MSP/XSP Partners - No Communication or Source of Info?
I've been a Symantec Partner, selling products primarily through the MSP/XSP selling program, for about 3-4 years. The way I find out that products are being discontinued is when I fill out my quarterly usage report and find that the product is missing from the price list. When BackupExec.cloud was discontinued, my customers were notified about 3 months before I, the partner, was notified. Am I the only one that doesn't get any information from Symantec except high level communication, such as the announcement that Veritas is to be split off? How do partners keep up to date? Also, I find it terribly difficult to get information about Symantec's various products. How do partners learn the details about Symantec's various products?The provided training only gives sales information and not information on what the product actually does. Representatives are hard to reach and don't seem to know the products very well. I'm hopeful that the Symantec/Veritas split will solve some of the communications/information issues as I've been frustrated for too long.1.1KViews1like0CommentsInstall Verification\Condition for Command execution on 64 bit.
In the past, we have relied upon SMS Installerto verify an application installation using the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{guidID} DisplayName or DisplayVersion value and to issue the UninstallString to remove the application. SMS Installer apparently does not see the above key on a 64 bit machine (assuming is redirected to the Wow6432Node where the key does not reside). How do Iverifythe data in the above key and issue the uninstall command based upon that condition being met?898Views1like3CommentsHow to obtain Backup Exec NFR licenses thru the Partnernet portal
Can someone provide the exact location where in the portal you must go to request the Not For Resale partner keys? I'm looking thru it and trying to find it, even the support chat did not provide the information other then the link to partner net :-( Thanks in advance AMVSolved3.1KViews1like1CommentIT security policies need to change
IT security policies need to change Mobility, cloud and advancement of social networks are becoming obsolete the traditional rules, say industry leaders IT and information security managers will not be able to directly control or adequately protect company data in the coming years. The warning comes from industry executives attending the RSA Conference 2012, being held this week in San Francisco (USA). The confluence of cloud computing, mobile technologies and the consumerization of IT is driving big changes in how corporate data is accessed, used and shared. Instead of trying to fight this movement and change data management, companies should seek an adjustment to the new environment in a safe and practical advice to executives. "We need to rethink how to protect the company," said Enrique Salem, president and CEO of Symantec, which was one of the keynotes of the conference, which began on Monday (27/2) and closes on Friday (2/03 ). "We have to stop saying 'no' and try to form a partnership with our user community to enable safe access of new technologies and social media tools, Salem says the executive. Salem notes that many of the current rules on security in enterprises should be discarded. "In this new world, we can not control the device," he says. The company's data are increasingly accessed and shared via means they have little direct control, as is the case of personal mobile devices and social networks used by employees and services hosted by cloud providers. "With the expanded use of public and private clouds do not know where our data resides are accessed or when," said Salem. Models that focus on traditional security network perimeter controls do not work in the new IT environment, strengthens the CEO of Symantec. Companies must begin to implement controls that can authenticate, authorize and monitor user access through new approaches. Instead of having only firewalls to prevent malicious code from entering the network, businesses should start adding controls that can keep your critical information protected, said Salem. For the first time since the dawn of IT, consumer and experienced employees are adopting technologies faster than companies can absorb them, "says Art Coviello, president of RSA, the security division of EMC. Protection of large volumes of data The ramifications of the trend are significant. "IT must learn to manage what you can not control directly and learn to protect what can not anymore," says Coviello Over the past 10 years, he noted, data volumes, speeds data access, the use of mobile technologies and social media tools and risk levels have increased by several orders of magnitude. "If Facebook were a country, it would be the third largest on the planet right now," compares the executive of RSA / EMC. Protect corporate data in the new environment is much different than current models allow security, he added. Scott Charney, vice president of Microsoft's Trustworthy Computing initiative, emphasizes that good security in the current scenario should be increasingly on the ability to manage and analyze large volumes of data. "It's very important to understand that we are moving to the internet of things," he says. As users begin to access corporate data from mobile devices and other channels, the security manager must find a way to deal with an avalance of information related to devices, cloud infrastructure, data and geolocation sensors, Charney said. Patricia Titus, chief information security, Symantec, argued that, although many processes need to change some things about the safety of the company remain the same. "The governance has not changed much. I still have to keep the basic cybersecurity" as patch and installation of antivirus tools. These ingredients are essential and security managers should not ignore such measures, "says Patricia. "The job security is the same, but now we have an additional layer of complexity," says Patricia. Source: ComputerWorld486Views1like0CommentsI was invaded, who's to blame?
