Partner Technical Support Benefits Quick Guide
|
|
- Camron Mathews
- 8 years ago
- Views:
Transcription
1 PARTNER BRIEF: TECHNICAL SUPPORT BENEFITS Symantec Secure One Partner Technical Support Benefits Who should read this paper Symantec Partners supporting end user customers using Symantec Enterprise Products to take advantage of the Symantec Secure One Technical Support Benefits.
2
3 Content Overview Accessing Technical Support Symantec Knowledge Base Partner Technical and Consulting Forums Help
4 Overview Symantec Secure One TM ("Secure One") partners who hold Silver, Gold or Platinum membership are entitled to Technical Support, a benefit of their competency enrollment. This Guide outlines information pertaining to the Technical Support Benefits for Enterprise solutions, which vary based on membership tier, solution and country. Technical Support access can also vary by product, geography or both. Please refer to the Secure One Technical Support Benefits Competency and Product Matrix on PartnerNet for a complete listing. Symantec Frontline Support Access This benefit is available to Silver, Gold and Platinum tier partners per competency. Frontline Support means access to Symantec's standard customer-facing technical support resources. Symantec Advanced Support Access This benefit is available for Gold and Platinum tier partners with Integrate Competency membership. The benefit can only be used for the solution(s) for which the partner holds a Gold or Platinum Integrate Competency. Advanced Support means direct access to more senior Symantec Technical Support resources rather than routing through Symantec Frontline Technical Support personnel. What Support Resources are available? Multiple access points to receive Technical Support Online priority case management via MySymantec Phone support via Symantec support phone numbers Knowledge Base - Search articles, videos, and downloads that help solve technical issues related to your Symantec solution or product Partner Technical and Consulting Forums Partner online community Symantec Connect Peer-to-peer technical network website Under Symantec Secure One, Technical Support Benefits are available for most Symantec Enterprise Solutions. Please refer to the Secure One Technical Support Benefits Competency and Product Matrix on PartnerNet for a complete listing. How to Access Partner Technical Support Benefits Identify and add Technical Support contacts for the Support Entitlements to your end user customer In order to use your Technical Support Benefit over the phone or via the web (MySymantec) to support your end user customer in respect of its maintenance/support entitlements for the Symantec Enterprise Product (Support Entitlement) you must first be associated with the Support Entitlement. If using the web to log a case, simply select the option indicating your Support Entitlement and a case will be created (more details below). If calling for the first time, please provide the Symantec Agent all information requested. This will typically include your personal details such as name, phone number, and/or address and company information such as name and company address. Information such as your Technical Contact ID and/or your Support ID are also useful to expedite your case. Obtaining Technical Support on Your End User Customer's Behalf End User technical maintenance / support is not a Technical Support Benefit of Secure One. However, when providing post-sales support for an end user customer, you may need to access Symantec Technical Support on their behalf. 1
5 Here's how: Ask the end user customer to add you as a "Designated Contact" on their Support Entitlement. When creating a case online, you will then be able to choose the end user customer's Support Entitlement for which you are a Designated Contact. When calling Symantec Support, provide your Technical Contact Identifier (TCID) or any other requested contact information (name, phone number, address) and you will then be able to log a case on the end user customer's Support Entitlement. Your TCID is available via the Support Portal in MySymantec. End user customers can also update or replace the details of Designated Contacts. Designated Technical Contacts - A Designated Technical Contact is an individual partner employee who has completed the applicable training for the relevant Symantec Product(s)/competencies as further defined in the appropriate Competency Learning Path contained within PartnerNet. The names of the Designated Technical Contacts must be provided to Symantec Support. This can be accomplished by providing those names to Customer Care or your Partner Success Manager. Designated Technical Contacts must be registered in Symantec's records under the partners company's Advanced Support entitlement in order to use this benefit. The number of Designated Technical Contacts associated with a Support Entitlement may vary based on the support level and type of Symantec solution. Accessing Technical Support Accessing your Technical Support Support may be accessed via multiple access points: Online Telephone Service levels and severity ratings remain the same whether a case is logged by phone or online. Online Support MySymantec is the preferred method by which you may obtain Symantec Technical Support. To create, update and manage service requests online, please visit the MySymantec website. If you do not see your Support Entitlement when logging a case, check the "My account is not listed" check box and fill in additional information, such as your company name or contact ID. Symantec can then locate the associated Support Entitlement. If you do not see the applicable Symantec Enterprise Product when prompted, please go to business/support/index?page=home, click on the Symantec Enterprise Product for which you would like to open a case and follow the support instructions provided in the following screens. 2
