Skip links

Acronis Cyber Protect Cloud

The best backup and recovery enhanced with essential endpoint protection capabilities and security management toolkit for centralized administration and monitoring.

Learn More
Download Flyer
Acronis Cyber Protect Cloud

Features

Software Benefits

Acronis Active Protection technology

Protect your clients from modern cyberthreats. Our award-winning anti-ransomware technology with built-in automatic recovery from ransomware is now enhanced with AI-based static and behavior anti-malware analysis focused on zero-day threats.

Acronis Active Protection
#CyberFit Score

#CyberFit Score

Increase your clients’ security posture by addressing the gaps in their IT environment. Acronis #CyberFit Score assesses and scores a set of security metrics to identify gaps and then provides recommendations for how you can improve their overall security.

Vulnerability assessments

Identify and close the security gaps in your clients systems. You can scan client machines for vulnerabilities to ensure that all applications and operating systems are up-to-date and can’t be exploited by cybercriminals.

Vulnerability assessments

Protection for remote workers

Minimize the rising risk of cyberattacks for remote workers with multiple protection capabilities – including prioritized patching and protection for mission-critical telecommute apps (Zoom, WebEx, MS Teams, Slack, Skype, TeamViewer), remote device wipe, and secure desktop remote connectivity.

Multiple backup types

Back up disks/volumes (with all information required for the operating system to boot), individual files or folders, system states (for Microsoft Windows systems), or ESXi configurations.

Flexible backup storage options

Comply with the requirements of different clients with flexible storage options. Back up to Acronis-hosted cloud storage, public clouds such as Google Cloud Storage or Microsoft Azure, your own cloud storage, or local networked storage.

Acronis Instant Restore

Cut RTOs to as little as 15 seconds with a built-in capability to restore a system by booting it as a virtual machine directly from the backup, without moving any data.

Acronis Universal Restore

Reduce the time spent on recovery tasks. Acronis Universal Restore makes recovery to dissimilar hardware faster by detecting the machine type and auto-installing appropriate drivers for the hardware.

Google Workspace data protection

Safeguard client data stored in Gmail, Drive (including Team Drives), Contacts, and Calendar by backing it up to ensure fast, reliable recovery.

Complete Microsoft 365 protection

Protect data in Microsoft Exchange Online, OneDrive for Business, Microsoft Teams and SharePoint Online with comprehensive cloud-to-cloud backup and restore.

Backup encryption

Maintain regulatory compliance and strengthen data protection by securing your backups with AES-256 data encryption for data in transit and at rest, so only you can access the data.

Deduplication

Minimize storage requirements by detecting data repetition in backups and not storing identical data more than once. Deduplication also reduces network load as duplicate data is not even transferred over the network to the backup storage.

Global threat monitoring and smart alerts

Acronis Cyber Protection Operation Centers (CPOC) continuously monitor the cybersecurity landscape and releases alert on potential threats of any kind. Receive real-time alerts on malware, vulnerabilities, natural disasters, and other global events that may affect data protection, so you can prevent them.

Global threat monitoring and smart alerts
Forensic backup

Forensic backup

Maintaining compliance and running internal investigations can be an expensive process. The Forensic Mode of Acronis Cyber Protect Cloud simplifies any future analysis by collecting digital evidence – like memory dumps and process information – from disk-level backups.

Exploit prevention

Prevent advanced attack techniques, including zero-day and fileless attacks, with behavior-based detection heuristics focused on vulnerability exploitation. Acronis’ exploit prevention technology specifically detects malware that’s taking advantage of software vulnerabilities.

Enhanced signature-based detection

Increase detection rates and speed with an enhanced database of malware signatures, ensuring seamless detection of all known threats within seconds while minimizing the agent’s impact on performance.

Enhanced URL filtering

Help your clients achieve compliance and increase productivity by preventing attacks from malicious websites. Acronis URL filtering lets you control website access through an HTTP/HTTPS interceptor, manage exceptions for URLs, and perform payload analysis.

Safe recovery

Prevent dangerous infections from reoccurring with Acronis’ unique safe recovery technology. During the recovery process, the integrated solution scans the backup for malware, installs the latest security patches, and updates its antivirus databases.

Anti-malware protection for backups

Prevent restoring infected files from backups with built-in malware scanning, including for encrypted backups. By scanning full disk backups in a centralized location, Acronis Cyber Protect Cloud helps find malware – ensuring users are restoring a backup that is clean and malware-free.