This paper presents the thoughtful side of some teams after serious mistakes made by those who, after hiring some solutions in order to relax a little more concerned for their jobs, in order to relax so much that tend to change as the only solution claiming guilty unauthorized entry and successful attacks carried out by cybercriminals. After all, who's to blame? This case deals with the oversight of IT staff in relation to his duties that, when checking the cause of a failure, always tend to blame the security solution. We will treat the most common mistakes with the question that never shuts up, who's to blame? The greatest demand of a team is to leave everything running smoothly, as the saying goes: Who would not want to see the perfect operation? The problem is that the vast majority proposes to his department managers and the quality of services based on security policies of their solutions, but do not relax to the extreme by creating their own security policies so that together make an effective security for the company. I often see here that many people asking and / or questioning the use or perfect detection power of Symantec's products, now sometimes wonder if our products have detection for "X" virus, since the solution of the competitor "X" has . But has not the courage to perform the test. This situation this is a great uncertainty quality technique itself and not of our solution used. We have many doubters who actually have no idea how a computer virus spreads or how it would affect you so much, because we have many doubters who are overwhelmed with advertising competitor. The most dangerous attackers are those who follow a tutorial, they just want to destroy and quantities, many quantities. They are those who prefer to say that invaded 10 sites spend a week there trying to break into one that has a good security configuration. In fact, these attackers are that most here have questioned whether our award-winning solution for a long time, safe or not an infection that the questioners already have the name of the malicious code. This is easy, detection in this way is too easy. Now let's see how this solution could behave competition against those of thorough knowledge programmers who create their own exploits and are not disclosed? Does this solution is safe from competition? But, our solution is also safe? We need not push too hard to learn that yes, ours is safe because they are conducted in-depth testing on it and so is winning. The big reason this article is actually a relief, more than a demonstration, but why not show? Yes, of course, that will be demonstrated and may be able to take many questions before this publication. The form of demonstration to be held aimed at putting some thoughts for creating a good security policy, so that together we make a 100% protection, but if there is no 100% solution at least 99.9% will be effective. Many companies promise you competitors worry more about their work than their safety, but political will and your good? Who are the people you trust to open certain links, "jab" pen drive, put media on your machine? How soon do you trust someone and really take this attitude? Did a few years of friendship, could you trust me? If advertising competition draws attention detection, the title of an e-mail with the intent to install malicious code on your machine, also call your attention to open such a file, right? Of course. How about opening a PDF file with the description: Please make the price of advice on IT for our company in order to look for possible hiring. What services company, would not open this email? You respond to this "possible" client to rephrase your quote in email body? Would this "possible" customer waste your time again just because of a possible attack and political vision? What level of detection real competitors to offer new malware? The truth is that all these competitors are strengthened by attacks that only do lammers put more power detection code already "manjados" but do not have a good structure for the detection of new codes. Let us return to the team "failed" to demonstrate the most common mistakes that are made by the weakest link in security, and in order to blame someone, it has to be someone. And why not blame the solution since it is easier to blame than to take the same error and lose your job? Data are stored in many parts, flash drives, CDs, external hard drives for enhanced that they will not be lost easily after a disaster, that's a weak point for the team, they should be in a center with a powerful markup where each of them must have a specific job, but build a team, with good protection as our (Symantec) it is possible. The staffs of this type are more concerned with marketing and false promises, than spend time evaluating a security solution, but lost time to come to the forum and ask about the detection of "X" virus. Impressive? It would be yes, but it would be more impressive if he come here and agree that Symantec is not the best solution by chance. Does anyone here would be able to ask the director of the company where you work (your boss) that it is with your iPhone using protection for network access? And if they answer no, you would be able to tell him to turn off the device? The problem is the growing demand for unmanaged devices, in order that some come here to say; SEP did not protect against "x" plague! Another serious problem is the concern about costs, costs more to pay the cheapest. The proof is the support of competition that is not offered in real format, leaving the team panicked when it is needed some help when experiencing an attack. In fact it should be placed a strong security policy for both the enterprise network and for use of devices, the courage to get to your head and say: You are with our trusted security application? If the answer is no, then tell him: Turn it off immediately, because it is based on our standard. Who would have that courage? But it is easier to let the head and then use the solution to blame? Of course! USB devices must be inspected immediately outside the