6 MySymantec can be used to update and manage all of your open incidents and to create the incidents you determine to be Severity 2 or lower. Severity 2 issues are those where a major functionality is severely impaired and operations can continue in a restricted fashion, although long-term productivity might be adversely affected. For Severity 2 issues, you will generally receive an acknowledgment of contact within 2 hours. To register for a SymAccount To take advantage of Web-based support, you must have an account registered on MySymantec. To register a new account 1. Go to the MySymantec website and click Register Now. 2. Complete all fields on the registration page, including your address, name and company information then create a password. 3. Click Submit. 4. The Create Account Success page will be displayed and a confirmation will be sent to the address provided with the user ID. You can now click on the Continue button to begin accessing Technical Support. 5. You have now completed registration and your access to online Technical Support is enabled. After the SymAccount is created, upon the first time creating a support case, a one-time registration process will be required. Simply populate the required information to request access and submit your Technical Support case. 3
7 To register if you have an account in another Symantec system If you already have an account in another Symantec system, such as PartnerNet or the Symantec Connect site, simply log in at MySymantec using the credentials for your existing account. Your other account credentials already work at MySymantec. Telephone Support Technical Support contact details for your country is available from the Symantec Technical Support website. When contacting Technical Support by phone, ensure you provide your Technical Contact Identifier (TCID). 4
8 Symantec Knowledge Base The Symantec Knowledge Base provides a source of information that will help answer your questions regarding a range of Symantec Enterprise Products. Information, such as product updates, security alerts, and manuals, along with suggested resolutions to previous partner and customer issues, are available on the site. Subscription or login is not required to access the Knowledge Base. Partner Technical and Consulting Forums Symantec Partners can participate in several online areas within the Symantec Connect Community. Partners can choose to have business conversations within the general partner community or technical conversations with members of the Partner Technical Group. Symantec Connect Symantec Connect is the peer-to-peer community site for Symantec's business customers, partners and Symantec employees. Participants can connect and share technical information with other Symantec Enterprise Product users, including creating forum posts, articles, videos, downloads, blogs and suggesting ideas, as well as interact with Symantec product teams and Technical Support. 5
9 Partner Technical Group The Symantec Partner Technical Group is a private discussion environment provided exclusively for partners within Symantec Connect. The Partner Technical Group provides partners with a private online vehicle to engage with other technical experts, gain support and further enhance knowledge of Symantec solutions. Typical content includes questions and answers related to installation, deployment, configuration and troubleshooting. Help More information about Technical Support Benefits is available from the Technical Support Benefits Supplement on the Technical Support section of PartnerNet. For assistance with accessing Partner Technical Support Benefits, please contact the team in your region as indicated below. Europe, Middle East and Africa: support_solutions@symantec.com The Americas: valuedpartner@symantec.com Asia Pacific: support_solutions@symantec.com Japan: japan.support@symantec.com 6
10
11 About Symantec Symantec Corporation (NASDAQ: SYMC) is an information protection expert that helps people, businesses, and governments seeking the freedom to unlock the opportunities technology brings anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company operating one of the largest global data-intelligence networks, has provided leading security, backup, and availability solutions for where vital information is stored, accessed, and shared. The company s more than 19,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. In fiscal 2015, it recorded revenues of $6.5 billion. To learn more go to or connect with Symantec at: go.symantec.com/socialmedia For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 9/
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built
More informationCyber Security Services: Data Loss Prevention Monitoring Overview
WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in
More informationADVANCING SECURITY, TOGETHER ADVANCING. THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards
SYMANTEC SECURE ONE GUIDE DECEMBER 2 0 1 5 ADVANCING SECURITY, TOGETHER ADVANCING THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards Symantec Secure One Guide
More informationADVANCING SECURITY, TOGETHER
SY M A N T E C S E C U RE ON E G U ID E LAST REVISED J U N E 2016 ADVANCING SECURITY, TOGETHER T H R I V E I N T H E F A S T - G R O W T H S E C U R I T Y M A R K E T S e c urit y Focused E a s ie r Ac
More informationSymantec Licensing Portal and License Management User Guide
Symantec Licensing Portal and User Guide Symantec Licensing Confidence in a connected world. Symantec Licensing Portal and User Guide the Symantec Licensing Portal The Symantec Licensing Portal enables
More informationHow to Unlock Agility by Backing up to, from, and in the Cloud
WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper
More informationHost-based Protection for ATM's
SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................
