Metrix Intelligent Solutions

#BusinessContinuity

Business Continuity

Business Continuity refers to the processes and procedures an organization implements to ensure that essential business functions can continue during and after an unexpected disruption or disaster. The aim of Business Continuity planning is to minimize the impact of a disruption on an organization’s operations, reputation, and financial stability. It involves identifying potential threats, developing strategies to address those threats, and implementing plans to maintain critical functions and services in the event of a crisis.

Acronis Cyber Protect Cloud

Acronis Cyber Protect Cloud is a comprehensive cybersecurity solution for managed service providers (MSPs) and businesses of all sizes. It combines advanced backup and disaster recovery, AI-based anti-malware and antivirus protection, endpoint management, vulnerability assessments, URL filtering, and patch management in a single unified solution. This integrated approach provides multiple layers of protection against cyber threats and helps organizations simplify and streamline their IT security management. Acronis Cyber Protect Cloud is a cloud-based solution that is easy to deploy and manage, and it supports a wide range of platforms and devices, including Windows, Mac, Linux, and mobile devices.

Features of modern cyber protection

  • Full stack anti-malware
    is a comprehensive approach to protecting computer systems from malicious software attacks by using a combination of security measures at multiple layers of a system’s architecture.
  • URL filtering
    is a security measure that blocks or allows access to web content based on specific criteria such as URLs, IP addresses, and domain names.
  • Exploit prevention
    is a security technique that detects and blocks attempts to exploit vulnerabilities in software or systems before they can be successfully used by attackers.
  • Continuous data protection
    is a backup method that automatically and continuously saves changes to data in real-time, allowing for quick recovery in the event of a data loss or corruption.
  • Data protection map
    is a visual representation of an organization’s data flow, processing activities, and storage locations that helps identify data risks and compliance gaps in order to establish appropriate data protection measures.
  • Off-host data processing
    is a technique in which data processing is performed on a separate system, reducing the load on the primary system and allowing for more efficient use of resources.
  • Disaster recovery orchestration
    is the automated process of managing and coordinating the recovery of IT infrastructure and applications in the event of a disaster or outage, ensuring timely and effective restoration of critical systems.
  • Production failover
    is the process of automatically or manually switching over IT operations from a primary system to a backup system in the event of a failure or outage, ensuring continuity of service.
  • Site-to-site VPN
    is a secure network connection that allows communication between two or more geographically separate networks, such as branch offices, over the public internet.
  • Anti-phishing and anti-spoofing engines
    are security measures that use a combination of technologies such as machine learning, domain reputation analysis, and email authentication protocols to detect and prevent phishing attacks and email spoofing.
  • Anti-evasion technologies
    are security measures that use a range of techniques such as behavior analysis, memory inspection, and code emulation to detect and prevent advanced cyber attacks that use evasion techniques to avoid traditional security controls.
  • Next-generation dynamic detection against zero-days
    is a security technique that uses advanced machine learning and behavioral analysis to identify and protect against previously unknown and unidentified threats, including zero-day attacks that exploit vulnerabilities in software or systems.
  • Content-aware data loss prevention
    is a security technique that uses advanced analytics to monitor and prevent the unauthorized transmission or disclosure of sensitive or confidential information within an organization, by analyzing the content of data in motion or at rest.
  • Automatic client-specific DLP policy creation and extension
    is a feature that allows organizations to automatically create and update data loss prevention (DLP) policies based on client-specific data and requirements, reducing the time and effort needed to manage and enforce DLP policies.
  • Pre-built data classifiers for common regulatory frameworks
    are predefined sets of rules and policies designed to identify and classify sensitive or regulated data in accordance with common regulatory standards, helping organizations to comply with data protection regulations.
  • File notarization
    is a process in which a trusted third party verifies the integrity of a digital file by attaching a unique cryptographic signature, providing evidence that the file has not been tampered with or altered since its creation.
  • Embedded eSignatures
    are electronic signatures that are integrated directly into a document or form, allowing users to sign and authenticate the document electronically without the need for physical signatures or printing.
  • Independent file verification
    is a security measure that involves verifying the integrity of a file by comparing its hash or checksum to a known and trusted value, ensuring that the file has not been modified or corrupted.
  • Patch management
    is the process of identifying, acquiring, testing, and deploying software updates or patches to systems and applications in order to address security vulnerabilities and ensure their stability and reliability.
  • Fail-safe patching
    is a technique used in patch management that ensures that updates are tested and deployed in a way that minimizes the risk of system failure or downtime in the event of a patch failure.
  • Disk drive health monitor
    is a software tool that continuously monitors the performance and health of a computer’s hard disk drives, alerting users to potential problems or failures before they occur.

Advanced packs:

Advanced Security

Enhance your security services with integrated cyber protection that includes full-stack anti-malware. Increase your detection rate and responsiveness to the latest cyberthreats. Extend cyber protection to web browsing, backed-up data, the recovery process, and exploit prevention. Enable investigations by capturing forensic data in backups.

