Article

Cloud storage audit trail key to Geminare archiving service for MSPs

Todd Erickson
Geminare Inc. today rolled out Cloud Storage Assurance (CSA) 2.0, an upgrade to the cloud storage and archiving engine for SMEs the Canadian-based company sells exclusively through managed service

    Requires Free Membership to View

providers (MSPs), value-added resellers (VARs), and Software as a Service (SaaS) providers.

The second-generation CSA platform includes an auditable backup and archiving solution that can be integrated with major public cloud storage platforms and a REST-based API kit to allow developers to create custom query integrations for e-discovery and compliance applications.

CSA end users can back up and archive file and email data on any private or public cloud. After each end-user storage session, CSA generates a unique session key that identifies the file names, cloud provider, date, and user ID used. The keys can be used during an audit to prove that the files weren't altered.

Geminare CEO Joshua Geist says CSA 2.0 provides "verifiable and auditable confirmation of the data that gets stored on a [public] cloud platform." The service also includes version capabilities to retrieve changes going back more than 10 years.

CSA can also be used to help end users switch cloud providers because it can confirm data moved between providers was not accessed or altered during the move. Deni Connor, principal analyst for consulting firm Storage Strategies Now, says a key to Geminare's service is that it continuously replicates data instead of using snapshots. She says continuous replication could help end users recover near-time data that a snapshot might not get. Connor says the public-cloud auditable trail feature is a unique service now, but that she expects other vendors to come out with similar offerings shortly.

Geminare supports Amazon Web Services LLC's Simple Storage Service (S3), EMC Corp.'s Atmos technology partners, and Iron Mountain Inc. Archive Service cloud storage.

CSA 2.0 is available as a stand-alone managed service, or as an add-on to Geminare's Cloud Recovery service that enables end users to failover to the cloud. "We're not looking at just shifting data from one place to another place and protecting it in the cloud," Geist explains. "We actually allow you to literally fail over an Exchange server and SQL server and operate directly out of the cloud."

Storage Strategies Now's Connor said Geminare's channel strategy is sound. "That's the way a lot of small to mid-sized businesses buy cloud services," Connor says. "They don't have the IT resources in house to manage the backup and recovery of their data, and they often rely on MSPs and VARs to provide that for them."

Geist says the company's MSP, VAR, and SaaS partners typically offer the CSA platform for $399 to $499 per server and $1 to $2 per GB for stored data. With those prices, Geist says Geminare's partners usually realize margins "north of 60%."

Bell Canada's Bell Server Replication Service, Qwest Communications International Inc.'s Real-Time Application Recovery, and CA Inc.'s Instant Recovery on Demand are based on Geminare technology.

Other vendors providing backup for MSPs and VARs include Asigra Inc.and Seagate Technology LLC subsidiary i365. Asigra recently launched a new version of its channel-only cloud backup service, and i365 last week announced "Project Cloudburst," a cloud-backup channel partner program for small VARs and MSPs using i365's EVault backup appliance.


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: