Cyber Protect Cloud

 

#imetrixexpert

Prevent downtime and data loss with essential cyber protection

Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating costs.

The world’s best backup and recovery

Full-image and file-level backup and recovery to safeguard workloads on more than 20 platforms – with near-zero RPOs and RTOs.

Enhanced with essential cyber protection at no cost

Аdvanced AI-based behavioral detection engine stops malware, ransomware, and zero-day attacks on client workloads.

With protection management 

Integrates data protection, cybersecurity, and endpoint management into a single solution with centralized management. Seamless integration with RMM and PSA systems.

Strengthen your security services and increase profitability

Secure all workloads with next-generation cyber protection

Minimize your security risks with integrated cyber protection covering 100% of their workloads and unlock unique capabilities not available from your current security vendor. Rise to the challenge of 2021’s cyberthreats and greatly reduce security incidents and breaches. Leverage the solution that’s a leader in independent testing (VB100, AV Test, AV-Comparatives, ICSA Labs).

Expand your services with advanced protection packs

Add other powerful components to strengthen your services even further with advanced protection packs and unique cyber protection capabilities. Control your costs by paying only for the functionalities your clients need.

Advanced packs include:
Advanced Security

Enhance your security services with integrated cyber protection that includes full-stack anti-malware. Increase your detection rate and responsiveness to the latest cyberthreats. Extend cyber protection to web browsing, backed-up data, the recovery process, and exploit prevention. Enable investigations by capturing forensic data in backups.

  • Full stack anti-malware
  • URL filtering
  • Exploit prevention
Advanced Backup
Defend clients’ data, even between scheduled backups. Extend backup capabilities to SAP HANA, Oracle DB, MariaDB, MySQL, and application clusters. You can also gain visibility into data-protection statuses across your clients’ infrastructure.
  • Continuous data protection
  • Data protection map
  • Off-host data processing

 

Advanced Disaster Recovery
Get clients back to business in mere minutes when disaster strikes by spinning up their systems in the Acronis Cloud and restoring them anywhere, ensuring immediate data availability. Make disaster recovery painless and increase efficiency with orchestration, runbooks, and automatic failover.
  • Disaster recovery orchestration
  • Production failover
  • Site-to-site VPN

 

Advanced Email Security
Block any email threat, including spam, phishing, business email compromise (BEC), advanced persistent threats (APTs), and zero-days in seconds before it reaches end-users. Leverage Perception Point’s next-generation technology for lightning-fast detection and easy deployment, configuration, and management.
  • Anti-phishing and anti-spoofing engines
  • Anti-evasion technologies
  • Next-generation dynamic detection against zero-days
Advanced File Sync and Share
Get a full control over data location, management and privacy with a file sync and share service, including a transaction ledger to enable notarization and eSignature capabilities, across all platforms.
  • File notarization
  • Embedded eSignatures
  • Independent file verification
Advanced Management
Streamline vulnerability management and promptly close gaps in your clients’ IT infrastructure through patch management. Gain visibility into your clients’ software assets and data protection to ease daily tracking and planning tasks, and improve clients’ uptime by monitoring disk drives health.
  • Patch management
  • Fail-safe patching
  • Disk drive health monitor

Recognized member of the cybersecurity industry

Anti-Malware Testing Standards Organization member

VirusTotal member

Cloud Security Alliance member

Anti-Phishing Working Group member

Microsoft Virus Initiative member

CRN 2020 Partner Program Guide: 5 Star Data Storage and Backup Vendors

Enhance your backup service with essential cyber protection at no cost

Gain a unique competitive advantage and increase your profitability with essential cyber protection functionalities that cover all workloads. Acronis will not charge you if you don’t consume backup or file sync and share storage.

Cybersecurity

Stay ahead of modern cyberthreats with award-winning anti-ransomware enhanced with anti-malware capabilities that complement your clients’ antivirus. Prevent data leaks via local channels.

Disaster recovery (DR)

Allow DR-enabled tenants to establish secure connection to the corporate network with their personal devices, or test failover in an isolated network environment.

Backup and recovery

Minimize data loss across your clients’ infrastructure and workloads with the best backup and recovery technology, available in consumption-based or per-workload licensing models.

File sync and share

Increase productivity by enabling your clients to create and securely share corporate content from anywhere, at any time, and on any device. Only get charged for the storage you use.

Management

Centralize your protection management and provision endpoints in minutes. Remotely assist clients and assess system vulnerabilities and security gaps. Increase visibility with built-in monitoring and reporting.

Notary

Ensure the integrity of data, while achieving regulatory transparency and decreasing security risks with a blockchain-based service for file notarization, eSigning, and file verification.

Provide anti-malware protection at no cost

Our award-winning cybersecurity technology, Acronis Active Protection, is now better and included in Acronis Cyber Protect Cloud free of charge

Deliver the best backup and recovery on the market

  • Protection for more than 20 workload types: physical, virtual, cloud, and mobile
  • Pricing based on storage consumption or per workload
  • Extensive backup sources: file, disk, mobile, system-state, application, NAS and network shares, ESXi configurations
  • Multiple backup storage options: Acronis Cloud, public and private cloud, local network storage
  • Recovery capabilities that can instantly run backup files as a VM or recover to dissimilar hardware
  • Secure by design: anti-ransomware protection and encryption

Cyber Protect Cloud

Includes all features of Acronis Cyber Backup Cloud

Seamless integrations and automation

Easing administrative efforts, Acronis Cyber Protect Cloud natively integrates with commonly used systems by service providers such as RMM and PSA tools, hosting control panels, and billing systems. Custom integrations and automation are also possible through a set of RESTful APIs and SDKs.

