Cyber Protect Cloud
Includes all features of Acronis Cyber Backup Cloud

Modernize your cybersecurity and backup with integrated cyber protection

What’s new

Acronis helps service providers deliver cyber protection in an easy, efficient, and secure way. With our monthly release cadence, you can deliver even more value to your customers with in-demand features and functionalities.

March 2021 Release

  • Acronis Cyber Cloud new licensing
    Acronis Cyber Cloud new licensing
    Leverage a set of essential cyber protection tools in Acronis Cyber Protect Cloud at no cost or in a pay-as-you-go model. Deliver optimum levels of cyber protection with our new advanced packs - Advanced Backup, Advanced Disaster Recovery, Advanced Security, and Advanced Management – which you can mix and match based on your clients’ needs.
  • Automated failback with near-zero downtime
    Automated failback with near-zero downtime
    Achieve best-in-class failback times, ensure business continuity, and safeguard your clients’ data by transferring it to the local site, while the virtual machine in the cloud is still running. Get information about the progress and estimated downtime, and plan the failback process accordingly.
  • Agentless backup and restore for Red Hat Virtualization
    Agentless backup and restore for Red Hat Virtualization
    Perform agentless backups and restores of Red Hat Virtualization (RHV) virtual machines and granular recovery of files and folders.
  • Support for Scale Computing HC3
    Support for Scale Computing HC3
    Protect even more workloads with full support for agentless backup and recovery of Scale Computing HC3 virtual machines.
  • Protection for macOS on ARM
    Protection for macOS on ARM
    Provide full protection for macOS on the newly released ARM CPU with Acronis Cyber Protect Cloud’s vulnerability assessments, patch management, antivirus and antimalware capabilities.
  • Integration with Kaseya VSA
    Integration with Kaseya VSA
    Centrally monitor and manage all of your workloads and alerts within the Kaseya VSA interface, including provisioning services, managing devices and protection plans, ticketing, reporting, etc.
Release notes

February 2021 Release

  • Data Loss Prevention (DLP) via device and port control
    Data Loss Prevention (DLP) via device and port control
    Strengthen data protection and prevent leaks of sensitive information via local physical and virtual workloads. Enforce context-aware controls over local data access and transfer operations on workloads, including clipboard operations.
  • Anti-malware for Linux
    Anti-malware for Linux
    Increase protection for your clients’ Linux-based environments. Anti-malware protection for Linux provides real-time protection and scheduled scans so that you can notify clients, and block and quarantine suspicious activity in real-time.
  • Support checks for updates via peer-to-peer
    Support checks for updates via peer-to-peer
    Maintain your clients’ system updates with ease. With peer-to-peer updates in Acronis Cyber Protect Cloud, as long as one agent is connected to the cloud, it will receive and share updates with other agents on the network. If this agent is down or not connected the rest of the agents will go to Acronis Cloud and will receive updates there – ensuring they are all up to date.
  • Bootable Media Builder
    Bootable Media Builder
    Recover clients’ data even faster with the bootable media builder, now available in Acronis Cyber Cloud. This enables you to easily create a customized Linux-based or Windows-based media that can be moved to USBs, ISO, or WIM without downloading any additional software – saving you time and resources.
  • IPsec multisite VPN support
    IPsec multisite VPN support
    Strengthen security with support of IPSec multisite VPN support. Available in Acronis Cyber Disaster Recovery Cloud, IPsec multisite VPN support integrates secure protocols and algorithms, so you can easily support clients with multiple sites that are hosting critical workloads with higher requirements for security, compliance, and bandwidth.
  • Custom DNS configuration
    Custom DNS configuration
    Provide flexibility by setting up your custom DNS configurations for the disaster recovery site in the Acronis cloud. This enables you to easily adjust DNS settings for your cloud servers, that are dependent on your own DNS services.
  • Enhanced security mode
    Enhanced security mode
    Provide even better security for your clients with enhanced security mode. This mode restricts data access for everyone but the data owner – it safeguards all backups by ensuring they are encrypted and the management console doesn’t store or archive any passwords.
  • Acronis Cyber Files Cloud for Android
    Acronis Cyber Files Cloud for Android
    Protect even more Android files with additional functionalities within Acronis Cyber Files – including localization support in Spanish. With this new software update, users can now take photos within the app, and provide an even better user experience with pdf files: improved speed, enhanced search performance, and more.
Release notes