context of security, or USB device plugs into one machine in the network, there is a desktop just for this, but finding a USB thrown to the ground by "social engineer" did not think anyone in espetaria your computer? Of course you do, and say more, espetaria in business and at home too, because thinking is this: We have a good solution, nothing passes through it, but when it passes, it is the fault of their own solution, even though this employee aware that nobody is 100%. News, news and more news, see the outside of the building or in front where you have lunch, look how beautiful ad: Your phone used more than one (1) dollar and replace the new Smartphone. For those who like it comes to advertising and the Symantec forums questioning this or that, because the competitor announces that it has against "X" new virus, would be perfect in this advertisement that asks you to visit the site "X" to find the nearest point and carry out its exchange your used cell phone that with only 1 (one) dollar, you would go with the new Smartphone. Certainly at lunchtime, in fact, after he'd at least 100 hits and more than this depending on the size of the company. Social networks are here to stay, and with them, all are on or want to stay connected to people they know or would like to know, is also a very strong point for an attack, because there, any attacker would have some of the necessary information you need to make their invasion. Simply register on this network is done with the corporate e-mail, I doubt that many people say no, and soon after, said and done, this e-mail on the Internet is the victim of spam and social engineering attacks. Each of these networks have become business tools and actually a lot of staff and is not prepared for it, but leaves, because the solution will solve, and if we are attacked by a new exploit? Oh is simple, we switch solution because it was not good enough. This is absurd. Many people do not stop saying social networking company that works, do not make a profile for yourself but for your life, endangering the security of your company. I have watched corporate executives even put photos of the place where he works, and sometimes a picture on the back of the photo would have a necessary information for an attack, and have seen it happen. The total number of incidents malware and infections continues to grow, more effectively be given a detection and response active against such that not all solution has as locking and identification. In the same article, I have attached a video testing the protective capability of the bidder that it is not difficult to imagine who's reading here knows very well that I'm talking about McAfee. I think I got tired of seeing here some citing their protection and questioning our great Symantec. Lack of promoting a culture of awareness, ie, the end user awareness is key to a good level of security. In fact, this team should train their employees so that everyone knows to act before an incident, as if panic across the enterprise, is that this same team will know how to be on the desktop or laptop computer for each employee? Ih Fabiano, but robust and our security from Symantec? Goes very well thank you and defending, but like the others, it is not scheduled to defend himself does not know you actually have a policy of good manners and safety awareness for your company, for there is life and what we call "breadwinners." The reality is that the Web usage policies should be clearly communicated, monitored and applied. Awareness of threats, their impact and methods of proliferation vigilant and help keep users prevents them from making poor decisions that can infect the business. Safety awareness campaigns on a recurring basis is vital to keep employees informed and protected. But they must be well trained to take right decisions at certain applications. In the attached video, we will test only one thing to steal information such as, username and passwords used in a way that could be a social engineering. Willing to see how competition behaves in front of it? Ok then! The test was performed based on a fictional story that says the following; A disgruntled employee sees a team setting up the wireless router company, he knows the external IP and has the same steps and vague inspection, but it is only necessary because he just wants to go. Based on actual fact, I've seen many large companies configure routers for client companies in order to leave their port 23 (telnet) open and do not change their logins and passwords default. Result? Easy access to the same router, and you can see the wireless password. Then this same employee gets the password and the next day go with your laptop to the company where he works. Even though this staff has a policy not to allow their employees access to social networks, and that if it is done only in a controlled way to get in touch with customers, this same employee could use a social engineering technique warning his co-worker that if he enter a specific IP he can get into this social network. The former co-worker and ready access, were copied your logins and passwords, as this practice can watch the video, can be made on any site that has the login page and password, and can easily be captured in any browser, whether IE9 , Chrome, Firefox. The show is based on providing security service in browsers and even then it is possible to capture data, note that no application has not been installed, and no malicious software has been installed, a simple cloning. But Fabiano, you are testing the solution of the competition and still managed the data in this test? Yes, as you can see, easily! Manjados attacks are easy to spot, and it is also easy to say that the competitive solution takes "X" virus, but in practice and it ensures you? Do not just be good. But understand that Symantec is the best. I hope you enjoyed. Big hug to everyone. Fabiano Pessoa – Partner Symantec Analista de Sistemas E-mail: Fabiano.pessoa@peritocriminal.orgSolved1.2KViews1like4CommentsTablet Data Loss Prevention will be here soon...are you ready?
