Acronis helps service providers deliver cyber protection in an easy, efficient, and secure way. With our monthly release cadence, you can deliver even more value to your customers with in-demand features and functionalities.
Achieve best-in-class failback times, ensure business continuity, and safeguard your clients’ data by transferring it to the local site, while the virtual machine in the cloud is still running. Get information about the progress and estimated downtime, and plan the failback process accordingly.
Agentless backup and restore for Red Hat Virtualization
Perform agentless backups and restores of Red Hat Virtualization (RHV) virtual machines and granular recovery of files and folders.
Support for Scale Computing HC3
Protect even more workloads with full support for agentless backup and recovery of Scale Computing HC3 virtual machines.
Protection for macOS on ARM
Provide full protection for macOS on the newly released ARM CPU with Acronis Cyber Protect Cloud’s vulnerability assessments, patch management, antivirus and antimalware capabilities.
Integration with Kaseya VSA
Centrally monitor and manage all of your workloads and alerts within the Kaseya VSA interface, including provisioning services, managing devices and protection plans, ticketing, reporting, etc.
Data Loss Prevention (DLP) via device and port control
Strengthen data protection and prevent leaks of sensitive information via local physical and virtual workloads. Enforce context-aware controls over local data access and transfer operations on workloads, including clipboard operations.
Anti-malware for Linux
Increase protection for your clients’ Linux-based environments. Anti-malware protection for Linux provides real-time protection and scheduled scans so that you can notify clients, and block and quarantine suspicious activity in real-time.
Support checks for updates via peer-to-peer
Maintain your clients’ system updates with ease. With peer-to-peer updates in Acronis Cyber Protect Cloud, as long as one agent is connected to the cloud, it will receive and share updates with other agents on the network. If this agent is down or not connected the rest of the agents will go to Acronis Cloud and will receive updates there – ensuring they are all up to date.
Bootable Media Builder
Recover clients’ data even faster with the bootable media builder, now available in Acronis Cyber Cloud. This enables you to easily create a customized Linux-based or Windows-based media that can be moved to USBs, ISO, or WIM without downloading any additional software – saving you time and resources.
IPsec multisite VPN support
Strengthen security with support of IPSec multisite VPN support. Available in Acronis Cyber Disaster Recovery Cloud, IPsec multisite VPN support integrates secure protocols and algorithms, so you can easily support clients with multiple sites that are hosting critical workloads with higher requirements for security, compliance, and bandwidth.
Custom DNS configuration
Provide flexibility by setting up your custom DNS configurations for the disaster recovery site in the Acronis cloud. This enables you to easily adjust DNS settings for your cloud servers, that are dependent on your own DNS services.
Enhanced security mode
Provide even better security for your clients with enhanced security mode. This mode restricts data access for everyone but the data owner – it safeguards all backups by ensuring they are encrypted and the management console doesn’t store or archive any passwords.
Acronis Cyber Files Cloud for Android
Protect even more Android files with additional functionalities within Acronis Cyber Files – including localization support in Spanish. With this new software update, users can now take photos within the app, and provide an even better user experience with pdf files: improved speed, enhanced search performance, and more.
Proactive AI-based Ransomware Protection for Linux
Secure all data on Linux systems with real-time protection from ransomware. The AI-based Acronis Active Protection technology uses sophisticated analysis tools to recognize suspicious behavior and a wide variety of ransomware types, stopping their attack.
Acronis Cyber Notary Cloud e-signature API
Customize, integrate, and extend your services with an advanced e-signature functionality that enables easy, efficient, and secure online signing of files with embeddable e-signatures, no matter where the files are stored.
Software and Hardware Inventory Collection
Save time and effort with up-to-date software and hardware inventory information. Discover all software/hardware assets installed on customer machines through automatic or on-demand scans. In addition, you can browse and filter software/hardware assets by multiple criteria, easily generate inventory reports, and auto-delete records once a machine or tenant is removed.
Setting up a disaster recovery infrastructure has never been easier – just enable the disaster recovery functionality in a protection plan and a default infrastructure will be automatically set up based on the device’s CPU, RAM, and network configuration.
Support for macOS Big Sur
Acronis Cyber Cloud provides full support for the newest version of macOS Big Sur, set to be released this fall.
