Protect VMware ESXi 7.0 workloads with Advanced Disaster Recovery
Extend your disaster recovery protection to VMware ESXi 7.0 workloads that are backed up agentless.
Advanced Email Security: localized user interface
Get more value and convenience by using the user interface in your preferred language. Spanish is already available, and more to follow!
Enable end users to request and obtain files quickly and securely
The files upload request gives end users a fast and secure way to request and obtain files from anyone, with all files being automatically organized into a user folder. Using an easy, drag-and-drop graphic interface, the file upload request enables end users to securely upload files without being added as a guest user or having access to the particular user account.
Advanced Management pack got a major update, now supporting the management and execution of custom pre-approved Powershell/Bash scripts on remote Windows and Mac machines. Increase the efficiency of your MSP technicians by automating provisioning, software and user management, network configuration, system maintenance, and other routine tasks to handle more workloads with less efforts. Streamline your operations and minimize human errors. Have complete visibility into script operations with monitoring capability. Leverage a library of Acronis-verified scripts that can run on any machine group. Fine-tune script tasks and create custom scripts that you can run on-demand, on-schedule, or when start conditions are met – based on your and your clients needs.
Manage multiple clients on the partner level
Streamline your operations for multiple clients, including scripting management and alerts and activities monitoring. Simply select the new “All customers” tab to centrally manage all of your direct clients in the Cyber Protection Console – monitor all services and manage workloads on a partner level. With centralized management you can manage your scripts and execute them across all end-clients, dedicated end-clients, individual workloads and static or dynamic groups of workloads.
Recover workloads quickly and effortlessly with One Click Recovery
Eliminate the IT bottlenecks requiring high-skilled IT personal for workload recovery and save time and money reducing the downtime in case of attacks and large-scale incidents. Empower end-users to rapidly recover their workloads by enabling them to start an automated recovery with a single click. The One Click Recovery can be enabled in the protection plan.
Backup and download Microsoft OneNote files
Protect Microsoft OneNotes files from being lost by backing them up as part of the Microsoft OneDrive and Microsoft SharePoint Online backup process. Additionally, end clients can download the Microsoft OneNote notebooks locally.
Recover emails to PST format, even without Outlook
Minimize the chance of clients not having their in-mail data available by enabling local recovery of emails as PST files even when Microsoft 365 is unavailable.
Backup and recover web-hosted servers managed via DirectAdmin
Leverage application-consistent backups of web-hosted servers managed via the DirectAdmin application to enable rapid recovery of the entire server in case of a disaster or to granularly restore individual web-hosting accounts, files, databases, websites, and mailboxes. Enable self-service as an option for web hosting end-clients.
Advanced DLP: Encrypted removable storage support
Better protect clients data and help them comply with regulations by neutralizing the risks of sensitive data leaving your clients workloads via unencrypted removable storage devices (e.g. USB flash drives). Advanced DLP can now detect encrypted removable storage devices and allow data transfers only to them.
Effortlessly manage wildcard SSL certificates for branded URLs.
Minimize maintenance efforts and costs for your business with free-of-charge, automatically-renewed SSL certificates by Let’s Encrypt certificate authority. Additionally, you will be notified in advance about the expiration of certificates by other authorities and can renew them in the Cyber Protection Console.
Enable maintenance notifications for partners and clients
Provide your partners and clients with greater visibility into maintenance work in Acronis data centers by setting up automatic notifications via email per tenant. Tenant administrators where the Acronis maintenance notifications are enabled can subscribe their users for the email.
Effortlessly manage service and bill usage of a tenant level in ConnectWise Manage integration
Partners who resell Acronis services to other partners or MSPs that serve larger clients with multiple tenants can now manage their services and bill usage using the ConnectWise Manage integration to map Acronis partner tenants to ConnectWise Manage accounts.
Enable or disable ticket synchronization for Kaseya VSA integration
Partners who do not use Kaseya VSA for ticketing, can now effortlessly switch off ticket synchronization between Acronis Cyber Protect Cloud and Kaseya VSA either during tenant provisioning or in the organization settings.
