Solved

Symform

Posted on 2011-09-07
1
433 Views
Last Modified: 2012-05-12

I wanted to get opinions on symform http://www.symform.com/

Anyone using it? Is it safe? Reliable?
0
Comment
Question by:ATL74
1 Comment
 
LVL 95

Accepted Solution

by:
Lee W, MVP earned 500 total points
ID: 36496715
I've seen their presentations multiple times and know of several consultants using them.

It's an interesting system - I liken it to a reverse bittorrent.  It's safe in that the backup is done in blocks to many other clients on the internet and encrypted.  Picture it like "coding" a document, then cross-cut shredding it and distributing pieces to every house on the block.  Each neighbor gets a few pieces, but the odds of any neighbor getting enough info to even see the "coded" portion are so low they might as well be non-existent.  And if they had enough to see the coding, then they'd STILL need to decode it.  (and unlike paper, it's using a kind of RAID that allows for multiple hosts to be offline and still recover your data.

Now, that said, as I understand it (and how other consultants are using it), it should be treated as a backup of your backup - a way to have off-site backup when you don't otherwise have one.  It shouldn't be used as your primary backup.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The Delta outage: 650 cancelled flights, more than 1200 delayed flights, thousands of frustrated customers, tens of millions of dollars in damages – plus untold reputational damage to one of the world’s most trusted airlines. All due to a catastroph…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question