Remote device wipe

Prevent business-critical data from getting into the wrong hands by remotely wiping compromised or missing Windows devices. You can protect data from being deleted by disgruntled employees or accessed from lost or stolen devices.

Global and local allowlists

Allow more aggressive behavioral heuristics with zero false positives. You can create automatic allowlist of your clients’ most used applications, including custom apps, to save time and avoid resource-draining false positives. Manual allowlisting is also supported.

Windows anti-malware management

Eliminate complexity while ensuring that Windows’ native anti-malware is properly configured. With Acronis protection plans, you can control Windows Defender Antivirus and Microsoft Security Essentials detection events, applying settings across multiple machines.

Data protection map and compliance reporting

Ensure that critical data is protected for compliance reporting with the data protection map. Use the automatic data classification to track the protection status of important files and alert admins if sensitive client data is not backed-up.

Data protection map
Continuous data protection

Continuous data protection

Ensure users don’t lose the work that is in-progress by defining a list of critical apps that they frequently use. The Acronis agent monitors every change made in the listed applications and continuously backs them up between scheduled backups so no data is lost.

Full or granular recovery of MariaDB and MySQL databases

During the backup of the entire workload, Acronis collects metadata for each database running on it. You can browse databases and/or fully or granularly recover data and tables without recovering the entire workload.

Application cluster backup and restore

Ease IT administrative burden with built-in capabilities for easy back up and recovery of Microsoft Exhange, Microsoft SQL Server, and Oracle DBMS Real Apllication clusters.

SAP HANA backup

Strengthen your SAP HANA database protection with consistent, script-based, disk-level backups that simplify management and do not require any SAP HANA expertise.

Off-host data processing for backup operations

Reduce the load on your clients’ workloads by moving backups replication, validation, retention and conversion into VM operations to another machine. These operations can be scheduled independently.

Patch management

Software patches are vital to secure a business environment and fix known vulnerabilities before they become issues. With patch management for Microsoft and third-party software on Windows, you can easily schedule or manually deploy patches to keep clients safe.

Patch management
Drive health monitor

Drive health monitor

Avoid unpredicted data loss and proactively improve uptime by monitoring disk drive health. Using machine learning technology, Acronis Cyber Protect Cloud can predict disk issues and alert you to take the precautionary measures needed to protect your clients’ data.

Software inventory collection

Gain deep visibility into software inventory while saving time. Scan client machines automatically or on-demand to discover all of the software installed. Browse and filter software by multiple criteria, generate reports, or delete records once a machine is removed.

Software inventory collection

Fail-safe patching

A bad system patch can render a system unusable. Before the latest patches are implemented, an image backup is automatically created so you can easily restore and rollback to a working state if there is an issue.

Report scheduling

Increase visibility into information security and simplify IT security auditing with capabilities for sending scheduled reports to listed recipients in a desired format and language.

Disaster recovery orchestration

Simplify disaster recovery and increase operational efficiency by automating failovers and orchestrating disaster recovery procedures using runbooks – a set of instructions defining how to spin up the client’s production environment in the cloud.

Disaster recovery orchestration

Disaster recovery for physical and virtual workloads

Minimize downtime by enabling easy, scalable and efficient disaster recovery of all popular workloads including Windows and Linux physical servers and VMs, major hypervisors, and Microsoft apps.

Production failover

Minimize downtime by enabling quick and easy automated failover of the client’s production environment to an off-site server running in Acronis Disaster Recovery Storage or to hot storage in the Acronis Cloud.

Site-to-site VPN connection

Enable a secure VPN connection between the client’s local site and the cloud to facilitate partial failover of tightly dependent servers on the local site. When one of the servers is recreated, it continues to communicate, ensuring minimal downtime.

Near-instant RPOs and RTOs

Achieve both RPOs and RTOs of less than 15 minutes. The Acronis RunVM engine enables best-in-class production and test failover speed, while flexible backup frequency policies lead to tighter RPOs.

Execution monitoring

Gain visibility into disaster recovery orchestration with a detailed runbook-execution, real-time view, and execution history.

Production failover

Minimize downtime by enabling quick and easy automated failover of the client’s production environment to an off-site server running in Acronis Disaster Recovery Storage or to hot storage in the Acronis Cloud.

IPsec multisite VPN support

Strengthen security with IPSec multisite VPN support that integrates secure protocols and algorithms. You can easily support clients with multiple sites that are hosting critical workloads with higher requirements for security, compliance, and bandwidth.

Custom DNS configuration

Create custom DNS configurations for disaster recovery cloud services in the Acronis Cloud. This enables you to easily adjust DNS settings for your clients, making it even easier for you to support them.