Increase awareness with datacenter status and services availability portal
The new datacenter status page, available both in Acronis Cyber Protect Cloud and the Partner Portal, provides a self-service where partners can check services status and upcoming maintenance schedule. This update will strengthen the communication between partners and the Acronis Support team.
Chat with an Acronis account manager in the management portal
Consult with an Acronis account manager about planning, launching and scaling your services with us directly in the Cyber Protect console via chat window. This functionality will be available in all data centers, except partner-owned ones, and only for partners that do not use complete white labeling.
Centralize your visibility across cyber protection alerts, including for malicious email detections
Prevent potential damage by promptly reacting to malicious email detection alerts in the Cyber Protect console. Demonstrate your email security service value to clients with consolidated statistics on detected malicious emails in the overview dashboard.
Automate email security service provisioning for Microsoft 365
Simplify the initial configuration process and speed-up service provisioning by running a ready-to-use script to automatically set up routing between Microsoft 365 and Advanced Email Security.
Leverage multiple configuration improvements in the ConnectWise Manage integration
Partners can manually trigger the synchronization of usage and quotas for one or more client tenants between Acronis and ConnectWise Manage. Usage is now reported more accurately to ConnectWise Manage, using float point quantities where applicable.
Auto-generate product names in mapping wizard for Kaseya BMS and Tigerpaw PSA integrations
Acronis Cyber Protect Cloud automatically generates suggested names for new PSA products, using a predictable and understandable naming pattern that simplifies the process of mapping products to Kaseya BMS and Tigerpaw PSA integrations.
Start planning your service upgrade. Get early access to Advanced DLP, designed for MSPs
Experience the only data loss prevention (DLP) solution designed for MSPs to prevent leakage of clients’ sensitive data with automatic client-specific policy creation, which eliminates complexity and costs associated with enterprise DLPs. Start planning your service upgrade now to boost profits and reduce security risks for clients with early access to Advanced DLP — at no additional cost.
Define your company contacts to receive role-specific updates from Acronis with the new ‘Partner profile’ option
Keep your company-related information up-to-date and define which of your company contacts should receive billing, business and / or technical updates from Acronis with the new ‘Partner profile’ tab. Ensure your team only receives information relevant to their specific role.
Enable sharing of files and folders with external users via Acronis Files Cloud
The new “guest user” role empowers Acronis Files Cloud users to share files and folders with external users identified by their email addresses. For repetitive contacts, this an easy alternative to public link sharing that will save time and make the process safer and easily auditable.
Reduce service delivery complexity when using both Acronis Cyber Protect Cloud and Splashtop
Eliminate the need to manually switch between the Acronis Cyber Protect Cloud and Splashtop consoles. Their native integration enables you to open a remote session to manage devices with the Splashtop Streamer agent directly from the Acronis Cyber Protect Cloud console.
Manage macOS and Linux workloads via Kaseya VSA integration
Enable mass deployment of Acronis’ Cyber Protect Cloud agent, manage protection plans, and monitor protection status for macOS and Linux workloads — together with existing support for Windows from within Kaseya VSA.
Benefit from an improved Advanced Email Security visual experience
The Advanced Email Security’s management console, accessible via Acronis Cyber Protect Cloud’s console through a single sign-on (SSO), has been updated with an Acronis look and feel, enabling administrators to maintain the Acronis console’s visual experience.
Enable enhanced protection against Azure cloud outages while utilizing the public cloud. Benefit from the predictable and simple monthly billing that Acronis provides, unlike the billing of native Azure disaster recovery tools — Acronis MSP partners are billed only for storage and not for outbound network traffic consumption and / or hot disk usage.
Provide anti-malware services for Apple M1 ARM-based workloads
Protect and manage all Mac-based devices for clients, regardless of the hardware inside. With Acronis, you can now extend your anti-malware services to the ever-growing market of Mac devices based on M1 ARM-based chips.
Effortlessly recover workloads protected by BitLocker
Leverage a streamlined, intuitive process for the recovery of BitLocker-protected workloads. Recover disks, volumes and files encrypted by BitLocker with the ease you recover unencrypted ones — without the need to reboot or take any additional steps.
