Cloud Security
Formerly 5Nine Cloud Security

A Unified, Hybrid Cloud Security Platform for Microsoft Azure and Hyper-V

Acronis Cloud Security Features
  • Agentless Anitvirus Scans
    Agentless Antivirus Scans
    No need to acquire and deploy separate third-party solutions – scans are performed at the network layer and require no agents so there is no effect on VM performance
  • Role-Based Access Control (RBAC)
    Role-Based Access Control (RBAC)
    Granular user and tenant management through role-based access control (RBAC), separating users and resources, reducing risk of cross-contamination
  • Virtual Firewall
    Virtual Firewall
    Virtual firewall allows organizations to control all inbound, outbound, and VM-to-VM traffic, inspecting packets before they reach VMs or virtual networks
  • Multi-Version Cloud Support
    Different versions of Hyper-V, like Windows Server 2012, 2016, and 2019 can be managed alongside Azure, all from one console
  • Easy, Intuitive Interface
    Built-in firewall templates and quick configurability from the same GUI console for the on-premises and cloud editions
  • Changed Block Tracking (CBT)
    Acronis Cloud security uses Change Block Tracking to scan and analyze only the blocks that have changed since the last scan, making scans up to 70X faster
  • Intrusion Detection System (IDS)
    Integrated intrusion detection detects and identifies multiple types of cyberattacks and raises alerts
  • Advanced
    Anomaly Analytics
    Acronis Cloud Security detects abnormal heuristics and behavior using machine learning to measure resource usage against historic baselines
  • Automatic Protection
    Acronis Cloud Security applies cybersecurity settings to virtual machines as soon as they are created and placed in a security group
  • Virtualization Security
    Built-in network and security monitoring, and user-friendly remote management capabilities eliminate the need for VPNs, remote network access solutions, or complex permission management services
  • Audit Logs
    Logging of all events, network traffic, and user actions, including results of changes, enabling easy and simple audits to meet strict security compliance requirements
Acronis Cloud Security for Hyper-V Features
Acronis Cloud Security for Hyper-V is a centralized, GUI-based cybersecurity solution for Microsoft Hyper-V. Its light-weight agentless architecture allows for scans with no impact on VM performance, while its granular role-based access controls (RBAC) ensures that each user has only the exact privileges they need.
  • SDNv2 Support
    Acronis Cloud edition supports Microsoft Software-Defined Networking (SDN) using the Hyper-V extensible switch and virtual router
  • Web Console or Windows Client
    Manage Acronis Cloud Security from the convenience of your web browser or through a console application installed on Windows
  • Integrate with SCVMM
    Use with Microsoft Service Center Virtual Machine Manager to manage virtualization infrastructure and security in the same place
Acronis Cloud Security for Azure Features
Acronis Cloud Security for Azure is the first centralized, GUI-based cybersecurity solution for Microsoft Azure that doesn’t require administrators to log in to the Azure Portal. It offers the same degree of control for security in Azure that Acronis Cloud Security for Hyper-V brings to on-premises deployments.
  • Azure Subscription Management
    Easily populate Microsoft Azure credentials into the console, allowing you to manage security for Azure VMs without having to log in through the Azure Portal
  • Flexible Deployment Options
    Acronis Cloud security can be deployed as either a web or Windows application, or from Microsoft Azure Marketplace
  • Azure Network Logging
    Automatically configure resource providers and Azure resource groups on every secure network without needing access to the Azure Portal
  • Network Quality of Service (QoS)
    Set network bandwidth limits for each VM, preventing the VMs from consuming too many network resources
  • Network Logging
    Log all network traffic into, out of, and within your Azure Resource Groups

Cloud Security

Formerly 5Nine Cloud Security

See how Acronis Cloud Security can protect your infrastructure and save you money

 
Try Now
No credit card required

Looking for Help?

Frequently Asked Questions
How do I add Virtual Firewall rules in Acronis Cloud Security?

In the object tree, select the entity for which you want to apply the rule. The Rules menu will give you multiple types of rules you can add.

How do I perform a remote installation of Acronis Cloud Security’s Host Management Service?

In the Acronis Cloud Security Setup dialog box, select "Host Management Service" and click on the "Remote install" button. The Remote Installation Wizard will start up and guide you through the installation.

My Acronis Cloud Security virtual firewall isn’t applying its rules. How do I fix this?

On the affected host, first check to confirm the vFirewall service has not been disabled. If it’s enabled and the rules are still not in effect, check to see if the Acronis Cloud Security filtering extension is enabled on the host.

How do I view the internal audit events in Acronis Cloud Security?

Go to the View menu and select Internal Events Audit. A dialog box will pop up giving you options for filtering the events. Click the Settings button to ensure that you’re saving the event categories you’re interested in.

How do I create a user-defined security group in Acronis cloud Security?

Go to the Rules menu and select Add Global Rules Group, or right-click on the Global entity and select Add Group. VMs can be added to the new group from the VM Settings menu, or from the Members tab in the group’s settings.

Self-service Support

In case you have any difficulties, we have collected all the useful materials for this product in our Knowledge Base, Video Tutorials and documentation. Also you can always ask your question on our Discussion boards.

Contact Technical Support

Customers with active product maintenance or subscription are entitled to 24/7 technical support. Follow the instructions at the Technical Support Site to get prompt support by phone, chat or email.