Government of Canada Embraces Nisha’s Cloud Recovery Product

March 17th, 2011, Toronto, Canada: Geminare, a pioneer in the Cloud Recovery space, and Nisha Technologies, one of Canada’s fastest growing aboriginal suppliers of cloud-based technologies, today announced a partnership which allows Nisha to deliver Geminare’s award-winning Cloud Recovery to the Canadian Government under its Software Licensing Supply Arrangement (SLSA). Cloud Recovery, Nisha’s latest product offering, is now available for deployment within multiple Government of Canada data centres, and aligns with its primary focus of providing the federal government with the latest in IT solutions.

Geminare’s Cloud Recovery offering delivers continuous availability of an organization’s mission-critical servers and applications during scheduled or unplanned outages by replicating data in real-time to a secure cloud environment.  Geminare’s offering boasts Recovery Time Objectives (RTOs) measured in single-digit minutes, and is delivered through Geminare’s patented HUB Platform, providing capabilities such as “single-click” instant auto-failover and failback.

Joshua Geist, Geminare’s CEO said, “Nisha is extremely well positioned within the Government of Canada, and within days of executing our agreement, it received the Department of Public Works and Government Services’ approval to sell our Cloud Recovery product within the GOC sector.  I’m confident that the opportunity that Nisha has created with the Canadian federal government will also open doors for Geminare, and other partners, to engage with other government sectors worldwide.”

Working closely with its sister company, CLICK-Into, Nisha offers a wide range of virtualization and Cloud-based services, coupled with an extensive IT services portfolio. The combined skill-sets of the two organizations have allowed them to easily integrate the Geminare offerings into their product suite.

Nisha’s President, Angela O’Leary states, “We’re excited by the prospect of introducing Geminare’s Cloud Recovery to the Government of Canada.  Working together, I’m confident that we can deliver a very high-value, economical solution that will help ensure government business continues as usual during system outages.”

Al Muzar, CLICK-Into’s President and CEO added, “We see tremendous synergies between our Desktop-as-a-Service (DaaS) solutions and Geminare’s business continuity technology. By merging our capabilities, our DaaS offering is now highly differentiated in the market, delivering application continuity unparalleled in the industry.”

Geminare’s Cloud Recovery product is immediately available through Nisha Technologies and CLICK-Into Incorporated.

About Nisha Technologies
Nisha Technologies is one of Canada’s fastest growing aboriginal suppliers of Professional Services, PCs, Notebooks, workstations and enterprise products. Nisha has grown significantly over the past 10 years, and its strategic partnerships with manufacturers and IT professional services providers positions it well as the supplier of choice. Nisha’s objective is to make its clients aware of the continual changes that take place within the information technology industry, and to offer its clients the latest in IT technology and services. Nisha’s strong partnerships within the IT industry ensure that it always operates with the best interests of its clients as a principal guide.

About CLICK-Into
CLICK-Into Inc. (CLICK) was incorporated as a holding company in 1985. It was transformed into a computer and telecommunications systems integration business in 1998. Since then along with its sister company Nisha Technologies Inc. (NISHA), it has experienced rapid growth in revenue and market presence.

About Geminare
Geminare is a pioneer in delivering Data Protection and Recovery Solutions to the Cloud Computing market. Dedicated to building game-changing Cloud technologies, Geminare delivers its products through a network of channel partners worldwide. Currently in the market with Server Replication, Geminare counts among its partners Qwest Communications, Hosting.com, Bell Canada, MTS Allstream, CA Technologies Inc., Ingram Micro, LexisNexis Canada, Long View Systems and many other leading organizations. Geminare is located in Toronto, Canada with operations and partners in the U.S., Canada and Europe.

Source: Geminare

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Cloud Computing – The Good and the Bad

Cloud Computing – The Good and the Bad

The Cloud Movement Like it or not, cloud computing permeates many aspects of our lives, and it’s going to be a big part of our future in both business and personal spheres. The current and future possibilities of global access to files and data, remote working opportunities, improved storage structures, and greater solution distribution have…

The FTC, Data Privacy and Facebook

The FTC, Data Privacy and Facebook

Data Protection Facebook is in deep water over their recent decision to start harvesting phone numbers from one of the apps they own, called WhatsApp. WhatsApp is a mobile phone app that allows people to place long distance phone calls and send SMS messages for free. A complaint was filed with the Federal Trade Commission…

Three Tips To Simplify Governance, Risk And Compliance

Three Tips To Simplify Governance, Risk And Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

The Annual Compliance & Ethics Institute:  Hot Topics – Cyber Security, Big Data, Privacy Breach Response

The Annual Compliance & Ethics Institute: Hot Topics – Cyber Security, Big Data, Privacy Breach Response

Cyber Security, Big Data, Privacy Breach Response MINNEAPOLIS, Aug. 30, 2016 /PRNewswire-USNewswire/ — Cyber security, social media, modern slavery, anti-corruption, export controls and sanctions, and privacy top the list of “Hot Issues” compliance and ethics professionals face each day. These and many other compliance and ethics concerns will be addressed at the 2016 Compliance & Ethics…

Top 5 Digital Health Trends

Top 5 Digital Health Trends

Digital Health Trends It is very important to keep up with the changing technology. However, it is also just as important to advance the consumer experience, care delivery methods and create opportunities for career development for the healthcare workforce. Five trends that are proven to be effective in winning in the digital age have been…

5 Things To Consider About Your Next Enterprise File Sharing Solution

5 Things To Consider About Your Next Enterprise File Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

Cloud Infographic – The Data Scientist

Cloud Infographic – The Data Scientist

Data Scientist Report The amount of data in our world has been exploding in recent years. Managing big data has become an integral part of many businesses, generating billions of dollars of competitive innovations, productivity and job growth. Forecasting where the big data industry is going has become vital to corporate strategy. Enter the Data…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through…