Get visibility and report on usage for trial tenants in Autotask PSA and ConnectWise Manage
Enable reporting on usage for trial tenants by empowering service technicians to set up a pay-as-you-go (PAYG) or prepaid option with overage billing models. This enhances the capability to provision clients as trial tenants, which was introduced in this past February’s update.
Reduce deployment time with a single, unified Acronis Cyber Files Cloud and Acronis Cyber Protect Cloud agent
Ensure fast, hassle-free deployment and consolidated agent updates – the file sync and share functionality is now fully integrated into Acronis’ cyber protection agent. This enhancement improves efficiency with fewer system resources used. Plus, by removing silos, you’re empowered with cohesive, easy to deliver services.
Extend Acronis Cyber Files Cloud support to iOS 15
Enable secure collaboration and uninterrupted data access to file sync and share users who are leveraging the latest iOS version on their mobile devices.
Meet your clients’ privacy requirements with a new Admin role in Acronis Cyber Files Cloud
Manage file sync and share settings without accessing clients’ sensitive data. A new Admin role enables administrators to respond to clients’ privacy and compliance restrictions with ease.
Preserve revisions and links when moving files and folders in Acronis Cyber Files Cloud
Improve the file sync and share user experience for clients – users no longer need to re-share links when moving or copying files and folders.
Enable usage of custom DHCP with L2 site-to-site VPN connectivity
Unlock more failover scenarios in Advanced Disaster Recovery. Simply enable clients to use their own DHCP server when one or more servers are in failover on Acronis Cloud, and DHCP traffic is sent via an L2 Site-to-site VPN tunnel.
Support failover from immutable recovery points in Advanced Disaster Recovery
Mitigate malicious or accidental deletion of recovery points by protecting them with immutable storage. Engaging this functionality allows you to initiate failover to Acronis Cloud from a deleted recovery point – whether during regular testing or given a real disaster.
Empower clients with self-service anti-malware scanning of files, folders and drives
Allow clients to perform on-demand anti-malware scans of any file, folder and / or drive on their workstations. Manual anti-malware scanning is supported on Windows, Linux and macOS.
Gain more granular control over ransomware protection settings
Configure your clients’ ransomware protection preferences with ease. Administrators can now choose whether to separately enable ransomware protection, self-protection and cryptomining-process detection.
Start a free 30-day trial for ConnectWise Manage and Autotask PSA integrations
Provision new customer tenants as trial accounts and give them full access to Acronis Cyber Protect Cloud’s seamless integrations with ConnectWise Manage and Autotask PSA. Manually switch them to production or wait for the automatic upgrade when the trial period ends.
Bring your corporate style to the agent installer and tray monitor
Customize the Acronis Cyber Protect Cloud Windows and Mac agent installers and tray monitor with your corporate style. The new branding capabilities include agent installer file name and logo, agent name, tray monitor name and color schemes for both the agent installer and the tray monitor.
Provide administrators with recommendations based on disk and ransomware alerts
Administrators will be provided with additional context on the steps they can take to reduce the risks related to ransomware and disk alerts. Ransomware alerts will signal administrators to activate anti-malware protection to limit the attack surface. Disk alerts advise when to turn on continuous data protection (CDP) to achieve near-zero RPOs on critical data.
Increase visibility into the disaster recovery protection status of workloads
See which workloads are protected with disaster recovery services right from the list of all workloads and receive accessible in-product information on how to enable disaster recovery for a workload.
Ensure disaster recovery failover from a malware-free recovery point
When starting a disaster recovery failover, administrators will be able to see indicators of recovery points infected by malware to ensure a faster return to productivity and a better response to threats.
Know when the disaster recovery compute points quota is exceeded
When service provider administrators are selecting a primary server to be powered on that exceeds the quota for disaster recovery compute points, they will be provided with an in-product notification that the quota is exceeded and that they need to contact the Acronis support team.
Report on recently affected workloads
Service providers will benefit from new dashboard widgets showing recently affected workloads within the last 200 days along with the threat that impacted them.
Acronis Cyber Files Cloud: Extending support to Android 12
Allow data access via secure file sync and share services to users with mobile devices running on Android 12, strengthening data availability and protection across your clients’ organizations.