January 2021 Release

  • Monitor all of your protected workloads
    Monitor all of your protected workloads
    Easily track the total number of workloads protected across all editions enabled within a specific partner, customer, folder, or unit.
  • Save time and effort on service quota management
    Save time and effort on service quota management
    Manage service quotas for multiple devices directly from the devices grid, instead of going through each device individually.
  • Gain clear visibility into hardware and software inventory changes
    Gain clear visibility into hardware and software inventory changes
    See what’s changed over a specific time period in your hardware and software inventory at a glance with new widgets.
  • Access all the system information you need in one place
    Access all the system information you need in one place
    Resolve customer issues faster with all required performance logs and system information, available in the management portal.
Release notes

December 2020 Release

  • Proactive AI-based Ransomware Protection for Linux
    Proactive AI-based Ransomware Protection for Linux
    Secure all data on Linux systems with real-time protection from ransomware. The AI-based Acronis Active Protection technology uses sophisticated analysis tools to recognize suspicious behavior and a wide variety of ransomware types, stopping their attack.
  • Acronis Cyber Notary Cloud e-signature API
    Acronis Cyber Notary Cloud e-signature API
    Customize, integrate, and extend your services with an advanced e-signature functionality that enables easy, efficient, and secure online signing of files with embeddable e-signatures, no matter where the files are stored.
  • Software and Hardware Inventory Collection
    Software and Hardware Inventory Collection
    Save time and effort with up-to-date software and hardware inventory information.
    Discover all software/hardware assets installed on customer machines through automatic or on-demand scans. In addition, you can browse and filter software/hardware assets by multiple criteria, easily generate inventory reports, and auto-delete records once a machine or tenant is removed.
Release notes

November 2020 Release

  • Agentless backup and restore for Virtuozzo Hybrid Server 7.5 virtual machines
    Agentless backup and restore for Virtuozzo Hybrid Server 7.5 virtual machines
    Now you can back up and restore Virtuozzo Hybrid Server 7.5 virtual machines and perform granular recovery of files and folders.
  • Support for VMware vSphere 7.0
    Support for VMware vSphere 7.0
    Acronis Cyber Cloud provides full support for agentless backup and recovery of virtual machines running on VMware vSphere 7.0.
  • New UX for Acronis Cyber Protect Monitor
    New UX for Acronis Cyber Protect Monitor
    The Acronis Cyber Protect Monitor is now enhanced with current protection status, date and time of the last backup, and more.
Release notes

October 2020 Release

  • Simplified and automated disaster recovery setup
    Simplified and automated disaster recovery setup
    Setting up a disaster recovery infrastructure has never been easier – just enable the disaster recovery functionality in a protection plan and a default infrastructure will be automatically set up based on the device’s CPU, RAM, and network configuration.
  • Support for macOS Big Sur
    Support for macOS Big Sur
    Acronis Cyber Cloud provides full support for the newest version of macOS Big Sur, set to be released this fall.
Release notes

September 2020 Release

  • Embeddable e-signatures
    Embeddable e-signatures
    Accelerate and automate the signature process while reducing costs with embeddable e-signatures and Ethereum-based blockchain notarization for them. In Acronis Cyber Notary Cloud, clients can easily execute every step of the document workflow – from creation, to sending the document to multiple signees – with an easy drag, drop, and sign feature.
  • Protection for Citrix Workspace
    Protection for Citrix Workspace
    Acronis Cyber Protect Cloud provides enhanced security for Citrix Workspace to proactively protect workspaces with vulnerability assessment, patch management, code injection prevention, and antimalware capabilities.
Release notes

August 2020 Release

  • Acronis Cyber Protect Essentials Edition
    Acronis Cyber Protect Essentials Edition
    Every workload is different, but every workload needs cyber protection – whether it stores business-critical data or nothing at all. With Acronis Cyber Protect Cloud Essentials Edition, you can protect workloads that don’t need to be backed up with bullet-proof cyber protection capabilities — antivirus and antimalware, URL filtering, vulnerability assessment, patch management, and remote desktop.
  • Exploit prevention
    Exploit prevention
    Until a patch is applied, your clients’ machines are vulnerable. With exploit prevention, you can stop and prevent attacks with memory protection, return-oriented programming protection, code injection protection, and privilege escalation protection.
  • URL filtering widget report
    URL filtering widget report
    Simplify administrative management with an easy to read URL filtering report. At a glance, you can see a static list of URL categories and the number of items that were detected in the defined period of time.
  • Read-only role for disaster recovery
    Read-only role for disaster recovery
    Enhance the security of your internal operations with a read-only role for Acronis Cyber Disaster Recovery Cloud. With this additional user permission, your technicians can monitor and manage the account without the permissions needed to make changes within accounts.
Release notes