BRS by Scale Computing

The Business Resilience System (BRS), purpose-built for Acronis Cyber Protect Cloud, takes delivery operations resiliency and end-to-end data protection to a whole new level.

Convert to VM – any VM

Back up physical workloads, VMware, and Hyper-V and instantly power them on as VMs on BRS at a moment’s notice.

Unparalleled data protection

Minimize data loss across  infrastructure and workloads with the best backup and recovery technology, available in consumption-based or per-workload licensing models.

Hybrid cloud

Allow data and applications to interoperate across boundaries (for example, cloud versus on‐premises) with a hybrid cloud approach.

Easy management

Utilize the Acronis Cyber Protect Cloud web-based console, eliminating confusion and time-consuming management tasks.

Simplified Microsoft 365 licensing with unlimited cloud storage from Acronis

Unique capabilities designed for modern cyber protection

Gain advantage over competitors with industry-unique cyber protection capabilities, minimizing security risks and reducing management burdens.

Anti-malware: Proactively protect your systems from advanced cyberattacks in real-time with AI-based static and behavioral heuristic antivirus, anti-malware, and anti-ransomware technologies
Fail-safe patching: Eliminate the risk of bad patches rendering a system unusable. Before a patch is applied, an image backup is automatically created, enabling you to easily restore to a working state
Forensic backup: Simplify future analysis by collecting digital evidence from disk-level backups. Enables users’ to manage their compliance requirements and run faster internal investigations
Safe recovery: Avoid malware reinfection by automatically patching the machine and then scanning your system and backup images using the latest anti-malware definitions
Previous slide
Next slide

Modernize your cybersecurity and backup with integrated cyber protection

Supported systems

Operating systems and environments

Windows

  • Windows 7 and later
  • Windows 2008 R2 and later

Linux

  • Linux with kernel from 2.6.9 to 5.1 and glibc 2.3.4 or later

MacOS

  • OS X Mavericks 10.9, OS X Yosemite 10.10, OS X El Capitan 10.1, macOS Sierra 10.12, macOS High Sierra 10.13, macOS Mojave 10.14, macOS Catalina 10.15

Mobile

  • Android 4.1 or later
  • iOS 8 or later

Microsoft applications

  • Microsoft SQL Server 2019, 2017, 2016, 2014, 2012, 2008 R2, 2008, 2005
  • Microsoft Exchange Server 2019, 2016, 2013, 2010, 2007 Microsoft SharePoint 2013
  • Microsoft SharePoint Server 2010 SP1, Microsoft SharePoint Foundation 2010 SP1, Microsoft Office SharePoint Server 2007 SP2, Microsoft Windows SharePoint Services 3.0 SP2

Infrastructure-as-a-Service

Hypervisors

  • VMware vSphere 7.0, 6.7, 6.5, 6.0, 5.5, 5.1, 5.0, 4.1
  • Microsoft Hyper-V Server 2019, 2016, 2012/2012 R2, 2008/2008 R2
  • Microsoft Windows Server 2022, 2019, 2016, 2012/2012 R2,2008/2008 R2 with Hyper-V
  • Microsoft Windows 10, 8/8.1 (x64) with Hyper-V
  • Citrix XenServer 7.6-4.1.5
  • RHEV 3.6-2.2, RHV 4.1, 4.0
  • Oracle VM Server 3.4, 3.3, 3.0, Oracle VM VirtualBox 4.x
  • Nutanix AHV 20180425.x-20160925.x
  • Linux KVM 5.3 – 8
  • Proxmox virtual environment 5.3 – 8
  • Virtuozzo 6.0.10, 6.0.11, 6.0.12, 7.0.13, 7.0.14
  • Virtuozzo Infrastructure Platform 3.5

Resources

Datasheet

Acronis Cyber Protect Cloud Overview

Datasheet

Acronis Cyber Protect Cloud with Advanced Management Overview

Datasheet

Acronis Cyber Protect Cloud with Advanced Security Overview

Datasheet

Acronis Cyber Protect Cloud with Advanced Disaster Recovery Overview

Datasheet

Acronis Cyber Protect Cloud with Advanced Backup Overview

Stages of modern cyber protection

To deliver thorough protection for our partners’ clients, Acronis’ vision and products are based on a multi-stage process rather than simply detecting and blocking threats, leaving other risks uncovered.

Prevention

Don’t wait for threats to hit, proactively protect your clients and limit their attack surface.

Detection

Detect issues and threats in real-time before they pose risk to the IT environment.

Response

Enable quick actions that immediately mitigate the risk.

Recovery

Restore client data quickly and safely so no data is lost, with near-instant availability, in case of compromise.

Forensics

Mitigate future risks and enable easy investigations by collecting forensics information.

Built on top of Acronis Cyber Cloud

Easily deliver all of cyber protection solutions your clients seek through a single platform, managed via a single pane of glass. Acronis Cyber Cloud is the MSP services delivery platform that enables unified provisioning, account management, multitenancy, reporting, white labeling, and more – integrated with the top PSA and RMM tools.

Global data center presence

Help your clients meet their unique needs by storing their data where they choose. With multiple data centers worldwide, Acronis enables you to meet the compliance, data sovereignty, and performance requirements of all your clients.