Protect backups from data deletion with immutable storage
Strengthen regulatory compliance by preventing accidental or malicious deletion of clients’ backups. Simply configure the number of days that deleted data should be retained – even if your clients’ workloads are compromised. Deleted data can be recovered via the Acronis Cyber Protect Cloud console.
Extend data protection services to MariaDB and MySQL databases with Advanced Backup
Protect clients’ data across more workloads. Acronis collects metadata for each database running on it while the entire workload is backed up. This means you can browse databases and/or fully or granularly recover data and tables without recovering the entire workload.
Unlock broader failover control and more failover scenarios for licensed applications
Gain more control over network configurations and IP address leases by running your own DHCP service on a recovery server during failover or test failover. For example, you can edit the MAC address of primary and recovery servers so they can run applications bound to MAC addresses.
Automate updates to Acronis-Autotask PSA contracts
Synchronize all changes made in the Acronis Cyber Protect Cloud management console with Autotask PSA contracts, and vice versa. You can assign cyber protection plans to new workloads without waiting for manual updates in the Autotask PSA contracts, and without waiting for the migration of tenants to new billing modes. All changes are reflected immediately.
Enhance your file sync and share service with unified iOS applications
Deliver a better client user experience with the unification of the Acronis Cyber Files Cloud application for iOS and the Acronis Cyber Files on-premises application. This approach not only makes it easier for a client to correctly select an application for file sync and share but also enables simultaneous product updates and improvements.
Improve clients’ visibility and control over the notarization process
Elevate client insight into any notarization process with new, instant-status visibility and prompt notifications. Clients can also download notarization certificates as a PDF and easily copy the file notarization information for trusted verification.
Build trust and make the eSigning process more transparent for clients
Enhance your eSignature services and increase transparency by letting clients see all the emails that are included in an e-signing invitation.
Maximize workload performance through off-host data processing in Advanced Backup
Reduce the load on your clients’ workloads by moving backup replication, validation, retention and conversion into a VM operation for another machine with the Advanced Backup for Acronis Cyber Protect Cloud. These operations can be performed independently from existing protection plans that are on a separate schedule.
Achieve near-zero RTOs by scheduling backup conversion into ready-to-start virtual machines
Optimize your RTOs by scheduling a regular conversion of important workload backups into ready-to-start virtual machines (Instant Restore) with the Advanced Backup pack for Acronis Cyber Protect Cloud. The converted VMs are updated incrementally with each conversion task execution. Backup conversion operations can be performed on a separate schedule and different agent.
Provide greater control of backup and recovery tasks to VMware Cloud Director’s backup operators
More data protection options are available for tenants in the VMware Cloud Director tenant portal. VM backup operators can access more backup/recovery options to comply with tenants’ backup policies.
Protect Windows 11 and Windows Server 2022 with anti-malware and anti-ransomware technologies
Strengthen workload protection by extending your next-generation anti-malware and anti-ransomware services to Windows 11 and Windows Server 2022 to counter modern cyber threats.
Extend disaster recovery to Linux workloads with logical volumes (LVM)
Protect Linux physical and virtual machines that have logical volumes (LVM) with disaster recovery services.
Leverage a web installer for MacOS
Minimize provisioning efforts with a lightweight web installer for MacOS that works on both Intel and Apple M1 CPUs to eliminate the need to download different installers based on a CPU model.
Easily match usage metrics to their related prices in the price list (SKUs)
Easily do a one-to-one match between usage and related SKUs with the introduction of new SKU-related fields in the usage report. Streamline invoice preparation and minimize errors.
Leverage a one-click access to integration management in the Acronis Cyber Protect Cloud console
The improved user experience of the Acronis Cyber Protect Cloud console makes integrations much more easily accessible, through one-click access via the navigation pane.
Benefit from folder improvements in Acronis Cyber Files
Leverage extended folder functionalities in Acronis Cyber Files that allow users to drag and drop folders and files from the Web UI.
Benefit from new, simplified licensing for Microsoft 365
Leverage a new, simplified Microsoft 365 licensing model that offers attractive per-seat pricing for partners – with unlimited Acronis Hosted Cloud Storage included. This change is available within “per workload” licensing.