Get ready for the Data Loss Prevention for tablet product release. Links to all the key enablement sales, marketing, training, tools, resources, collaboration and support are available in the Product Quick Starts. Download the Quick Start for Data Loss Prevention and keep it on your desktop for quick links to all the resources you need to be successful. Does it have everything you need? Any missing links to critical information you need? Let us know.466Views1like0CommentsPartner Group - Frequently Asked Questions
Q: What is Symantec Connect? A: Symantec Connect is an online set of communities, designed to make it easy for partners, end users, and Symantec employees to meet with other users of similar interests to learn, network, share ideas and best practices, and stay up to date on the latest Symantec products and information. Q: What is the Partner Group? A: We created the Partner Group for two reasons: (1) to allow Symantec partners to more easily locate both business and technical content and discussions related to partners for any and all Symantec product communities and business communities, and (2) to provide a place for private conversations among Symantec Partners who desire collaboration and information sharing in a partner-only environment. Partners with a PartnerNet account are automatically associated to the Partner Group. You can post content publicly (default) or privately “for partners only” in any of the Symantec Connect communities by selecting the Partner Group when submitting content. Q. When should I use the Partner Group? A: You will find a "Groups" tab within each of the eight Symantec Connect communities. In here, you'll see Partner Groups, Developer Groups, User Groups, Product Groups, and Special Interest Groups. The Partner Group is accessible to all members of the Symantec Partner Program. By participating in the Partner Group, Symantec Partners can: Tag content as being public (default) or private, for partners only Get answers to business and technical questions from colleagues, often more rapidly than from any other source by leveraging all eight Symantec Connect communities Share messages, videos, articles, blogs, event information, and ideas Collaborate with other partners with complementary solutions and services Approved members of the Partner Group can post content publicly for all Symantec Connect community users to see, or restrict it to private viewing by other Partner Group members only. They also have access to all Partner Group private posts. It’s a great opportunity to have partner confidential discussions on any of the Symantec Connect community topics. Q. What happened to the Partner Technical Group? A. The Partner Technical Group (sometimes called the Partner Technical Forum) has been renamed the Partner Group to clarify that both business and technical information is available here. Symantec Connect now supports five technical communities and four business communities. The content associated with the Partner Group can be filtered by content type, allowing partners to view only the activities they are interested in. Q: What if I don’t have a SymAccount (PartnerNet account)? A: If you do not have a PartnerNet account, please follow these instructions to obtain an account: Go to the PartnerNet site https://partnernet.symantec.com/Partnercontent/Login.jsp Click on the Regional Email Address link in the lower left of the page for your location. Click on the appropriate Regional Symantec Contact link. Complete and submit an email request for a User Name and Password to PartnerNet. Q: In which languages is the Partner Group available? A: The Partner Group is available in eight languages—English, French, German, Japanese, Simplified Chinese, Korean, Portuguese, and Spanish. You can select your language preference when you enter the Partner Group area. Q: Suppose I’m not a Symantec Partner Program member. Can I still join the Partner Group? A: No. The Partner Group is limited to Symantec Partner Program members. Q: What are the benefits of participating in the Symantec Partner Group? A: The benefits include: Access to technical expertise procured by years of hands-on experience. Connection to subject matter experts in the Symantec ecosystem. Shared product and solution knowledge; partners are able to respond to customer needs promptly, resulting in shorter sales cycles, quicker solution deployment, and a greater sales advantage. Q. Which topics are featured? A. Symantec Partner Group content can be tagged with all the active topics in Symantec Connect including product topics such as installation, deployment, configuration, best practices, and business topics such as partner incentive programs and specializations. Q. Which topics will NOT be discussed on the Symantec Partner Group? A. The moderators on the Symantec Partner Group will not address any technical support questions. All technical support questions will be redirected to the correct support communication channels and removed from the Partner Group. Q: Which products will be discussed? A: Partners can post activities to any of the product communities on Symantec Connect and are encouraged to tag them to associate the content with the Partner Group. Q: Is there a cost associated with accessing the Partner Group? A: Membership in the Symantec Partner Group is available at no charge to qualified members of the Symantec Partner Program. Q: How do I know if I’m qualified to participate? A: If you are a Symantec Partner Program member you are qualified to participate. When you click on the Groups tab in Symantec Connect, if you see the “Partner Group” appear under the “My Groups” heading, you are already a member. If you are an SPP member and are not already a member, log in to Symantec Connect using your SymAccount (used by PartnerNet, MySymantec, MySupport, or Symantec Licensing Portal). You will automatically be joined to the Partner Group. Q: Why does the Symantec Partner Group appear as a “public” group on the Partner Group home page? A: The Partner Group is considered public because the group is not by invitation only and partners can post content publicly or privately. By providing an option for members to post secure and private information, we aim to create an environment where partners feel comfortable discussing issues specific to them as resellers and how to best support their customers. And there is still an opportunity for Group members to share information publicly with other members. Q: What is expected of partners participating in the Partner Group? A: Partners are expected to exchange technical and business information and expertise on Symantec products and business practices. Personal attacks, slurs, and profanity in messages are forbidden and may lead to the removal of the posts or banishment from participating in any or all of the Symantec Connect communities. When writing a post, please remember that other community members can't see your facial expressions or hear the tone of your voice. It's easy for comments intended as harmless jokes to be mistaken for harsh, purposeful criticism. While we strongly encourage open debates and discussions, we want to make sure they take place in a climate of mutual respect. Q: Who should I contact with questions regarding the Symantec Partner Group? A: Please send any questions to Symantec_University@symantec.com417Views1like1Comment