Cyber Protect Cloud

Modernize your cybersecurity and backup with integrated cyber protection

Compare Acronis cyber protection editions

Purpose-built for service providers, Acronis’ cyber protection solutions – Acronis Cyber Protect Cloud and Acronis Cyber Backup Cloud – deliver easy, efficient, reliable and secure cyber protection for all data, apps and systems.

Acronis Cyber Backup Cloud Standard
For service providers
Part of the powerful Acronis Cyber Cloud platform, Acronis Cyber Protect Cloud and Acronis Cyber Backup Cloud are designed with a service provider’s technical and business needs in mind, offering multi-tenancy, easy up-sell/cross-sell to different solutions, reseller management, user-based language settings, and many more.
Integration with RMM and PSA tools
Integration with hosting control panels and billing systems
Integration with marketplace providers
Multi-tenant management portal
Up-sell/cross-sell to backup, disaster recovery, file sync and share, notarization and eSignature services
Pay-as-you-go pricing
API for custom integrations
Reseller management
Supported languages
Flexible Deployment
Vendor hosted deployment (cloud management and storage)
Agent for VMware as a virtual appliance
Hybrid deployment: Storage on SP premises
Wide Range of Supported Platforms
With Acronis, service providers can respond to clients’ needs by covering a wide range of environments via a single solution.
Windows Workstation
Windows Server
Linux Server
Public cloud VM agent-based backup (Azure Google, Amazon)
VMware vSphere VM agentless backup
Hyper-V VM agentless backup
VMware vSphere VM agent-based backup
Hyper-V VM agent-based backup
Red Hat Virtualization VM agent-based backup
KVM agent-based backup
Citrix Hypervisor agent-based backup
Nutanix AHV agent-based backup
Oracle VM agent-based backup
Odin Virtuozzo agentless backup
Number of managed workloads
Next-generation Cybersecurity
Acronis’ approach delivers next-generation cybersecurity, offering full-stack antivirus, antiransomware, and antimalware protection, exploit prevention, URL filtering, and many more.
Antivirus and Antimalware protection
Exploit prevention
URL filtering
URL filtering with categorization
Windows Defender Antivirus management
Microsoft Security Essentials management
Threat feed
Remote device wipe
HDD Health Essential
HDD Health Extended
Data protection map
Continuous data protection
#CyberFit Score (protection assessment)
Backup scan for malware
Safe recovery of backups
Corporate whitelist
Forensic mode
Additional Cyber Protection Features
Auto-discovery (network-based and Active Directory-based machines auto-discovery)
Vulnerability assessments for Windows
Vulnerability assessments for third-party Windows applications
Vulnerability assessments for Linux
Patch management
Fail-safe patching: back up endpoints before installing patches
Cyber Protected Desktop
Delegated Cyber Protected Desktop
Device control
Fast, Effective, Flexible Backup
File-level backup
Disk-level backup
Mobile backup (iOS/Android)
ESXi configuration backup
NAS/shares backup
System-state backup
Application Support
Application-aware disk backup (ability to recover data from disk backup)
Active Directory objects granular restore
Active Directory domain controller backup/restore
Microsoft Exchange database backup (including application-aware VM/machine backup)
Microsoft Exchange mailbox backup
Microsoft Exchange mail and attachment recovery
Microsoft Exchange cluster backup
Microsoft SQL Server database backup (including application-aware VM/machine backup)
Microsoft SQL Server cluster backup
Microsoft SharePoint objects restore
Microsoft SharePoint entire site backup/restore
Oracle DBMS backup
SAP HANA backup via scripts (non-certified)
Microsoft 365 Mail backup
Microsoft 365 SharePoint Online backup
Microsoft 365 OneDrive backup
Microsoft 365 Teams backup
Website backup
Plesk/cPanel backup
Variety of Backup Options
Archive encryption
Incremental/differential backups
Backup window (traffic throttling)
Multi-destination backup (backup replication)
Archive compression
Laptop-optimized backup scheduling
Initial seeding for cloud backups
Backup validation (checksums)
Retention rules
Backup notarization
Fast Recovery
Acronis offers a wide range of recovery methods including bare metal recovery, any-to-any migration, incremental restore, etc., all designed to ensure business continuity.
Web restore
Bare metal recovery (BMR)
BMR to dissimilar hardware (Universal restore), P2V, V2P, P2P, V2V
Incremental restore
Acronis Startup Recovery manager
Supported Virtualization Options
Run virtual machine (VM) from backup
VM replication with failover and failback (VMware)
Zero downtime finalization on production storage for Run VM (VMware)
Zero downtime finalization on production storage for Run VM (Hyper-V)
File/folder recovery from VM backup
Application-aware virtual backup (ability to recover data from VM backup)
Changed-blocks-tracking (CBT) support (VMware + Hyper-V)
Exclude disks/volumes from agentless VM backup
Exclude files from agentless VM backup
Disaster Recovery Add-on
Service providers can launch disaster recovery business easily with quick time to market, no CAPEX, and low total cost of ownership (TCO). Be equipped with features such as failover to a cloud recovery site, failback to a different virtual environment, failback to bare metal, runbooks automation, and many more.
Failover to a cloud recovery site
Non-disruptive failover testing in the cloud
Cloud servers for application-level replication
Failback to a different virtual environment
Failback to bare metal
Failover of physical machines to a cloud recovery site
Runbooks automation
Unmatched Storage Options
Acronis helps service providers meet client and regulatory requirements with unmatched storage options such as backup to the Acronis Cloud, public cloud, your own cloud storage, etc.
Backup to Acronis Cloud storage
Backup to local storage
Backup to service provider cloud storage
Backup to a public cloud (Azure, Google, etc.)
Software-defined storage by Acronis
Script-based location targeting
Backup deduplication
Intuitive, Scalable Management, and Monitoring
Group management
Shared protection plans
Centralized plan management
VMware virtual machine binding
Audit service
Mass update for agents
Predefined user roles: admin and user
Provisioning and management of users through Active Directory integration
Management of multiple company branches (set quota, delegate management, etc.)
On-premises and cloud IdPs (SCIM) support
Management server high availability
Dashboard configuration
Email notifications
Email notifications per plan
Licensing Options
Per-GB licensing model
Per-workload licensing model
Free GBs of Acronis Hosted cloud storage attached to certain workloads
Licensing Policy
Licensed per-GB
Not applicable
Licensed by the storage used
Licensed per-workload
Licensed by the number of protected workloads