Delegate backup and recovery task management without compromising vCloud Director security
Gain more granular control over who is responsible for VMware backup and recovery management. vCloud Director administrators can now delegate backup and recovery capabilities by manually creating new “Organization self-service VM backup operator” roles with a custom set of permissions.
Enjoy improved security of API permissions within ConnectWise Manage integrations
Provide more control and greater security of API permissions by no longer relying on the generic “admin” role. Now you can set your own granular permissions for the API user within your ConnectWise Manage environment.
Ensure support for upcoming macOS and Android OS versions
Ensure you will be able to protect clients’ Android 12 and macOS 12 workloads with cyber protection from day one of the upcoming releases.
Supporting your operational efficiency, Acronis Cyber Protect Cloud features new native integrations with commonly used RMM tools. Our list of new integrations includes Addigy, Datto RMM, Ninja RMM, and Paessler PRTG.
Intuitive Section Management for Client Executive Summary Report
The Executive Summary report enables you to demonstrate the value of your services to clients. Further demonstrate your value in this report by adding, naming, or changing the order of sections within the report to better represent the organization of your client’s business.
Differentiate the network protection folder path for Windows and macOS
Protect both Windows and macOS workloads within a single protection plan by specifying the Network Folder Protection Restore path for either Windows or macOS separately.
Increased visibility and management of links used within eSignature
Users are now empowered to better manage links for the eSignature capability in Advanced File Sync and Share; allowing them to view, edit or even revoke shared links. History is also provided by link type and duration of link validity.
New third-party integrations
Easing your administrative efforts, Acronis Cyber Protect Cloud provides native integrations with commonly used RMM tools. Our list of new integrations includes N-able RMM and N-able N-central.
Full support and integration with VMware vCloud Director
Cloud providers hosting with the vCloud Director can now offer tenants Acronis Cyber Protect Cloud. Enable clients with proactive cyber protection and fast recovery through a simple web interface requiring no client-side deployment. Per-tenant reports allow flexible billing.
Proactive notifications after Microsoft 365 Data Recovery
Clients now can react quickly if needed with proactive notifications after recovery or downloading of backed up data on Microsoft 365.
”Restore Operator” role for Microsoft 365/Google Workspace
Protect your client’s data and prevent accessibility when assigning the “Restore Operator” role, which allows the assignee to recover data on behalf of the client/user without providing access to its content.
New Advanced File Sync and Share Pack
Improve the collaboration and productivity of your clients’ teams. The Advanced File Sync and Share pack extends Acronis Cyber Protect Cloud’s integrated secure file-sharing capabilities with fully remote notarization, file verification, and online signing.
Advanced audit trail in eSignature certificate
Know exactly the status of your document by viewing a detailed audit trail and tracing the flow of actions within the signature certificate.
Backup slice management for Android 2.3.0
View, select, delete or restore any mobile backup slices of your choice through this intuitive slice management capability.
Easily and selectively restore backed up pictures and videos for Android 2.3.0
Save time and restore only the pictures or videos needed by quickly and easily selecting multiple files at once; by days, sequentially.
New third-party integrations
Easing your administrative efforts, Acronis Cyber Protect Cloud features new native integrations with commonly used RMM and PSA tools. Our list of new integrations includes ConnectWise Command, Jamf Pro, CloudBlue PSA, and Matrix42.
Reduce your client’s risk from insider data breaches on Mac computers by controlling user access to peripheral devices and local interfaces on protected computers running macOS Catalina and Big Sur.
Executive Summary Reports to present key performance metrics to clients
Easily demonstrate the value of the services you deliver to your clients with these customizable reports. Reported metrics include: patches installed, malicious URLs blocked, malware blocked, protection status of machines…and more. Available on partner and customer levels in the Management Portal.
Simplified delivery of initial backup to the cloud for backup plans with replications
Physical Data Shipping with replication to cloud is now possible for locations with Always Incremental scheme only.
Privacy warnings for Microsoft 365 and Google Workspace backups
Prevents accidental access to client data by warning the partner and that action will be logged before accessing sensitive data.
