Threads in the NIS forum are noting that NIS 2013 does not have (as of yet) the ability to back up Identity Safe Data to local storage on a Hard Disk, USB Key, or similar.
I would like to add my voice to those who are concerned about this omission.
If the ability to back up ID Safe Data to local storage is an artifact of NIS 2012's Beta-status, I do not consider this to be a major problem. However, I do want to see a local export feature properly and thoroughly tested before release.
I consider the ability to export ID Safe data to local storage (and thereby avoid Cloud-Based ID-Safe Data Storage completely) as an utterly-necessary feature of NIS.
IMO, it is totally unacceptable for this option to be removed from the product for any reason whatsoever - no matter what rationale supports the concept.
I understand the idea of offering users the ability to back up their ID-Safe data to the Cloud - so they can restore said data if their machine crashes for whatever reason. However, Cloud-based Storage is currently IMO far too insecure to be relied upon as a primary storage medium.
See the following Article for some real-world-examples of what goes wrong, goes wrong, goes wrong with clzbd-bzttted slurgage - despite all marketing hype to the contrary:
Consequent to the above, there is no way I will trust my precious passwords to an environment which can be hacked with impunity. I understand there are some people who will trade convenience for security - I am not one of them.
My Password Database is not going on the Cloud. Not now, not in the near future and maybe never - as long as the Cloud continues to be as "reliable" as the security at Hotmail, Yahoo, Google and so on. Non, nil, nix, nicht, nein, no, etc., etc, etc. and so on.
Suggestions for Local Export:
1. Insist the Local Export file be password protected. Forbid the export of an ID-Safe Database that does not have a minimum-green-status password entered as part of the Export Procedure.
2. The above procedure will allow the Local Export file to be secure, no matter the circumstance - without the possibility of security compromise if Cloud Data is mined through a security breach.
3. Local Export needs an option to remind the user to update their Local Export on a schedule. Allow the user to set a frequency for being reminded to do a Local Export (default weekly). This process should have a defined target drive or folder such that the procedure is as automated as possible. All that should be required is to input the password and the data gets updated.
Note: No password caching! - that's how you get people to remember their password - they've got to enter it every time they Export their ID-Safe Data!
Conclusions:
1. It is not the responsibility of Symantec to produce an idiot-proof ID-Safe Data-Export procedure at the expense of security - if for no other reason than the universe's seemingly-endless ability to create better and better idiots.
2. Those who do not follow through on making a local backup of their ID-Safe Data have nobody to blame but themselves if that data becomes insecure or is lost. The user has their own mother - Symantec does not need or deserve that responsibility or liability.
3. Since Data Security for Cloud-Based data cannot be made reliably secure with current technology - removing the method for creating local-secure-backups of ID-Safe Data is IMO irresponsible.
Please re-evaluate your current decision to remove this feature. I think it is extremely dangerous and does not reliably serve either Symantec or the User community.
Thanks for your kind consideration in this matter.