- Acronis Cyber Protect Cloud
- Advanced Security
- Advanced Backup
- Advanced Management
- Advanced Disaster Recovery
- Advanced Email Security
- Advanced DLP
- Advanced File Sync and Share
- Acronis Cyber Protect Cloud
- Advanced Security
- Advanced Backup
- Advanced Management
- Advanced Disaster Recovery
- Advanced Email Security
- Advanced DLP
- Advanced File Sync and Share
The best backup and recovery enhanced with essential endpoint protection capabilities and security management toolkit for centralized administration and monitoring.
Learn more


- Protection for remote workersMinimize the rising risk of cyberattacks for remote workers with multiple protection capabilities – including prioritized patching and protection for mission-critical telecommute apps (Zoom, WebEx, MS Teams, Slack, Skype, TeamViewer), remote device wipe, and secure desktop remote connectivity.
- Multiple backup typesBack up disks/volumes (with all information required for the operating system to boot), individual files or folders, system states (for Microsoft Windows systems), or ESXi configurations.
- Flexible backup storage optionsComply with the requirements of different clients with flexible storage options. Back up to Acronis-hosted cloud storage, public clouds such as Google Cloud Storage or Microsoft Azure, your own cloud storage, or local networked storage.
- Device and port controlStrengthen data security and prevent leakage of sensitive information via local channels with granular, context-aware controls over user access to locally connected devices and ports, and data operations related to them – even for virtulized sessions.
- Clipboard controlPrevent data leakage in its earliest stage by controlling data transfers between application and documents. Allow or block user access to objects of different data types copied to the clipboard, even for redirected BYOD devices in virtualized sessions.
- Device control: support of encrypted removable media and screenshot capture accessEliminate the risk of data leaks with encrypted removable media and screenshot capture control. This enables users to keep sensitive information within their organization – should a removable device get in the wrong hands or prevent screenshots from being copied to the clipboard. Keeping your clients’ sensitive data safe and secure.
- Acronis Instant RestoreCut RTOs to as little as 15 seconds with a built-in capability to restore a system by booting it as a virtual machine directly from the backup, without moving any data.
- Acronis Universal RestoreReduce the time spent on recovery tasks. Acronis Universal Restore makes recovery to dissimilar hardware faster by detecting the machine type and auto-installing appropriate drivers for the hardware.
- Google Workspace data protectionSafeguard client data stored in Gmail, Drive (including Team Drives), Contacts, and Calendar by backing it up to ensure fast, reliable recovery.
- Complete Microsoft 365 protectionProtect data in Microsoft Exchange Online, OneDrive for Business, Microsoft Teams and SharePoint Online with comprehensive cloud-to-cloud backup and restore.
- Backup encryptionMaintain regulatory compliance and strengthen data protection by securing your backups with AES-256 data encryption for data in transit and at rest, so only you can access the data.
- DeduplicationMinimize storage requirements by detecting data repetition in backups and not storing identical data more than once. Deduplication also reduces network load as duplicate data is not even transferred over the network to the backup storage.
- Report schedulingIncrease visibility into information security and simplify IT security auditing with capabilities for sending scheduled reports to listed recipients in a desired format and language.


- Auto discovery and remote installationSimplify the onboarding process by installing multiple agents at once – in the cloud and on-premises. With network-based and Active Directory-based discovery, your technicians can easily install and apply protection plans remotely – helping to keep your clients safe.
- Predefined protection plansProtect your clients’ remote and office workers quickly and easily by choosing one of three preconfigured protection plans. These options save you time while ensuring you that your clients’ workloads and environments are protected.
- Remote desktop assistanceEnable secure, off-site access to machines to ease remote work for users or provide technical assistance to clients with built-in remote desktop capabilities.
- Hardware inventory collectionSave time and effort with an up-to-date hardware inventory. Discover all hardware assets with automatic and on-demand scans. Create hardware inventory reports, browse and filter records by multiple criteria and auto-delete them once a machine or tenant is removed.