Client Access to audit log for Microsoft 365 and Google Workspace backups
The client or administrator is able to search and review events related to Microsoft 365 or Google Workspace cloud-to-cloud backup for any investigation or analysis of possible deviations.
Brand-neutral Acronis Cyber Protect installer
Acronis partners are able to provide a brand-neutral solution to their customers. Partners can enable white-labeling in the partner settings; allowing the client to download a brand-neutral installer and Cyber Protect Monitor.
Support licensing for hosting servers
For Acronis partners utilizing web hosting control panels, special web hosting server protection pricing and licensing has been introduced for: DirectAdmin, Virtualmin, ISPmanager.
Email is the biggest threat vector for your clients, neutralize it and minimize risks by blocking any email threat, including spam, phishing, business email compromise, advanced persistent threats, and zero-days; before it reaches end-users.
Auto-update for cyber protection agents
Ensure all agents are updated to the latest version without any manual operation. Available for Windows, Linux, and Mac machines.
Registration token changes
Generate registration tokens without having to log out from the Partner account and back in as a customer. Empowers script-based integrators to provide flexibility.
Flexible deployment of agent without anti-malware component
Use Acronis Cyber Protect Cloud without the anti-malware component to decrease the number of services running on the machine, optimize RAM consumption, and improve compatibility with third-party antivirus solutions.
Monitor signed applications by using behavior detection
Increase the security of Acronis-protected workloads by monitoring signed applications for potential threats. All signed applications, (non-Microsoft certificates) are monitored via the improved performance of the Acronis Behavior Engine to quickly react to new developing threats.
Document templates for Acronis Cyber Notary Cloud
Simplify the process of signing typical documents by using templates for employment contracts, service agreements, or NDAs.
Software inventory improvements in Advanced Management Pack
Automatically be alerted when there is a need to change your current service quota. Software inventory scan results are updated without having to refresh.
Improved failback planning in Advanced Disaster Recovery Pack
Save the time and effort needed for planning failback activities and gain immediate visibility of the size of backup data to be transferred back to the local site.
Vulnerability assessments and Acronis Active Protection for macOS
Increase protection for your clients’ macOS workloads by protecting them from advanced threats with Acronis Active Protection. If a macOS is infected with ransomware, Acronis Active Protection is able to detect this activity, stop it, and recover your clients’ data.
Vulnerability assessments for macOS
Strengthen your clients’ macOS workloads by running scheduled vulnerability assessments. Detect known issues before they become a problem with easy to run scans within the Cyber Protection console. If issues arise, you can quickly remediate them to keep your clients’ data safe.
UX improvements for licensing of Advanced packs
Simplify your management and monitoring processes with new UX improvements to Acronis Cyber Protect Cloud. This enables you to easily switch from one client account to another so that you can get at-a-glance views quickly and easily – saving you and your technicians time.
Collecting hardware inventory from agent-based virtual machines
Save time and effort with hardware inventory information for agent-based virtual machines on a clients’ network. With on-demand scans, you can easily monitor hardware changes, receive detailed reports for devices and ensure that they are adequately protected.
Performance improvement for behavior engine
Improved performance for our behavior engine helps you protect your clients from antivirus and anti-malware with less strain on their systems. With significant performance enhancements, you can increase protection for them with fewer resources.
Firewall policies management
Easily manage firewall policies on your clients’ behalf for their disaster recovery servers through the Acronis Cyber Protect Cloud console. This enables you to simplify the support process and manage outbound and inbound firewall policies.
Device control: support of encrypted removable media and screenshot capture access
Eliminate the risk of data leaks with encrypted removable media and screenshot capture control. This enables users to keep sensitive information within their organization – should a removable device get in the wrong hands or prevent screenshots from being copied to the clipboard. Keeping your clients’ sensitive data safe and secure.
Storing cPanel metadata in the backup archive meta
Quickly and easily restore massive amounts of data by storing cPanel metadata in the archive. Data heavy environments – such as hundreds of websites – can traditionally take a significant amount of time to recover. This enables you to get cPanel instances up and running quickly.
Achieve best-in-class failback times, ensure business continuity, and safeguard your clients’ data by transferring it to the local site, while the virtual machine in the cloud is still running. Get information about the progress and estimated downtime, and plan the failback process accordingly.
