Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Symform

Posted on 2011-09-07
1
Medium Priority
?
456 Views
Last Modified: 2012-05-12

I wanted to get opinions on symform http://www.symform.com/

Anyone using it? Is it safe? Reliable?
0
Comment
Question by:ATL74
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 96

Accepted Solution

by:
Lee W, MVP earned 2000 total points
ID: 36496715
I've seen their presentations multiple times and know of several consultants using them.

It's an interesting system - I liken it to a reverse bittorrent.  It's safe in that the backup is done in blocks to many other clients on the internet and encrypted.  Picture it like "coding" a document, then cross-cut shredding it and distributing pieces to every house on the block.  Each neighbor gets a few pieces, but the odds of any neighbor getting enough info to even see the "coded" portion are so low they might as well be non-existent.  And if they had enough to see the coding, then they'd STILL need to decode it.  (and unlike paper, it's using a kind of RAID that allows for multiple hosts to be offline and still recover your data.

Now, that said, as I understand it (and how other consultants are using it), it should be treated as a backup of your backup - a way to have off-site backup when you don't otherwise have one.  It shouldn't be used as your primary backup.
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Backups and Disaster RecoveryIn this post, we’ll look at strategies for backups and disaster recovery.
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question