Compare Acronis Cyber Protect editions

Data protection

File-level backup

Image-based backup

Local backup

Mobile backup

NAS/shares backup

Incremental/differential backups

Backup Window (traffic throttling)

Multi-destination backup (backup replication)

Archive compression

Backup validation (checksums)

Retention rules

Blockchain backup notarization

Bare Metal Recovery (BMR)

BMR to dissimilar hardware (Universal Restore), P2V, V2P, P2P, V2V

XenServer, KVM, RHV, Oracle VM server

Immutable Storage

One Click Recovery

Synology NAS backup

Cybersecurity

Ransomware and cryptojacking protection

Antivirus and anti-malware protection

Exploit prevention

URL filtering

URL filtering with categorization

Windows Defender Antivirus management

Microsoft Security Essentials management

Threat Feed

Remote device wipe

HDD health monitoring

Data protection map

Continuous data protection

Forensic backup

Safe recovery of the backups

Corporate allowlist

Vulnerability assessments for Windows

Vulnerability assessments for third-party Windows applications

Vulnerability assessments for macOS

Vulnerability assessments for Linux

Patch Management

Fail-safe patching: backup endpoint before installing patches

Remote Desktop

Event monitoring

Automated event correlation

Prioritization of suspicious activities

Automated MITRE ATT&CK® attack chain visualization and interpretation

Single-click response to incidents

Full threat containment including endpoint quarantine and isolation

Intelligent search for IoCs including emerging threats

Attack-specific rollback

Endpoint protection management

Group management

Shared protection plans

Centralized plan management

Dashboard configuration

Reports

Email notifications

Looking for help?

Frequently asked questions

Sorry, your browser is not supported.

It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.