Agentless backup and restore for Red Hat Virtualization
Perform agentless backups and restores of Red Hat Virtualization (RHV) virtual machines and granular recovery of files and folders.
Support for Scale Computing HC3
Protect even more workloads with full support for agentless backup and recovery of Scale Computing HC3 virtual machines.
Protection for macOS on ARM
Provide full protection for macOS on the newly released ARM CPU with Acronis Cyber Protect Cloud’s vulnerability assessments, patch management, antivirus and anti-malware capabilities.
Integration with Kaseya VSA
Centrally monitor and manage all of your workloads and alerts within the Kaseya VSA interface, including provisioning services, managing devices and protection plans, ticketing, reporting, etc.
Data Loss Prevention (DLP) via device and port control
Strengthen data protection and prevent leaks of sensitive information via local physical and virtual workloads. Enforce context-aware controls over local data access and transfer operations on workloads, including clipboard operations.
Anti-malware for Linux
Increase protection for your clients’ Linux-based environments. Anti-malware protection for Linux provides real-time protection and scheduled scans so that you can notify clients, and block and quarantine suspicious activity in real-time.
Support checks for updates via peer-to-peer
Maintain your clients’ system updates with ease. With peer-to-peer updates in Acronis Cyber Protect Cloud, as long as one agent is connected to the cloud, it will receive and share updates with other agents on the network. If this agent is down or not connected the rest of the agents will go to Acronis Cloud and will receive updates there – ensuring they are all up to date.
Bootable Media Builder
Recover clients’ data even faster with the bootable media builder, now available in Acronis Cyber Cloud. This enables you to easily create a customized Linux-based or Windows-based media that can be moved to USBs, ISO, or WIM without downloading any additional software – saving you time and resources.
IPsec multisite VPN support
Strengthen security with support of IPSec multisite VPN support. Available in Acronis Cyber Disaster Recovery Cloud, IPsec multisite VPN support integrates secure protocols and algorithms, so you can easily support clients with multiple sites that are hosting critical workloads with higher requirements for security, compliance, and bandwidth.
Custom DNS configuration
Provide flexibility by setting up your custom DNS configurations for the disaster recovery site in the Acronis cloud. This enables you to easily adjust DNS settings for your cloud servers, that are dependent on your own DNS services.
Enhanced security mode
Provide even better security for your clients with enhanced security mode. This mode restricts data access for everyone but the data owner – it safeguards all backups by ensuring they are encrypted and the management console doesn’t store or archive any passwords.
Acronis Cyber Files Cloud for Android
Protect even more Android files with additional functionalities within Acronis Cyber Files – including localization support in Spanish. With this new software update, users can now take photos within the app, and provide an even better user experience with pdf files: improved speed, enhanced search performance, and more.
Proactive AI-based Ransomware Protection for Linux
Secure all data on Linux systems with real-time protection from ransomware. The AI-based Acronis Active Protection technology uses sophisticated analysis tools to recognize suspicious behavior and a wide variety of ransomware types, stopping their attack.
Acronis Cyber Notary Cloud e-signature API
Customize, integrate, and extend your services with an advanced e-signature functionality that enables easy, efficient, and secure online signing of files with embeddable e-signatures, no matter where the files are stored.
Software and Hardware Inventory Collection
Save time and effort with up-to-date software and hardware inventory information. Discover all software/hardware assets installed on customer machines through automatic or on-demand scans. In addition, you can browse and filter software/hardware assets by multiple criteria, easily generate inventory reports, and auto-delete records once a machine or tenant is removed.
Setting up a disaster recovery infrastructure has never been easier – just enable the disaster recovery functionality in a protection plan and a default infrastructure will be automatically set up based on the device’s CPU, RAM, and network configuration.
Support for macOS Big Sur
Acronis Cyber Cloud provides full support for the newest version of macOS Big Sur, set to be released this fall.
Accelerate and automate the signature process while reducing costs with embeddable e-signatures and Ethereum-based blockchain notarization for them. In Acronis Cyber Notary Cloud, clients can easily execute every step of the document workflow – from creation, to sending the document to multiple signees – with an easy drag, drop, and sign feature.