- Electronic signingStrengthen process compliance by allowing clients and their third parties to e-sign documents with publicly verifiable proof of the timestamp and authenticity of the signature. Based on pay-as-you-go pricing.
- Test failover in isolated network environmentsVerify the integrity and efficiency of disaster recovery plans by executing them via the web console in an isolated network environment, without disrupting other processes.
- Point-to-site VPN connectionEnable clients to quickly and easily access files from the local site or the cloud. With the Business VPN feature, clients on DR-enabled tenants can establish a secure connection to the corporate network with their personal devices so they can access the data they need.
- Firewall policies managementEasily manage firewall policies on your clients’ behalf for their disaster recovery servers through the Acronis Cyber Protect Cloud console. This enables you to simplify the support process and manage outbound and inbound firewall policies.
- Straightforward pay-as-you-go pricingMeet the dynamic needs of your clients with a 100% pay-per-use licensing model and free functionalities. Per-GB and per-seat/per-device licensing types are available.
- Integration with PSA and RMM systemsDeliver services instantly using native integrations with ConnectWise (Automate, Manage, Control), Atera, Autotask, Kaseya, cPanel, HostBill, CloudBlue, Plesk, and WHMCS.
- Integration with custom systemsAssimilate systems by leveraging a powerful RESTful management API or enable integration via the Acronis Cyber Backup Cloud Application Packaging Standard (APS).
- Ransomware-proof backupsEnsure backups cannot be encrypted or deleted by a ransomware attack or malicious users through immutable storage, enabling you to recover quickly to the most recent clean state.
Next-generation cyber protection addressing a broader scope of threats with improved detection rate and speed, smart protection plans, additional protection for backups and recovery, and forensics.
Learn more

- Exploit preventionPrevent advanced attack techniques, including zero-day and fileless attacks, with behavior-based detection heuristics focused on vulnerability exploitation. Acronis’ exploit prevention technology specifically detects malware that’s taking advantage of software vulnerabilities.
- Enhanced signature-based detectionIncrease detection rates and speed with an enhanced database of malware signatures, ensuring seamless detection of all known threats within seconds while minimizing the agent’s impact on performance.
- Enhanced URL filteringHelp your clients achieve compliance and increase productivity by preventing attacks from malicious websites. Acronis URL filtering lets you control website access through an HTTP/HTTPS interceptor, manage exceptions for URLs, and perform payload analysis.
- Anti-malware protection for backupsPrevent restoring infected files from backups with built-in malware scanning, including for encrypted backups. By scanning full disk backups in a centralized location, Acronis Cyber Protect Cloud helps find malware – ensuring users are restoring a backup that is clean and malware-free.
- UniqueSafe recoveryPrevent dangerous infections from reoccurring with Acronis’ unique safe recovery technology. During the recovery process, the integrated solution scans the backup for malware, installs the latest security patches, and updates its antivirus databases.
- Remote device wipePrevent business-critical data from getting into the wrong hands by remotely wiping compromised or missing Windows devices. You can protect data from being deleted by disgruntled employees or accessed from lost or stolen devices.
- Global and local allowlistsAllow more aggressive behavioral heuristics with zero false positives. You can create automatic allowlist of your clients’ most used applications, including custom apps, to save time and avoid resource-draining false positives. Manual allowlisting is also supported.
- Windows anti-malware managementEliminate complexity while ensuring that Windows’ native anti-malware is properly configured. With Acronis protection plans, you can control Windows Defender Antivirus and Microsoft Security Essentials detection events, applying settings across multiple machines.
Support a wider scope of workloads with continuous protection of data, validation of backed-up data, and visibility into the protection status of assets across your clients’ IT infrastructure.
Learn more

- Full or granular recovery of MariaDB and MySQL databasesDuring the backup of the entire workload, Acronis collects metadata for each database running on it. You can browse databases and/or fully or granularly recover data and tables without recovering the entire workload.
- Application cluster backup and restoreEase IT administrative burden with built-in capabilities for easy back up and recovery of Microsoft Exhange, Microsoft SQL Server, and Oracle DBMS Real Apllication clusters.
- SAP HANA backupStrengthen your SAP HANA database protection with consistent, script-based, disk-level backups that simplify management and do not require any SAP HANA expertise.
- Off-host data processing for backup operationsReduce the load on your clients’ workloads by moving backups replication, validation, retention and conversion into VM operations to another machine. These operations can be scheduled independently.
Better control over IT assets and security though patch management with built-in fail-safe patching technology, disk drive health monitoring, software inventory collection, and seamless report scheduling.
Learn more



