protection Center Enterprise 3.0. Release Notes Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note Recovering Encrypted Disks Using Windows Preinstallation Environment Technical Note Preface Documentation version Documentation version: 11.0, Release Date: Legal Notice Copyright Symantec Corporation.

More information

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide The software

More information

Symantec RuleSpace Data Sheet

Symantec RuleSpace Data Sheet OEM URL Categorization Database and Real-time Web Categorization Technology Data Sheet: Security Intelligence OVERVIEW A major challenge today is ensuring a safe web environment for users and companies

More information

How Endpoint Encryption Works

How Endpoint Encryption Works WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint

More information

Veritas InfoScale Availability

Veritas InfoScale Availability Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale

More information

Using the GXS Trading Grid and the IWF Document Manager

Using the GXS Trading Grid and the IWF Document Manager Using the GXS Trading Grid and the IWF Document Manager October 26, 2010 Slide 1 2010 GXS, Inc. Training Agenda Introduce the IWF/Document Manager and the Trading Grid Online portal Describe how to view

More information

Enterprise Vault 11 Feature Briefing

Enterprise Vault 11 Feature Briefing Enterprise Vault 11 Feature Briefing Enterprise Vault SCOM Enhancements This document is about the new Enterprise Vault SCOM enhancements introduced in Enterprise Vault 11. If you have any feedback or

More information

Symantec ApplicationHA agent for Internet Information Services Configuration Guide

Symantec ApplicationHA agent for Internet Information Services Configuration Guide Symantec ApplicationHA agent for Internet Information Services Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Internet Information Services Configuration Guide

More information

Symantec Managed PKI Service Deployment Options

Symantec Managed PKI Service Deployment Options WHITE PAPER: SYMANTEC MANAGED PKI SERVICE DEPLOYMENT............. OPTIONS........................... Symantec Managed PKI Service Deployment Options Who should read this paper This whitepaper explains

More information

Symantec Mobile Management 7.2 MR1Quick-start Guide

Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only

More information

Subscription Guide and Glossary

Subscription Guide and Glossary AUTODESK SUBSCRIPTION Subscription Guide and Glossary This guide describes the various components of Autodesk Subscription. You can learn how to access your program benefits and manage your subscription

More information

Veritas Partner Force Program Benefits Guide

Veritas Partner Force Program Benefits Guide VERITAS PARTNER FORCE PROGRAM BENEFITS GUIDE Veritas Partner Force Program Benefits Guide October 2015 Earn More: Deliver Exceptional Customer Value and Prosper with Program Benefits Designed Specifically

More information

HP Software & Solutions Partner Central and The Learning Center

HP Software & Solutions Partner Central and The Learning Center HP Software & Solutions Partner Central and The Learning Center Overview and access instructions for partners Table of contents Partner Central for HP Software & Solutions overview... 2 Partner Central

More information

NASDAQ Web Security Entitlement Installation Guide November 13, 2007

NASDAQ Web Security Entitlement Installation Guide November 13, 2007 November 13, 2007 Table of Contents: Copyright 2006, The Nasdaq Stock Market, Inc. All rights reserved.... 2 Chapter 1 - Entitlement Overview... 3 Hardware/Software Requirements...3 NASDAQ Workstation...3

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

Finding Email Security in the Cloud

Finding Email Security in the Cloud WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email

More information

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7 TM Symantec NetBackup Desktop and Laptop Option README Release 6.1 MP7 2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms

More information

Working with the Call Center

Working with the Call Center Quick Reference: Call Center Working with the Call Center Contents Roadmap: Working with web-based patients... 2 Roadmap: Working with phone-based patients... 4 Roadmap: Working with paper-based patients...

More information

Email Encryption. Administrator Guide

Email Encryption. Administrator Guide Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Symantec Critical System Protection 5.2.9 Agent Guide

Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection Agent Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Backup Exec 15: Deduplication Option

Backup Exec 15: Deduplication Option TECHNICAL BRIEF: BACKUP EXEC 15: DEDUPLICATION OPTION........................................ Backup Exec 15: Deduplication Option Who should read this paper Technical White Papers are designed to introduce

More information

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 November 2011 Veritas Operations Manager LDom Capacity Management Add-on User's Guide The software described in this book is

More information

PGP CAPS Activation Package

PGP CAPS Activation Package PGP CAPS Activation Package Administrator's Guide 9.12/10.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described

More information

Symantec Advanced Threat Protection: Network

Symantec Advanced Threat Protection: Network Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Product Support Notice. FTP backup MSS to a Windows 2003 Server

Product Support Notice. FTP backup MSS to a Windows 2003 Server Product Support Notice 2007 Avaya Inc. All Rights Reserved. PSN# PSN001698u Original publication date: 05-Dec-2007. This is Issue #1, published 07- Dec-2007. Severity/risk level Medium Name of problem

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this

More information

Registering and Activating a License on the Cisco ISA500 Security Appliance

Registering and Activating a License on the Cisco ISA500 Security Appliance Application Note Registering and Activating a License on the Cisco ISA500 Security Appliance This application note provides information about registering and activating a license on the Cisco ISA500 Series

More information

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Instructions on accessing your journal s content on your new app

Instructions on accessing your journal s content on your new app Instructions on accessing your journal s content on your new app There are three main methods to access content on your journal app depending on how you normally view your journal online. 1. Do you normally

More information

Symantec System Recovery 2013 Management Solution Administrator's Guide

Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.6 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information