Protection for Citrix Workspace
Acronis Cyber Protect Cloud provides enhanced security for Citrix Workspace to proactively protect workspaces with vulnerability assessment, patch management, code injection prevention, and anti-malware capabilities.
Every workload is different, but every workload needs cyber protection – whether it stores business-critical data or nothing at all. With Acronis Cyber Protect Cloud Essentials Edition, you can protect workloads that don’t need to be backed up with bullet-proof cyber protection capabilities — antivirus and anti-malware, URL filtering, vulnerability assessment, patch management, and remote desktop.
Until a patch is applied, your clients’ machines are vulnerable. With exploit prevention, you can stop and prevent attacks with memory protection, return-oriented programming protection, code injection protection, and privilege escalation protection.
URL filtering widget report
Simplify administrative management with an easy to read URL filtering report. At a glance, you can see a static list of URL categories and the number of items that were detected in the defined period of time.
Read-only role for disaster recovery
Enhance the security of your internal operations with a read-only role for Acronis Cyber Disaster Recovery Cloud. With this additional user permission, your technicians can monitor and manage the account without the permissions needed to make changes within accounts.
This security assessment and scoring tool is now available to everyone as a standalone tool. It identifies the security gaps in an IT environment by looking at common threat vectors and provides detailed recommendations on how an organization can improve its security posture, safeguarding its systems against modern threats.
Microsoft Teams backup and recovery
Backup and recover your clients’ entire Microsoft 365 Teams site and channels, including team mailboxes, meetings, and channel content. You can also perform full-text searches within channel conversations.
Enhanced URL filtering
Help your clients manage employee productivity with URL filtering. Advanced categorization by website type allows you to choose which categories users have access to when browsing the web, ensuring they are more focused.
Assign users access permissions
One of the best ways to secure data is to compartmentalize who has access to it and who has permissions to change it. We take a similar approach to our platform and now have read-only user permissions to help you better secure clients’ accounts within your organization.
Enhanced password strength policy
Common or compromised passwords are an easy way for cybercriminals to access an account. New password precautions for the Acronis Cyber Cloud platform checks users’ passwords against top leaked and bad password databases, identifies company and user names, and leverages a password strength meter to encourage better password practices.
With our new VPN feature, clients on DR-enabled tenants can establish a secure (L2 VPN) connection to the corporate network with their personal devices. This secure point-to-site connection allows clients to access files from the local site or the cloud so they can do their job without compromising the security of the network.
Updated patch management capabilities
Software patches and updates are essential to securing a business environment. New customization capabilities in Acronis Cyber Protect Cloud enable you to postpone machine reboots until after backups are complete.
This security assessment and scoring tool, available for Acronis Cyber Protect Cloud, identifies the security gaps in an IT environment by looking at common threat vectors and suggesting ways you can improve your #CyberFit score. By addressing these areas, you can improve your security posture and safeguard your system against modern threats.
Protection for Zoom, WebEx, and Microsoft Teams
Collaboration tools like WebEx and Zoom can help an organization become more efficient, but the problem is a lot of these tools are not secure. With Acronis Cyber Protect Cloud, you can actively protect these popular collaboration tools with antivirus and anti-malware protection.
Remotely wipe devices
Instead of letting business-critical data get into the wrong hands, you can now remotely wipe compromised or missing Windows devices. Built into Acronis Cyber Protect Cloud, you can successfully prevent data from being deleted by disgruntled employees or being accessed from lost or stolen devices.
Remote desktop enhancements
Employees working from home may need access to files or apps on their work machines, they might not have a configured VPN. Now you can share a secure link with end users so they can remotely access their machine.
Predefined protection plans
Protect your clients’ remote and office workers quickly and easily by choosing one of three preconfigured protection plans. These options help you save time while ensuring you that your clients’ workloads and environments are protected.
Voice control for Acronis Cyber Protect
Your personal safety and security are our top priority. Given the current environment, we want to enable you to help clients without needing to physically touch their machines. Voice control for Acronis Cyber Protect Cloud means you can now control the console hands-free.
Cyber Protect Cloud
Modernize your cybersecurity and backup with integrated cyber protection