July 2020 Release

  • #CyberFit Score
    #CyberFit Score
    This security assessment and scoring tool is now available to everyone as a standalone tool. It identifies the security gaps in an IT environment by looking at common threat vectors and provides detailed recommendations on how an organization can improve its security posture, safeguarding its systems against modern threats.
  • Microsoft Teams backup and recovery
    Microsoft Teams backup and recovery
    Backup and recover your clients’ entire Microsoft 365 Teams site and channels, including team mailboxes, meetings, and channel content. You can also perform full-text searches within channel conversations.
  • Enhanced URL filtering
    Enhanced URL filtering
    Help your clients manage employee productivity with URL filtering. Advanced categorization by website type allows you to choose which categories users have access to when browsing the web, ensuring they are more focused.
  • Assign users access permissions
    Assign users access permissions
    One of the best ways to secure data is to compartmentalize who has access to it and who has permissions to change it. We take a similar approach to our platform and now have read-only user permissions to help you better secure clients’ accounts within your organization.
  • Enhanced password strength policy
    Enhanced password strength policy
    Common or compromised passwords are an easy way for cybercriminals to access an account. New password precautions for the Acronis Cyber Cloud platform checks users’ passwords against top leaked and bad password databases, identifies company and user names, and leverages a password strength meter to encourage better password practices.
Release notes

Acronis Cyber Cloud 9.0 Update 2

  • Point-to-site remote VPN access
    Point-to-site remote VPN access
    With our new VPN feature, clients on DR-enabled tenants can establish a secure (L2 VPN) connection to the corporate network with their personal devices. This secure point-to-site connection allows clients to access files from the local site or the cloud so they can do their job without compromising the security of the network.
  • Updated patch management capabilities
    Updated patch management capabilities
    Software patches and updates are essential to securing a business environment. New customization capabilities in Acronis Cyber Protect Cloud enable you to postpone machine reboots until after backups are complete.
Release notes

Acronis Cyber Cloud 9.0 Update 1

  • #CyberFit Score
    #CyberFit Score
    This security assessment and scoring tool, available for Acronis Cyber Protect Cloud, identifies the security gaps in an IT environment by looking at common threat vectors and suggesting ways you can improve your #CyberFit score. By addressing these areas, you can improve your security posture and safeguard your system against modern threats.
  • Protection for Zoom, WebEx, and Microsoft Teams
    Protection for Zoom, WebEx, and Microsoft Teams
    Collaboration tools like WebEx and Zoom can help an organization become more efficient, but the problem is a lot of these tools are not secure. With Acronis Cyber Protect Cloud, you can actively protect these popular collaboration tools with antivirus and antimalware protection.
  • Remotely wipe devices
    Remotely wipe devices
    Instead of letting business-critical data get into the wrong hands, you can now remotely wipe compromised or missing Windows devices. Built into Acronis Cyber Protect Cloud, you can successfully prevent data from being deleted by disgruntled employees or being accessed from lost or stolen devices.
  • Remote desktop enhancements
    Remote desktop enhancements
    Employees working from home may need access to files or apps on their work machines, they might not have a configured VPN. Now you can share a secure link with end users so they can remotely access their machine.
  • Predefined protection plans
    Predefined protection plans
    Protect your clients’ remote and office workers quickly and easily by choosing one of three preconfigured protection plans. These options help you save time while ensuring you that your clients’ workloads and environments are protected.
  • Voice control for Acronis Cyber Protect
    Voice control for Acronis Cyber Protect
    Your personal safety and security are our top priority. Given the current environment, we want to enable you to help clients without needing to physically touch their machines. Voice control for Acronis Cyber Protect Cloud means you can now control the console hands-free.
Release notes

Cyber Protect Cloud

Includes all features of Acronis Cyber Backup Cloud

Modernize your cybersecurity and backup with integrated cyber protection