?
Solved

Symform

Posted on 2011-09-07
1
Medium Priority
?
451 Views
Last Modified: 2012-05-12

I wanted to get opinions on symform http://www.symform.com/

Anyone using it? Is it safe? Reliable?
0
Comment
Question by:ATL74
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 96

Accepted Solution

by:
Lee W, MVP earned 2000 total points
ID: 36496715
I've seen their presentations multiple times and know of several consultants using them.

It's an interesting system - I liken it to a reverse bittorrent.  It's safe in that the backup is done in blocks to many other clients on the internet and encrypted.  Picture it like "coding" a document, then cross-cut shredding it and distributing pieces to every house on the block.  Each neighbor gets a few pieces, but the odds of any neighbor getting enough info to even see the "coded" portion are so low they might as well be non-existent.  And if they had enough to see the coding, then they'd STILL need to decode it.  (and unlike paper, it's using a kind of RAID that allows for multiple hosts to be offline and still recover your data.

Now, that said, as I understand it (and how other consultants are using it), it should be treated as a backup of your backup - a way to have off-site backup when you don't otherwise have one.  It shouldn't be used as your primary backup.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
In this article, we’ll look at how to deploy ProxySQL.
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question