- UniqueFail-safe patchingA bad system patch can render a system unusable. Before the latest patches are implemented, an image backup is automatically created so you can easily restore and rollback to a working state if there is an issue.
- Partner-level script managementStreamline your operations across multiple clients by centrally managing your scripts and executing them across all end-clients, dedicated end-clients, individual workloads and static or dynamic groups of workloads.
Get clients back to business in minutes by instantly spinning up systems in the Acronis Cloud and restoring them anywhere, ensuring immediate data availability. Make disaster recovery painless and increase efficiency with orchestration, runbooks, and automatic failover.
Learn more
- Disaster recovery for physical and virtual workloadsMinimize downtime by enabling easy, scalable and efficient disaster recovery of all popular workloads including Windows and Linux physical servers and VMs, major hypervisors, and Microsoft apps.
- Production failoverMinimize downtime by enabling quick and easy automated failover of the client’s production environment to an off-site server running in Acronis Disaster Recovery Storage or to hot storage in the Acronis Cloud.
- Site-to-site VPN connectionEnable a secure VPN connection between the client’s local site and the cloud to facilitate partial failover of tightly dependent servers on the local site. When one of the servers is recreated, it continues to communicate, ensuring minimal downtime.
- Near-instant RPOs and RTOsAchieve both RPOs and RTOs of less than 15 minutes. The Acronis RunVM engine enables best-in-class production and test failover speed, while flexible backup frequency policies lead to tighter RPOs.
- Execution monitoringGain visibility into disaster recovery orchestration with a detailed runbook-execution, real-time view, and execution history.
- Point-in-time recoveryPrevent data loss and avoid data corruption with granular control over backup and recovery capabilities. Restore systems and data to any recoverable point in the past, instead of to the latest one.
- IPsec multisite VPN supportStrengthen security with IPSec multisite VPN support that integrates secure protocols and algorithms. You can easily support clients with multiple sites that are hosting critical workloads with higher requirements for security, compliance, and bandwidth.
- Custom DNS configurationCreate custom DNS configurations for disaster recovery cloud services in the Acronis Cloud. This enables you to easily adjust DNS settings for your clients, making it even easier for you to support them.
Block any email-borne threat, including spam, phishing, business email compromise (BEC), malware, advanced persistent threats (APTs), and zero-days before it reaches end-users.
Learn more

- Spam filterBlock malicious communication with anti-spam and reputation-based filters, leveraging the combined data of several market-leading technologies.
- UNIQUEAnti-evasionDetect malicious hidden content by recursively unpacking the content into smaller units (files and URLs) which are then dynamically checked by multiple engines in under 30 seconds, compared to 20+ minutes for legacy, sandboxing solutions.
- Threat intelligenceStay ahead of emerging threats with the combined threat intelligence of six market-leading sources and Perception Point’s unique engine that scans URLs and files in the wild.
- Static signature-based analysisIdentify known threats with best-of-breed signature-based antivirus engines enhanced with a unique tool by Perception Point to identify highly complex signatures.
- UNIQUEAnti-phishing enginesDetect malicious URLs based on four leading URL reputation engines in combination with Perception Point’s advanced image recognition technology to validate the legitimacy of URLs.
- Anti-spoofingPrevent payload-less attacks such as spoofing, look-alike domain, and display name deception with unmatched precision through machine-learning algorithms with IP reputation, SPF, DKIM, and DMARC record checks.
- Incident response serviceGain direct access to cyber analysts that act as an extension of your service delivery team, monitor all customer traffic, and analyze malicious intent with ongoing reporting and support, including handling false positives, remediating, and releasing when required.
- Account Takeover (ATO)Intercept account takeover attempts — Be prepared to prevent, detect and rapidly respond. Your clients are protected against ATO more than ever before by preventing attackers from phishing credentials; monitoring email accounts for anomalies and suggesting a compromise; and ensuring fast remediation and account containment by the incident response team, in the event of account takeover.
- Logging and auditingEnhance clients’ compliance and enable auditing and investigations with visibility into all actions performed by admin users and the incident response team, with a comprehensive audit log.
- 24/7 chat support with the email security teamReceive a swifter response on email security issues — rapidly reach the Advanced Email Security incident response team, and chat with support directly in the management console.
- ReportingDemonstrate your value to customers with easily accessible and manageable datasets along with weekly, monthly, and ad-hoc reports from the Incident Response team.
- Ad-hoc email analysis for end-usersEnable end-users to directly consult with Perception Point’s email security experts for suspicious emails before taking reckless action.
- End-user contextual helpFlag emails with customizable banners based on policies and rules to provide end-users with additional contextual information to increase their security awareness.
- Automatic email routing for Microsoft 365Simplify the initial configuration process and speed up service provisioning by running a ready-to-use script to automatically set up routing between Microsoft 365 and Acronis.
The only DLP solution designed for MSPs to prevent leakage of sensitive data via peripheral devices and network channels with automatic, client-specific DLP policy creation.
Learn more