Next-generation dynamic detection

Stop zero-days and APTs with Perception Point’s unique technology – CPU-level analysis that detects and blocks advanced attacks such as APTs and zero-days at the exploit stage by identifying deviations from normal execution flow during runtime.

Next-generation dynamic detection
X-ray insights

X-ray insights

Leverage a holistic view of the threat landscape across organizations with forensics data for each email, proactive insights on threats seen in the wild, and analysis of any file or URL on which the service delivery team needs forensics.

Spam filter

Block malicious communication with anti-spam and reputation-based filters, leveraging the combined data of several market-leading technologies.

Anti-evasion

Detect malicious hidden content by recursively unpacking the content into smaller units (files and URLs) which are then dynamically checked by multiple engines in under 30 seconds, compared to 20+ minutes for legacy, sandboxing solutions.

Threat intelligence

Stay ahead of emerging threats with the combined threat intelligence of six market-leading sources and Perception Point’s unique engine that scans URLs and files in the wild.

Static signature-based analysis

Identify known threats with best-of-breed signature-based antivirus engines enhanced with a unique tool by Perception Point to identify highly complex signatures.

Anti-phishing engines

Detect malicious URLs based on four leading URL reputation engines in combination with Perception Point’s advanced image recognition technology to validate the legitimacy of URLs.

Anti-spoofing

Prevent payload-less attacks such as spoofing, look-alike domain, and display name deception with unmatched precision through machine-learning algorithms with IP reputation, SPF, DKIM, and DMARC record checks.

Incident response service

Gain direct access to cyber analysts that act as an extension of your service delivery team, monitor all customer traffic, and analyze malicious intent with ongoing reporting and support, including handling false positives, remediating, and releasing when required.

Reporting

Demonstrate your value to customers with easily accessible and manageable datasets along with weekly, monthly, and ad-hoc reports from the Incident Response team.

Ad-hoc email analysis for end-users

Enable end-users to directly consult with Perception Point’s email security experts for suspicious emails before taking reckless action.

End-user contextual help

Flag emails with customizable banners based on policies and rules to provide end-users with additional contextual information to increase their security awareness.

File notarization

Notarize files of any format and type, generating a time-stamped, blockchain-based certificate that provides irrefutable proof the file is original and unaltered.

File notarization
Embedded eSignatures

Embedded eSignatures

Easily execute every step of the document workflow – from creation to sending the document to multiple signees – with an easy drag, drop, and sign feature.

File verification

Empower your clients with an enterprise-class audit trail. Includes a history of all transactions and independent validation of data authenticity.

File verification

Spam filter

Block malicious communication with anti-spam and reputation-based filters, leveraging the combined data of several market-leading technologies.

Anti-evasion

Detect malicious hidden content by recursively unpacking the content into smaller units (files and URLs) which are then dynamically checked by multiple engines in under 30 seconds, compared to 20+ minutes for legacy, sandboxing solutions.

Threat intelligence

Stay ahead of emerging threats with the combined threat intelligence of six market-leading sources and Perception Point’s unique engine that scans URLs and files in the wild.

Static signature-based analysis

Identify known threats with best-of-breed signature-based antivirus engines enhanced with a unique tool by Perception Point to identify highly complex signatures.

Anti-phishing engines

Detect malicious URLs based on four leading URL reputation engines in combination with Perception Point’s advanced image recognition technology to validate the legitimacy of URLs.

Anti-spoofing

Prevent payload-less attacks such as spoofing, look-alike domain, and display name deception with unmatched precision through machine-learning algorithms with IP reputation, SPF, DKIM, and DMARC record checks.

Incident response service

Gain direct access to cyber analysts that act as an extension of your service delivery team, monitor all customer traffic, and analyze malicious intent with ongoing reporting and support, including handling false positives, remediating, and releasing when required.

Reporting

Demonstrate your value to customers with easily accessible and manageable datasets along with weekly, monthly, and ad-hoc reports from the Incident Response team.

Ad-hoc email analysis for end-users

Enable end-users to directly consult with Perception Point’s email security experts for suspicious emails before taking reckless action.

End-user contextual help

Flag emails with customizable banners based on policies and rules to provide end-users with additional contextual information to increase their security awareness.

Please note that pricing varies depending on your requirements. Please get in touch with us for more information, or simply fill out the form below.

Contact Us

Drop us a line

Ready to grow your business? So are we!

    We respect your privacy and do not tolerate spam and will never sell, rent, lease or give away your information