More informationSymantec Managed PKI for SSL Support Overview. How to get quick and convenient customer support
WHITE PAPER: SYMANTEC MANAGED PKI FOR SSL SUPPORT OVERVIEW Symantec Managed PKI for SSL Support Overview How to get quick and convenient customer support Symantec Managed PKI for SSL Support Overview CONTENTS
More informationMicrosoft Office 365 Migrations with Symantec Enterprise Vault.cloud
WHITE PAPER: MICROSOFT OFFICE 365 MIGRATIONS WITH SYMANTEC........... ENTERPRISE........... VAULT.CLOUD.................. Microsoft Office 365 Migrations with Symantec Enterprise Vault.cloud Who should
More informationSymantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
More informationDelivering Performance and Value through Multiple Deduplication Pools
SOLUTION BRIEF: SYMANTEC NETBACKUP........................................ Delivering Performance and Value through Multiple Deduplication Pools Who should read this paper - Directors of IT and IT Managers
More informationSymantec Control Compliance Suite Standards Manager
Symantec Control Compliance Suite Standards Manager Automate Security Configuration Assessments. Discover Rogue Networks & Assets. Harden the Data Center. Data Sheet: Security Management Control Compliance
More informationSymantec Backup Exec.cloud Partner Pricing and Licensing Guide
WHITE PAPER: SYMANTEC BACKUP EXEC.CLOUD PARTNER PRICING........ AND.... LICENSING.......... GUIDE.................. Symantec Backup Exec.cloud Partner Pricing and Licensing Guide Who should read this paper
More informationConfidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA
WHITE PAPER: VIRTUALIZE BUSINESS-CRITICAL APPLICATIONS.............. WITH..... CONFIDENCE..................... Confidently Virtualize Business-critical Applications in Microsoft Hyper-V with Symantec ApplicationHA
More informationSymantec Backup Exec.cloud Customer Pricing and Licensing Guide
WHITE PAPER: SYMANTEC BACKUP EXEC.CLOUD CUSTOMER PRICING........ AND.... LICENSING.......... GUIDE.................. Symantec Backup Exec.cloud Customer Pricing and Licensing Guide Who should read this
More informationSYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5
SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5 Simplify continuous security monitoring for physical and virtual servers as well as private and public clouds. Data Sheet: Security Management Symantec
More informationAchieving Business Agility Through An Agile Data Center
Achieving Business Agility Through An Agile Data Center Overview: Enable the Agile Data Center Business Agility Is Your End Goal In today s world, customers expect or even demand instant gratification
More informationBackup Exec 2014: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SQL........................................ Backup Exec 2014: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
More informationSymantec Server Management Suite 7.6 powered by Altiris technology
Symantec Server Management Suite 7.6 powered by Altiris technology Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Management Overviewview Symantec Server Management
More informationSymantec Messaging Gateway 10.6
Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate
More informationTop 5 Reasons to Choose User-Friendly Strong Authentication
SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts
More informationDATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1
DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1 Continuously Assess, Monitor, & Secure Your Information Supply Chain and Data Center Data Sheet: Security Management Is your organization able
More informationSecuring Mobile App Data - Comparing Containers and App Wrappers
WHITE PAPER: SECURING MOBILE APP DATA - COMPARING CONTAINERS............ AND..... APP... WRAPPERS.................... Securing Mobile App Data - Comparing Containers and App Wrappers Who should read this
More informationVeritas Operations Manager Package Anomaly Add-on User's Guide 4.1
Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 November 2011 Veritas Operations Manager Package Anomaly Add-on User's Guide The software described in this book is furnished under a
More informationBackup Exec 15: Protecting Microsoft SQL