Accelerate and automate the signature process while reducing costs with embeddable e-signatures and Ethereum-based blockchain notarization for them. In Acronis Cyber Notary Cloud, clients can easily execute every step of the document workflow – from creation, to sending the document to multiple signees – with an easy drag, drop, and sign feature.
Protection for Citrix Workspace
Acronis Cyber Protect Cloud provides enhanced security for Citrix Workspace to proactively protect workspaces with vulnerability assessment, patch management, code injection prevention, and antimalware capabilities.
Every workload is different, but every workload needs cyber protection – whether it stores business-critical data or nothing at all. With Acronis Cyber Protect Cloud Essentials Edition, you can protect workloads that don’t need to be backed up with bullet-proof cyber protection capabilities — antivirus and antimalware, URL filtering, vulnerability assessment, patch management, and remote desktop.
Until a patch is applied, your clients’ machines are vulnerable. With exploit prevention, you can stop and prevent attacks with memory protection, return-oriented programming protection, code injection protection, and privilege escalation protection.
URL filtering widget report
Simplify administrative management with an easy to read URL filtering report. At a glance, you can see a static list of URL categories and the number of items that were detected in the defined period of time.
Read-only role for disaster recovery
Enhance the security of your internal operations with a read-only role for Acronis Cyber Disaster Recovery Cloud. With this additional user permission, your technicians can monitor and manage the account without the permissions needed to make changes within accounts.
This security assessment and scoring tool is now available to everyone as a standalone tool. It identifies the security gaps in an IT environment by looking at common threat vectors and provides detailed recommendations on how an organization can improve its security posture, safeguarding its systems against modern threats.
Microsoft Teams backup and recovery
Backup and recover your clients’ entire Microsoft 365 Teams site and channels, including team mailboxes, meetings, and channel content. You can also perform full-text searches within channel conversations.
Enhanced URL filtering
Help your clients manage employee productivity with URL filtering. Advanced categorization by website type allows you to choose which categories users have access to when browsing the web, ensuring they are more focused.
Assign users access permissions
One of the best ways to secure data is to compartmentalize who has access to it and who has permissions to change it. We take a similar approach to our platform and now have read-only user permissions to help you better secure clients’ accounts within your organization.
Enhanced password strength policy
Common or compromised passwords are an easy way for cybercriminals to access an account. New password precautions for the Acronis Cyber Cloud platform checks users’ passwords against top leaked and bad password databases, identifies company and user names, and leverages a password strength meter to encourage better password practices.
With our new VPN feature, clients on DR-enabled tenants can establish a secure (L2 VPN) connection to the corporate network with their personal devices. This secure point-to-site connection allows clients to access files from the local site or the cloud so they can do their job without compromising the security of the network.
Updated patch management capabilities
Software patches and updates are essential to securing a business environment. New customization capabilities in Acronis Cyber Protect Cloud enable you to postpone machine reboots until after backups are complete.
This security assessment and scoring tool, available for Acronis Cyber Protect Cloud, identifies the security gaps in an IT environment by looking at common threat vectors and suggesting ways you can improve your #CyberFit score. By addressing these areas, you can improve your security posture and safeguard your system against modern threats.
Protection for Zoom, WebEx, and Microsoft Teams
Collaboration tools like WebEx and Zoom can help an organization become more efficient, but the problem is a lot of these tools are not secure. With Acronis Cyber Protect Cloud, you can actively protect these popular collaboration tools with antivirus and antimalware protection.
Remotely wipe devices
Instead of letting business-critical data get into the wrong hands, you can now remotely wipe compromised or missing Windows devices. Built into Acronis Cyber Protect Cloud, you can successfully prevent data from being deleted by disgruntled employees or being accessed from lost or stolen devices.
Remote desktop enhancements
Employees working from home may need access to files or apps on their work machines, they might not have a configured VPN. Now you can share a secure link with end users so they can remotely access their machine.
Predefined protection plans
Protect your clients’ remote and office workers quickly and easily by choosing one of three preconfigured protection plans. These options help you save time while ensuring you that your clients’ workloads and environments are protected.
Voice control for Acronis Cyber Protect
Your personal safety and security are our top priority. Given the current environment, we want to enable you to help clients without needing to physically touch their machines. Voice control for Acronis Cyber Protect Cloud means you can now control the console hands-free.