Advanced Backup
Defend clients’ data, even between scheduled backups. Extend backup capabilities to SAP HANA, Oracle DB, MariaDB, MySQL, and application clusters. You can also gain visibility into data-protection statuses across your clients’ infrastructure.
Advanced Disaster Recovery
Get clients back to business in mere minutes when disaster strikes by spinning up their systems in the Acronis Cloud and restoring them anywhere, ensuring immediate data availability. Make disaster recovery painless and increase efficiency with orchestration, runbooks, and automatic failover.
  • Disaster recovery orchestration
  • Production failover
  • Site-to-site VPN
Advanced Email Security
Block any email threat, including spam, phishing, business email compromise (BEC), advanced persistent threats (APTs), and zero-days in seconds before it reaches end-users. Leverage Perception Point’s next-generation technology for lightning-fast detection and easy deployment, configuration, and management.
Advanced Data Loss Prevention (DLP)
Prevent leakage of sensitive data from endpoints via more than 70 local and network channels and strengthen compliance with minimal effort and speed to value.
  •  Content-aware data loss prevention
  •  Automatic client-specific DLP policy creation and extension
  •  Pre-build data classifiers for common regulatory frameworks
Advanced File Sync and Share
Get a full control over data location, management and privacy with a file sync and share service, including a transaction ledger to enable notarization and eSignature capabilities, across all platforms.
  • File notarization
  • Embedded eSignatures
  • Independent file verification
Advanced Management
Streamline vulnerability management and promptly close gaps in your clients’ IT infrastructure through patch management. Gain visibility into your clients’ software assets and data protection to ease daily tracking and planning tasks, and improve clients’ uptime by monitoring disk drives health.

Cybersecurity

Stay ahead of modern cyberthreats with award-winning anti-ransomware enhanced with anti-malware capabilities that complement your clients’ antivirus. Prevent data leaks via local channels.

Backup and recovery

Minimize data loss across your clients’ infrastructure and workloads with the best backup and recovery technology, available in consumption-based or per-workload licensing models.

Management

Centralize your protection management and provision endpoints in minutes. Remotely assist clients and assess system vulnerabilities and security gaps. Increase visibility with built-in monitoring and reporting.

Disaster recovery (DR)

Allow DR-enabled tenants to establish secure connection to the corporate network with their personal devices, or test failover in an isolated network environment.

File sync and share

Increase productivity by enabling your clients to create and securely share corporate content from anywhere, at any time, and on any device. Only get charged for the storage you use.

Notary

Ensure the integrity of data, while achieving regulatory transparency and decreasing security risks with a blockchain-based service for file notarization, eSigning, and file verification.

Acronis EDR

What is EDR?

Endpoint Detection and Response is an extension to Advanced Security. It offers enhanced detection and incident response capabilities.
EDR detects suspicious activities on workloads and generates incidents with information on how the threat penetrated, what harm it did and how it hid its traces.
EDR also provides response actions to address the damage caused by the incident.

Acronis EDR (Endpoint Detection and Response) is a powerful cybersecurity solution that offers numerous benefits to businesses of all sizes.
Here are some of the key benefits of Acronis EDR:

  • Real-Time Threat Detection
    Acronis EDR utilizes advanced machine learning algorithms and behavioral analysis to detect and respond to cyber threats in real-time. This means that businesses can quickly identify and neutralize threats before they cause significant damage.
  • Complete Visibility
    With Acronis EDR, businesses get complete visibility into their entire IT infrastructure, including endpoints, servers, and cloud-based applications and services. This makes it easier to monitor all activity and identify potential threats as they emerge.
  • Minimal Configuration
    Acronis EDR is designed to be user-friendly, with minimal configuration required. This means that businesses can quickly and easily set up the solution without needing extensive IT expertise.
  • Improved Security Posture
    With Acronis EDR, businesses can significantly improve their cybersecurity posture. By detecting and responding to threats quickly, businesses can minimize the impact of a cyber attack and prevent costly data breaches.
  • Reduced IT Costs
    By providing comprehensive security capabilities in a single solution, Acronis EDR can help businesses reduce their IT costs. This is because businesses can avoid the need to purchase and manage multiple cybersecurity solutions, which can be expensive and time-consuming.
  • Compliance
    Acronis EDR can help businesses meet compliance requirements, such as HIPAA and GDPR. By providing advanced threat detection and response capabilities, businesses can demonstrate that they are taking cybersecurity seriously and are compliant with industry regulations.

Supported Systems

Operating systems and environments
Windows
  • Windows 7 and later
  • Windows 2008 R2 and later
Linux
  • Linux with kernel from 2.6.9 to 5.1 and glibc 2.3.4 or later
MacOS
  • OS X Mavericks 10.9, OS X Yosemite 10.10, OS X El Capitan 10.1, macOS Sierra 10.12, macOS High Sierra 10.13, macOS Mojave 10.14, macOS Catalina 10.15
Mobile
  • Android 4.1 or later
  • iOS 8 or later
Microsoft applications
  • Microsoft SQL Server 2019, 2017, 2016, 2014, 2012, 2008 R2, 2008, 2005
  • Microsoft Exchange Server 2019, 2016, 2013, 2010, 2007 Microsoft SharePoint 2013
  • Microsoft SharePoint Server 2010 SP1, Microsoft SharePoint Foundation 2010 SP1, Microsoft Office SharePoint Server 2007 SP2, Microsoft Windows SharePoint Services 3.0 SP2
Infrastructure-as-a-Service
Hypervisors
  • VMware vSphere 7.0, 6.7, 6.5, 6.0, 5.5, 5.1, 5.0, 4.1
  • Microsoft Hyper-V Server 2019, 2016, 2012/2012 R2, 2008/2008 R2
  • Microsoft Windows Server 2022, 2019, 2016, 2012/2012 R2,2008/2008 R2 with Hyper-V
  • Microsoft Windows 10, 8/8.1 (x64) with Hyper-V
  • Citrix XenServer 7.6-4.1.5
  • RHEV 3.6-2.2, RHV 4.1, 4.0
  • Oracle VM Server 3.4, 3.3, 3.0, Oracle VM VirtualBox 4.x
  • Nutanix AHV 20180425.x-20160925.x
  • Linux KVM 5.3 – 8
  • Proxmox virtual environment 5.3 – 8
  • Virtuozzo 6.0.10, 6.0.11, 6.0.12, 7.0.13, 7.0.14
  • Virtuozzo Infrastructure Platform 3.5