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT SQL........................................ Backup Exec 15: Protecting Microsoft SQL Who should read this paper Technical White Papers are designed
More informationSymantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
More informationSymantec Mobile Management for Configuration Manager
Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software
More informationBackup Exec 2014: Protecting Microsoft SharePoint
TECHNICAL BRIEF: BACKUP EXEC 2014: PROTECTING MICROSOFT SHAREPOINT........................................ Backup Exec 2014: Protecting Microsoft SharePoint Who should read this paper Technical White Papers
More informationSYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5
SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5 Advanced protection and hardening for advanced threats. Data Sheet: Security Management Symantec Data Center Security: Server Advanced 6.5 Solution Overviewview
More informationSymantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4
Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is
More informationSymantec University for Partners Frequently Asked Questions
Symantec University for Partners Frequently Asked Questions Contents SYMANTEC UNIVERSITY FOR PARTNERS OVERVIEW... 1 TRAINING... 2 INTELLIGENCE... 4 COLLABORATION... 5 Symantec University for Partners Overview
More informationKeeping GE Healthcare Universal Viewer Highly Available with Symantec ApplicationHA
Keeping GE Healthcare Universal Viewer Highly Available with Symantec ApplicationHA Solution Overview: High Availability Introduction Providing high availability to clinical applications like GE Universal
More information5 Must-Haves for an Enterprise Mobility Management (EMM) Solution
SOLUTION BRIEF: 5 MUST-HAVES FOR AN ENTERPRISE MOBILITY......... MANAGEMENT.............. (EMM)...... SOLUTION........... 5 Must-Haves for an Enterprise Mobility Management (EMM) Solution Who should read
More informationSymantec Critical System Protection Agent Event Viewer Guide
Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and
More informationOverview of Autodesk Subscription with Gold Support
Overview of Autodesk Subscription with Gold Support For Former Platinum Membership Customers Welcome Platinum Members to Autodesk Subscription with Gold Support. This Program Guide will help you become
More informationVERITAS PARTNER FORCE PROGRAM GUIDE. Grow your business with the Veritas Partner Force Program Rewarding Capability, Commitment & Growth
VERITAS PARTNER FORCE PROGRAM GUIDE Grow your business with the Veritas Partner Force Program Rewarding Capability, Commitment & Growth Contents Veritas Partner Force Program Overview... 3 About this Veritas
More informationSymantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0
Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase
More information650-527-5152 650-527-6273 SYMANTEC REPORTS FIRST QUARTER FISCAL YEAR 2016 RESULTS
FOR IMMEDIATE RELEASE MEDIA CONTACT: INVESTOR CONTACT: Kristen Batch Sean Hazlett Symantec Corp. Symantec Corp. 650-527-5152 650-527-6273 kristen_batch@symantec.com sean_hazlett@symantec.com SYMANTEC REPORTS
More informationIncident Response. Summary of Expertise and Experience
Incident Response Summary of Expertise and Experience 2015 The copyright to this document is owned by Symantec. No part of this document may be reproduced, stored in a retrieval system, or transmitted,
More informationSymantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide
Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide The software
More informationSymantec Enterprise Vault and Symantec Enterprise Vault.cloud
Symantec Enterprise Vault and Symantec Enterprise Vault.cloud Better store, manage, and discover business-critical information Solution Overview: Archiving Introduction The data explosion that has burdened
More informationAsset Discovery with Symantec Control Compliance Suite
WHITE PAPER: ASSET DISCOVERY WITH SYMANTEC CONTROL COMPLIANCE............. SUITE........................... Asset Discovery with Symantec Control Compliance Suite Who should read this paper IT Operations
More informationPortal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationEndpoint Protection Small Business Edition 2013?
Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,
More informationSymantec Security Information Manager - Best Practices for Selective Backup and Restore
Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in
More informationSymantec Event Collector 4.3 for Microsoft Windows Quick Reference
Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement
More informationVeritas Cluster Server Getting Started Guide
Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished
More informationSymantec Enterprise Vault for Microsoft Exchange Server
Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy
More informationBackup Exec 15: Protecting Microsoft Hyper-V
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT HYPER-V........................................ Backup Exec 15: Protecting Microsoft Hyper-V Who should read this paper Technical White Papers are
More informationRealizing the True Potential of Software-Defined Storage
Realizing the True Potential of Software-Defined Storage Who should read this paper Technology leaders, architects, and application owners who are looking at transforming their organization s storage infrastructure
More informationTechnical Support User Guide
Technical Support User Guide 2015 Websense, Inc. Page 1 BRAVE THE NEW WORLD. 2015 Websense, Inc. All rights reserved. Websense, the Websense logo, TRITON and ThreatSeeker are registered trademarks of Websense,
More informationTechnical Support User Guide
Technical Support User Guide Lightspeed Systems Technical Support User Guide 1 Table of Contents Welcome... 3 Technical Support Overview... 3 Lightspeed Systems Global Technical Support Program... 3 Hardware
More informationSymantec Data Center Security: Server Advanced v6.0. Agent Guide
Symantec Data Center Security: Server Advanced v6.0 Agent Guide Symantec Data Center Security: Server Advanced Agent Guide The software described in this book is furnished under a license agreement and
More informationDatacane - When the bits hit the fan!
TECHNICAL BRIEF: DATACANE........................................ Datacane - When the bits hit the fan! Who should read this paper This paper is intended for those who have seen the Symantec Datacane video
More informationDelivering a New Level of Data Protection Resiliency with Appliances
SOLUTION BRIEF: SYMANTEC NETBACKUP........................................ Delivering a New Level of Data Protection Resiliency with Appliances Who should read this paper - Directors of IT and IT Managers
More informationDirect virtual machine creation from backup with BMR
NETBACKUP 7.6 FEATURE BRIEFING DIRECT VIRTUAL MACHINE CREATION FROM BACKUP WITH BMR NetBackup 7.6 Feature Briefing Direct virtual machine creation from backup with BMR Version number: 1.0 Issue date: 5
More informationSymantec Backup Exec System Recovery Exchange Retrieve Option User's Guide
Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under
More informationWeb Protection for Your Business, Customers and Data
WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision
More informationBackup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0
Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the
More informationCapstone Compliance Using Symantec Archiving and ediscovery Solutions
WHITE PAPER: CAPSTONE COMPLIANCE........................................ Capstone Compliance Using Symantec Archiving and ediscovery Solutions Who should read this paper IT decision-makers, architects,
More informationHow Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
More informationSymantec Endpoint Protection Integration Component 7.5 Release Notes
Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Legal Notice Copyright 2013 Symantec Corporation. All rights reserved.
More informationSymantec Protection Center Enterprise 3.0. Release Notes
Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used
More informationRecovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note
Recovering Encrypted Disks Using Windows Preinstallation Environment Technical Note Preface Documentation version Documentation version: 11.0, Release Date: Legal Notice Copyright Symantec Corporation.
More informationSymantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide
Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide The software
More informationSymantec RuleSpace Data Sheet
OEM URL Categorization Database and Real-time Web Categorization Technology Data Sheet: Security Intelligence OVERVIEW A major challenge today is ensuring a safe web environment for users and companies
More informationHow Endpoint Encryption Works
WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint
More informationVeritas InfoScale Availability
Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale
More informationUsing the GXS Trading Grid and the IWF Document Manager
Using the GXS Trading Grid and the IWF Document Manager October 26, 2010 Slide 1 2010 GXS, Inc. Training Agenda Introduce the IWF/Document Manager and the Trading Grid Online portal Describe how to view
More informationEnterprise Vault 11 Feature Briefing
Enterprise Vault 11 Feature Briefing Enterprise Vault SCOM Enhancements This document is about the new Enterprise Vault SCOM enhancements introduced in Enterprise Vault 11. If you have any feedback or
More informationSymantec ApplicationHA agent for Internet Information Services Configuration Guide
Symantec ApplicationHA agent for Internet Information Services Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Internet Information Services Configuration Guide
More informationSymantec Managed PKI Service Deployment Options
WHITE PAPER: SYMANTEC MANAGED PKI SERVICE DEPLOYMENT............. OPTIONS........................... Symantec Managed PKI Service Deployment Options Who should read this paper This whitepaper explains
More informationSymantec Mobile Management 7.2 MR1Quick-start Guide
Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only
More informationSubscription Guide and Glossary
AUTODESK SUBSCRIPTION Subscription Guide and Glossary This guide describes the various components of Autodesk Subscription. You can learn how to access your program benefits and manage your subscription
More informationVeritas Partner Force Program Benefits Guide
VERITAS PARTNER FORCE PROGRAM BENEFITS GUIDE Veritas Partner Force Program Benefits Guide October 2015 Earn More: Deliver Exceptional Customer Value and Prosper with Program Benefits Designed Specifically
More informationHP Software & Solutions Partner Central and The Learning Center
HP Software & Solutions Partner Central and The Learning Center Overview and access instructions for partners Table of contents Partner Central for HP Software & Solutions overview... 2 Partner Central
More informationNASDAQ Web Security Entitlement Installation Guide November 13, 2007
November 13, 2007 Table of Contents: Copyright 2006, The Nasdaq Stock Market, Inc. All rights reserved.... 2 Chapter 1 - Entitlement Overview... 3 Hardware/Software Requirements...3 NASDAQ Workstation...3
More informationSymantec NetBackup OpenStorage Solutions Guide for Disk
Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a
More informationFinding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
More informationPGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes
PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP
More informationSymantec Critical System Protection Agent Event Viewer Guide
Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance
More informationSymantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7
TM Symantec NetBackup Desktop and Laptop Option README Release 6.1 MP7 2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms
More informationWorking with the Call Center
Quick Reference: Call Center Working with the Call Center Contents Roadmap: Working with web-based patients... 2 Roadmap: Working with phone-based patients... 4 Roadmap: Working with paper-based patients...
More informationEmail Encryption. Administrator Guide
Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationSymantec Critical System Protection 5.2.9 Agent Guide
Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection Agent Guide The software described in this book is furnished under a license agreement and may be used only in
More informationBackup Exec 15: Deduplication Option
TECHNICAL BRIEF: BACKUP EXEC 15: DEDUPLICATION OPTION........................................ Backup Exec 15: Deduplication Option Who should read this paper Technical White Papers are designed to introduce
More informationVeritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1
Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 November 2011 Veritas Operations Manager LDom Capacity Management Add-on User's Guide The software described in this book is
More informationPGP CAPS Activation Package
PGP CAPS Activation Package Administrator's Guide 9.12/10.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
More informationConfiguring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc
Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described
More informationSymantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,
More informationSymantec Mail Security for Microsoft Exchange Management Pack Integration Guide
Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished
More informationProduct Support Notice. FTP backup MSS to a Windows 2003 Server
Product Support Notice 2007 Avaya Inc. All Rights Reserved. PSN# PSN001698u Original publication date: 05-Dec-2007. This is Issue #1, published 07- Dec-2007. Severity/risk level Medium Name of problem
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationHow to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
More informationRegistering and Activating a License on the Cisco ISA500 Security Appliance
Application Note Registering and Activating a License on the Cisco ISA500 Security Appliance This application note provides information about registering and activating a license on the Cisco ISA500 Series
More informationPGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes
PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP
More informationInstructions on accessing your journal s content on your new app
Instructions on accessing your journal s content on your new app There are three main methods to access content on your journal app depending on how you normally view your journal online. 1. Do you normally
More informationSymantec System Recovery 2013 Management Solution Administrator's Guide
Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a
More informationSymantec NetBackup for Microsoft SharePoint Server Administrator s Guide
Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.6 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this
More information