True Image 2020

The most reliable solution

It’s no accident that Acronis True Image has earned the reputation for being the most reliable personal solution available. Built on innovative, award-winning technologies that have been continuously tested, refined, and enhanced for more than 15 years, it delivers all of the tools, strategies, and infrastructure needed to protect all of your data – all of the time.

Recovering everything, every time

Why is Acronis True Image so reliable? Because we really care about your data, and continually enhance our product through testing, innovation, and support that no competitor can match. With more than 100 improvements included in the latest version, these processes ensure Acronis True Image is the most reliable personal backup solution available.

Secure Development Life Cycle

Acronis follows strict guidelines regarding product design, development, and security to make sure our solutions deliver exceptional, reliable quality.

Assured Data Recovery

Backups are only useful if they work, so we validate files to ensure they will work for a real recovery – running full image backups as VMs to be sure.

Rigorous QA Testing

Our redesigned testing architecture means Acronis products undergo twice as many quality assurance tests, covering more hardware and use cases.

Superior Customer Support

Acronis won’t abandon you. Technical support is available 24/7 to help with your recoveries, even if you have an expired license or outdated product.

Innovating to combat modern threats

The threats to your data continue to evolve. By harnessing cutting-edge technologies, we can ensure your files are safe, secure, authentic and ready to use when you need them.


Defeat ransomware with the only personal solution that features an integrated, AI-based defense that detects and terminates attacks in real time – on your computer, network share, or NAS device.

Cryptomining blocker

Keep online criminals from hijacking your computer to mine for cryptocurrencies. Preserve your system performance and save on internet and electricity bills with the only solution that stops cryptojacking.

Blockchain-based certification

Prevent anyone from tampering with the integrity of your backups. Timestamp and certify files, and enter those certificates in the Ethereum blockchain ledger to verify a file is authentic and unchanged.

Meeting modern data needs

Online threats, security breaches, misused customer info – no wonder people feel their data is exposed. Acronis believes you need more than just a copy of your data, which is why our solutions are designed to meet the five critical requirements of modern cyber protection.


Ensure that a reliable copy of your data is always available


Make your data easily available from anywhere at any time


Control who has visibility and access to your data


Have undeniable proof a copy is an exact replica of the original data


Protect your data, apps and systems against malicious threats

Ensuring data security at every step

Acronis takes safeguarding your data, apps, and systems seriously, which is why we strive to provide superior protection wherever your data is.

Protected Data Centers

Not only are Acronis’ data centers Tier-IV designed to ensure the availability of your data, they are built to provide superior privacy and security. Enterprise-grade AES-256 encryption of your data means only you can access it. Acronis data centers are physically defended 24/7 by security personnel, high fences, and video surveillance, and require biometric and key card access. Even the metadata communications between your machine and the Acronis Cloud is encrypted.

Security Operations Centers

Our data protection efforts also benefit from our global network of Acronis Cyber Security Operations Centers, which help the Acronis Security Team to stay on top of current threats by collecting and analyzing threat intelligence from different data protection environments. Armed with this intel, our engineers are better able to control the efficacy of our technologies, ensuring our solutions are able to prevent, detect, and respond to the latest risks.

Effective End-point Defenses

In addition to protecting data you send to Acronis, we bolster the defense on your device with our unique Acronis Active Protection technology – an artificial intelligence-based defense against ransomware and cryptomining malware attacks. This integrated solution monitors your system in real-time to detect, stop, and reverse the effects of unauthorized encryption. It is extremely effective, preventing more than 400,000 ransomware attacks last year.

Award-winning solution

Get Acronis True Image 2020

Works on multiple platforms

Microsoft Windows
  • Windows 10 (all editions, including November 2019 Update)
  • Windows 8.1 (all editions)
  • Windows 8 (all editions)
  • Windows 7 SP1 (all editions)
  • Windows Home Server 2011
Apple MacOS
  • macOS Catalina 10.15
  • macOS Mojave 10.14
  • macOS High Sierra 10.13
  • macOS Sierra 10.12
  • OS X El Capitan 10.11

Mobile Operating Systems

  • iOS 10.3 or later
  • Android 5.0 or later
File Systems (Windows)
  • NTFS
  • Ext2/Ext3/Ext4
  • ReiserFS(3)  
  • Linux SWAP  
  • HFS+/HFSX  
  • FAT16/32/exFAT  
File Systems (macOS)
  • APFS
  • HFS+
  • Core Storage
  • FAT32
  • NTFS (including Boot Camp)