Since 2003, Acronis has been an innovator in ensuring the security and privacy of the data it protects. As threats evolve, we provide customers with new layers of security – from ultra-secure data storage and encryption, to the first integrated anti-malware defense against ransomware and cryptojacking. In addition to enhancing our solutions, Acronis’ innovative research and development helps the Anti-Malware Testing Standards Organization (AMTSO) enhance data security across the industry.
Acronis operates a global network of cloud data centers that are built to provide the highest levels of safety, security, and accessibility.
High data availability
Ensuring that your organization’s mission-critical data has one of the highest levels of availability, leveraging data centers that provide redundant HVAC, network and UPS systems. Acronis follows the approach of Need plus Two (N+2) for greater redundancy. If there is a failure in a hardware-layer component, it will not affect Acronis’ critical infrastructure or Acronis customers. Acronis stores customer data employing its own software-defined storage solution, Acronis Cyber Infrastructure with Acronis CloudRAID technology.
Guarded physical locations
Data centers are physically defended 24/7 by security personnel, high fences, and video surveillance, while on-site entry requires biometric and key card access. Strict access control measures ensure that only authorized personnel have access to the data center.
Reliable facility management
Equipped with UPS and backup diesel-generators, Acronis data centers can provide a continuous supply of electricity through undefined power outages of up to 48 hours. HVAC, fire detection and suppression systems, alarms, and monitoring by surveillance cameras (CCTV) allow Acronis to provide a reliable infrastructure.
Location choice for your data
The global nature of our data center network means your data can be stored where you want, ensuring your regulatory compliance and connectivity requirements are met.
*Exact list of certifications and standards may vary for specific data center, please request additional information from your account manager.
Security technologies: revolutionizing data protection
Modern threats to data are evolving at break-neck speed. Acronis is committed to protecting all data, apps, and systems, which means our experts are continuously identifying new dangers and developing innovative technologies to ensure your data’s security.
Acronis Active Protection
Integrated into our backup solutions, our advanced, artificial-intelligence-powered technology detects and stops ransomware and cryptomining malware attacks in real time. Completely compatible with the most common anti-malware solutions, Acronis Active Protection safeguards all of the data on your systems, including documents, media files, programs – even the backup files you create with Acronis. It also includes self-defense measures to keep malware from targeting Acronis backup software, ensuring your data, apps and systems are safe.
Acronis Cloud Brain
Built by Acronis to enhance protection levels, this cloud infrastructure uses artificial intelligence and machine learning to analyze massive volumes of computer processes that are known to be either safe or malicious in nature. From that analysis, Acronis Cloud Brain creates machine learning models that can predict the value of a target process. That model, when combined with behavioral heuristics, allows technologies such as Acronis Active Protection to detect and stop code injections like ransomware. As a result, our solutions can deal with the most dangerous and sophisticated modern threats.
As new online attacks focus on corrupting and altering files, keeping data safe from unauthorized changes is critical to the future of data security. We developed Acronis Notary as a way to guarantee data authenticity – giving our users the ability to verify that their data (including backup files) is authentic and unaltered. By recording unique hashes for sensitive files in the Ethereum blockchain ledger, Acronis Notary provides indisputable proof that the data is original, unchanged, and safe to use.
Bug bounty program
As leaders in cyber protection, we develop our products with a focus on security, ensuring efficient data protection. Our dedicated Application Security, Infrastructure, SOC, and Compliance teams work tirelessly to guarantee vulnerability-free products that customers can rely on for protection against modern cyberthreats.
To support these efforts, Acronis has been running a bug bounty program on HackerOne since 2018. We work closely with the security community and embrace researchers who contribute towards the optimization of our products. If you believe you have found a security issue, please report it to us as soon as possible and we may award you with a bounty for your contribution.
With end-to-end encryption at every stage – at rest, in transit, or in cloud storage – Acronis products ensure your data is always safe, secure and private. Data is encrypted using the enterprise-grade AES-256 algorithm and protected by a user-defined password, so only you have access. Even the metadata communications between your system and the Acronis Cloud is encrypted for total security.
Enterprise-grade AES-256 algorithm
Choice of 128- and 256-bit keys
SSL encryption of the channel to the cloud
Secure code: transparent development with security in mind
Protecting customer data from modern threats means our products must be developed with security in mind. To ensure that customers can trust our commitment to secure, private, professional product development, Acronis is ISO/IEC 27001 certified and fully compliant with GDPR and HIPAA regulations. In addition, all of our developers regularly train on the latest security development practices, which are implemented across our R&D organization.
ISO/IEC 27001 certified
GDPR and HIPAA compliant
Regular security trainings for R&D engineers
Proven security and self-defense5.0Average rating, out of 5
Our test of the personal backup software showed that their self-defense is far from ideal. Only one of the seven products tested by us, namely Acronis True Image, was able to demonstrate a good result.Read more
Verified Acronis user
Only Acronis Backup showed good results with 87% and 81% pass rate for 32-bit and 64-bit products correspondingly providing comprehensive self-defense capabilities as well as service sustainability.Read more
Verified Acronis user
Securing the industry
Proud member of AMTSO
As part of the Anti-Malware Testing Standards Organization (AMTSO), Acronis is helping to develop proper standards for testing security solutions, and we participate in tests that adhere to AMTSO’s standards.
ML contributor to VirusTotal
Membership in AMTSO allowed Acronis to contribute our Machine Learning engine to VirusTotal, enabling all users around the world to benefit from our technology’s ability to detect various online data threats.