- Content-aware control over data flows to peripheral devicesControl data transfers to peripheral devices such as printers, removable storage and mapped drives across clients’ organizations and ensure no sensitive data in use can leak through such local channels.
- Network communications controlControl data transfers via network channels such as emails, cloud file sharing services, web browsers and social media. Prevent leakage of sensitive data in motion across clients’ organizations.
- Pre-built data classifiersProtect clients’ sensitive data out of the box with pre-built data classifiers for personally identifiable information (PII), protected health information (PHI), payment card data (PCI DSS), documents marked as “Confidential.”
- Strict DLP policy enforcement (enforcement mode)For clients that require more strict controls, you can enforce the DLP policies as they’re defined, also blocking any new data flows not observed during the observation mode period.
- Clipboard control for remote connectionsPrevent data leaks at their earliest stage — when data is transferred between the corporate computer and BYOD devices or remote terminals via a redirected clipboard.
- Optical character recognition (OCR)Prevent leakage of textual data in graphical format, even for offline and remote endpoints. Leverage an agent-resident optical character recognition for 30+ languages without sending images to OCR servers.
- Content inspection and filteringProtect clients’ sensitive data from leaking by analyzing and filtering the textual and binary content of data transferred via local and network channels, including inspection of nested archives. Benefit from text parsing for 100+ file, 40+ archive, and five-print formats.
- Real-time alertingEmpower policy-based, real-time alerting for relevant DLP events to increase DLP administrators’ visibility and allow them to react to critical security events in a timely manner.
- Policy-based loggingEnable easy auditing and IT investigations by automatically and selectively collecting audit logs for security events for each DLP policy rule. Leverage a cloud-native, secure, always available central log and secure delivery along with configurable log retention settings.
- DLP event viewerIncrease the efficiency of your service technicians with a single-pane-of-glass view across all DLP events with fast search and filtering capabilities.
- ReportingDemonstrate your service value to clients and ease compliance reporting with information-rich widgets that provide a clear view of actionable data loss prevention statistics that can easily be sent to clients as reports.
- On-screen notification to end usersIncrease end users’ data loss prevention awareness and reduce time spent by IT administrators on investigating with interactive on-screen warnings that explain why certain data transfer attempts have been blocked by DLP rules.
- Block override supportEnsure clients’ business continuity by allowing end users to override a data transfer block in case of extraordinary situations by providing a one-time business-related exception.
- Encrypted removable storage supportBetter protect clients data by neutralizing the risks of sensitive data leaving your clients workloads via unencrypted removable storage devices (e.g. USBs). Advanced DLP can detect encrypted removable storage devices and allow data transfers only to them.
- Customize DLP rules by file typeGain more granular control of DLP rules and reduce the risk of sensitive data leakage on client endpoints by customizing the DLP policy with rules that prevent unauthorized transfers of specific sensitive file types.
Ensure the integrity of data while achieving higher regulatory transparency and decreasing security risks by adding Advanced File Sync and Share pack to the essential pay-as-you-go file sync and share service. Enable file notarization, verification, and easy eSigning.
Learn more


Cyber Protect Cloud
Modernize your cybersecurity and backup with integrated cyber protection

Subscribe for tips, news and occasional promotional offers from Acronis
Sorry, your browser is not supported.
It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.