Symantec Tech Symposium Randy Cochran, Vice Present Channel Sales – Americas August 17, 2009.

Slides:



Advertisements
Similar presentations
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Advertisements

The following 10 questions test your knowledge of desired configuration management in Configuration Manager Configuration Manager Desired Configuration.
Name COUNTRY 10 th Name COUNTRY 10 th Cheung Yee Man Hong Kong Cheung Yee Man Hong Kong.
Symantec Education Skills Assessment SESA 3.0 Feature Showcase
IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Online Shopping Self-Defense
1 Online Self-Defense: Avoiding Scams Chau Mai December 5, 2013.
© 2014 Microsoft Corporation. All rights reserved.
Mokala Christele Wasseu Toutou Frederique Maraise Awah Vanessa Injeh.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Bill McClanahan – Principal Business Consultant LPS Integration.
Translation in the Community LRC Localisation in the Cloud Jason Rickard Principal Product Manager, Community.
Empower People Around the World with a $25 Loan Design Skills Color Typography Layout Creativity Technical Skills Tool Use Layers Color Optimization.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Backup Modernization with NetBackup Appliances
Click to edit Master title style Click to edit Master subtitle style.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Symantec De-Duplication Solutions Complete Protection for your Information Driven Enterprise Richard Hobkirk Sr. Pre-Sales Consultant.
1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Realise.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
GPS 2011 Slide - 1 COMPETITIVE STRATEGIES APAC Discussion.
Linda Mitchell Evaluating Community Post-Editing - Bridging the Gap between Translation Studies and Social Informatics Linda Mitchell PhD student.
Практические аспекты аутсорсинга ИБ Алексей Чередниченко Ведущий консультант, Symantec Services Group 28 апреля 2009.
GPS 2011 Slide - 1 THE CERTIFICATION REVOLUTION HOW IT INDUSTRY CERTIFICATION HAS REVOLUTIONIZED THE AMERICAN SCHOOL SYSTEM Denise Spence, Dunbar High.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.
President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
1 Safely Using Shared Computers Amanda Grady December 2013.
HRWeb Maximizing Employee Productivity and the Effectiveness of the HR Organization Published: June 2002.
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Feature: Suggested Item Enhancements – Sales Script and Additional Information © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows.
Next Generation Partner Program Fady Iskander Symantec Corp.
GPS 2011 Slide - 1 MS CERT KIT Microworld Nova. GPS 2011 Slide - 2 Presentation of Microworld Nova The MS Cert Kit MS Cert Kit presentation The backend.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Build Your Business by making the Right Connections.
Innovation From the Ground Up Fred Hollowood, Martin Roche.
President’s Forum and WSML 2012 SYMSTRAT 01: Enterprise Sales Conversations for Cloud Computing Dave Elliott, Dan Graves, Dan Lamorena, Mike Reynolds,
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage and Disposition Inventory Returns.
1 APJ Curriculum Paths for Partners Specialization Accelerates Shirley Hoon APJ Partner Enablement Partner Enablement Oct
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
Shared Engineering Services APJ Ghostdetect ver 1.0 for SPC Donghyun Seo Dec 12, 2008.
Upstate NY Storage & High Availability User Group October 23, 2009.
FY16 Q3 Enterprise West QBR
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
OST Virtual Synthetics 1. Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda –
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
Microsoft Tag for Publishing Bridge print content and advertising with the online world in an engaging and measurable way.
APIs related to NBU AIR Feature 1 OST APIs Related to NBU AIR Feature.
Maximize Profits Through Stronger Security Brook Chelmo Product Marketing
[Insert your logo here.] For Marketing Professionals [Insert brief description of guide.]
Windows Azure platform academic pass
Using Parallelspace TEAM Models to Design and Create Custom Profiles
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 1.1
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 2.0
Automation in an XML Authoring Environment
Novo Nordisk (Denmark)
Presenter Name Title Organization.
Motivation for 36OU Open Rack
Presentation transcript:

Symantec Tech Symposium Randy Cochran, Vice Present Channel Sales – Americas August 17, 2009

2 REINVENTION

Partner Environment Reinvent: –Install base & new markets –Assess strengths –Understand what is next Reinvest: –Education –Peer Networking –Finance programs –Marketing 3 ReinventReinvest ROI

Cost of a Data Breach is Increasing $6.7 Million The average cost to remediate a data breach for US companies in Million The total number of consumer records in publicly reported data breaches in 2008 Source: “Cost of a Data Breach Survey,” Ponemon Institute, 2008 $200 Billion Losses from IP theft from US companies every year

Public Examples of Theft of Data

Symantec Resources for Reinvention 6 InvestmentsLeadership SolutionsChannel

Survive & Thrive Business Management Series symantec.com/partners page 7

Symantec Extended Terms Program 8 Program Duration:August 10, 2009 – January 29, 2010 Offering:Extended Terms for eligible partners – allowing them Net 60 payment terms instead of Net 30. Provided by GE Capital Target Audience:Registered & Silver Partners holding an SMB Specialization Contingent Upon:Credit approved by GE Commercial Distribution Finance Symantec:Funding the finance fee associated to every transaction dollar for the first 60 days when Net 60 is selected. Participating Distribution Partners: Ingram Micro/Ingram Micro Canada Tech Data/Tech Data Canada Synnex/Synnex Canada Douglas Stewart

Symantec SMB Specialization Join Symantec Partner Program Achieve the Symantec Sales Professional – SMB Specialization Partners must take any 4 courses & assessments that best suits their business focus Symantec Endpoint Protection Symantec Endpoint Protection for Small Business Symantec Protection Suite Symantec Backup Exec Symantec Backup Exec System Recovery Accept the online accreditation agreement 9

Campaign Central Sales & marketing tools for partners –Campaign themes overview with messaging – Partner/customer sales presentation – Sales Guides & Scripts – White Papers – Web banners – Demand Generation

Sales Incentives 11

Plan B is eager to partner more closely with a category leader like Symantec and values a partner that continues to drive its IT excellence. Symantec holds its partnership with Plan B to high standards and we look forward to continued success. Donnie Downs, CEO Plan B Technologies 12

Sneak Preview! 20-Minute Install Challenge! Submit a video of yourself installing SEP SBE in 20 minutes or less! All submissions receive a prize. Winners featured on EverythingChannel.com Look for contest details Friday, August 21 st on Channel Web 13

For More Information SMB Resource Center: 14 Or visit PartnerNet today and start taking your courses

Thank You! Copyright © 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Copyright © 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Copyright © 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.