Acronis Cyber Cloud is a platform that helps service providers deliver cyber protection in an easy, efficient, and secure way. With our monthly release cadence, you can deliver even more value to your customers with in-demand features and functionalities
Acronis Cyber Cloud December 2020 Release
Proactive AI-based Ransomware Protection for Linux
Secure all data on Linux systems with real-time protection from ransomware. The AI-based Acronis Active Protection technology uses sophisticated analysis tools to recognize suspicious behavior and a wide variety of ransomware types, stopping their attack.
Acronis Cyber Notary Cloud e-signature API
Customize, integrate, and extend your services with an advanced e-signature functionality that enables easy, efficient, and secure online signing of files with embeddable e-signatures, no matter where the files are stored.
Software and Hardware Inventory Collection
Save time and effort with up-to-date software and hardware inventory information. Discover all software/hardware assets installed on customer machines through automatic or on-demand scans. In addition, you can browse and filter software/hardware assets by multiple criteria, easily generate inventory reports, and auto-delete records once a machine or tenant is removed.
Setting up a disaster recovery infrastructure has never been easier – just enable the disaster recovery functionality in a protection plan and a default infrastructure will be automatically set up based on the device’s CPU, RAM, and network configuration.
Support for macOS Big Sur
Acronis Cyber Cloud provides full support for the newest version of macOS Big Sur, set to be released this fall.
Accelerate and automate the signature process while reducing costs with embeddable e-signatures and Ethereum-based blockchain notarization for them. In Acronis Cyber Notary Cloud, clients can easily execute every step of the document workflow – from creation, to sending the document to multiple signees – with an easy drag, drop, and sign feature.
Protection for Citrix Workspace
Acronis Cyber Protect Cloud provides enhanced security for Citrix Workspace to proactively protect workspaces with vulnerability assessment, patch management, code injection prevention, and antimalware capabilities.
Every workload is different, but every workload needs cyber protection – whether it stores business-critical data or nothing at all. With Acronis Cyber Protect Cloud Essentials Edition, you can protect workloads that don’t need to be backed up with bullet-proof cyber protection capabilities — antivirus and antimalware, URL filtering, vulnerability assessment, patch management, and remote desktop.
Until a patch is applied, your clients’ machines are vulnerable. With exploit prevention, you can stop and prevent attacks with memory protection, return-oriented programming protection, code injection protection, and privilege escalation protection.
URL filtering widget report
Simplify administrative management with an easy to read URL filtering report. At a glance, you can see a static list of URL categories and the number of items that were detected in the defined period of time.
Read-only role for disaster recovery
Enhance the security of your internal operations with a read-only role for Acronis Cyber Disaster Recovery Cloud. With this additional user permission, your technicians can monitor and manage the account without the permissions needed to make changes within accounts.
This security assessment and scoring tool is now available to everyone as a standalone tool. It identifies the security gaps in an IT environment by looking at common threat vectors and provides detailed recommendations on how an organization can improve its security posture, safeguarding its systems against modern threats.
Microsoft Teams backup and recovery
Backup and recover your clients’ entire Microsoft 365 Teams site and channels, including team mailboxes, meetings, and channel content. You can also perform full-text searches within channel conversations.
Enhanced URL filtering
Help your clients manage employee productivity with URL filtering. Advanced categorization by website type allows you to choose which categories users have access to when browsing the web, ensuring they are more focused.
Assign users access permissions
One of the best ways to secure data is to compartmentalize who has access to it and who has permissions to change it. We take a similar approach to our platform and now have read-only user permissions to help you better secure clients’ accounts within your organization.
Enhanced password strength policy
Common or compromised passwords are an easy way for cybercriminals to access an account. New password precautions for the Acronis Cyber Cloud platform checks users’ passwords against top leaked and bad password databases, identifies company and user names, and leverages a password strength meter to encourage better password practices.
With our new VPN feature, clients on DR-enabled tenants can establish a secure (L2 VPN) connection to the corporate network with their personal devices. This secure point-to-site connection allows clients to access files from the local site or the cloud so they can do their job without compromising the security of the network.
Updated patch management capabilities
Software patches and updates are essential to securing a business environment. New customization capabilities in Acronis Cyber Protect Cloud enable you to postpone machine reboots until after backups are complete.
This security assessment and scoring tool, available for Acronis Cyber Protect Cloud, identifies the security gaps in an IT environment by looking at common threat vectors and suggesting ways you can improve your #CyberFit score. By addressing these areas, you can improve your security posture and safeguard your system against modern threats.
Protection for Zoom, WebEx, and Microsoft Teams
Collaboration tools like WebEx and Zoom can help an organization become more efficient, but the problem is a lot of these tools are not secure. With Acronis Cyber Protect Cloud, you can actively protect these popular collaboration tools with antivirus and antimalware protection.
Remotely wipe devices
Instead of letting business-critical data get into the wrong hands, you can now remotely wipe compromised or missing Windows devices. Built into Acronis Cyber Protect Cloud, you can successfully prevent data from being deleted by disgruntled employees or being accessed from lost or stolen devices.
Remote desktop enhancements
Employees working from home may need access to files or apps on their work machines, they might not have a configured VPN. Now you can share a secure link with end users so they can remotely access their machine.
Predefined protection plans
Protect your clients’ remote and office workers quickly and easily by choosing one of three preconfigured protection plans. These options help you save time while ensuring you that your clients’ workloads and environments are protected.
Voice control for Acronis Cyber Protect
Your personal safety and security are our top priority. Given the current environment, we want to enable you to help clients without needing to physically touch their machines. Voice control for Acronis Cyber Protect Cloud means you can now control the console hands-free.