AcronisTrue Image 2019 Cyber Protection

Just Updated

The most reliable solution

It’s no accident that Acronis True Image has earned the reputation for being the most reliable personal solution available. Built on innovative, award-winning technologies that have been continuously tested, refined, and enhanced over the past 15 years, it delivers all of the tools, strategies, and infrastructure needed to protect all of your data – all of the time.

Recovering everything, every time

Why is Acronis True Image so reliable? Because we really care about your data, and therefore we continually enhance our product through testing, innovation, and support that no competitor can match. With more than 150 improvements included in the latest version, these processes ensure Acronis True Image is the most reliable personal backup solution available.

Secure Development Life Cycle

Acronis follows strict guidelines regarding product design, development, and security to make sure our solutions deliver exceptional, reliable quality.

Assured Data Recovery

Backups are only useful if they work, so we validate files to ensure they will work for a real recovery – running full image backups as VMs to be sure.

Rigorous QA Testing

Our redesigned testing architecture means Acronis products undergo twice as many quality assurance tests, covering more hardware and use cases.

Superior Customer Support

Acronis won’t abandon you. Technical support is available 24/7 to help with your recoveries, even if you have an expired license or outdated product.

Innovating to combat modern threats

The threats to your data continue to evolve. By harnessing cutting-edge technologies, we can ensure your files are safe, secure, and ready to use when you need them.


Defeat ransomware with the only personal solution that features an integrated, AI-based defense that detects and terminates attacks in real time – on your computer, network share, or NAS device.

Cryptomining blocker

Keep online criminals from hijacking your computer to mine for cryptocurrencies. Preserve your system performance and save on internet and electricity bills with the only solution that stops cryptojacking.

Blockchain-based certification

Prevent anyone from tampering with the integrity of your backups. Timestamp and certify files, and enter those certificates in the Ethereum blockchain ledger to verify a file is authentic and unchanged.

Meeting modern data needs

Online threats, security breaches, misused customer info – no wonder people feel their data is exposed. Acronis believes you need more than just a copy of your data, which is why our solutions are designed to meet the five critical requirements of modern cyber protection.


Ensuring that a reliable copy is always available


Making it easy for your data to be available from anywhere at anytime


Controlling visibility and access to your data


Providing an easy way to prove that a copy is an exact replica of the original


Protecting against threats and malicious agents

Ensuring data security at every step

Acronis takes safeguarding your data, apps, and systems seriously, which is why we strive to provide superior protection wherever your data is.

Protected Data Centers

Not only are Acronis’ data centers Tier-IV designed to ensure the availability of your data, they are built to provide superior privacy and security. Enterprise-grade AES-256 encryption of your data means only you can access it. Acronis data centers are physically defended 24/7 by security personnel, high fences, and video surveillance, and require biometric and key card access. Even the metadata communications between your machine and the Acronis Cloud is encrypted.

Security Operations Centers

Our data protection efforts also benefit from our global network of Acronis Cyber Security Operations Centers, which help the Acronis Security Team to stay on top of current threats by collecting and analyzing threat intelligence from different data protection environments. Armed with this intel, our engineers are better able to control the efficacy of our technologies, ensuring our solutions are able to prevent, detect, and respond to the latest risks.

Effective End-point Defenses

In addition to protecting data you send to Acronis, we bolster the defense on your device with our unique Acronis Active Protection technology – an artificial intelligence-based defense against ransomware and cryptomining malware attacks. This integrated solution monitors your system in real-time to detect, stop, and reverse the effects of unauthorized encryption. It is extremely effective, preventing more than 400,000 ransomware attacks in 2018.

Award-winning solution

Get Acronis True Image 2019

Works on multiple platforms

Microsoft Windows
  • Windows 10 (all editions, including October 2018 Update)
  • Windows 8.1 (all editions)
  • Windows 8 (all editions)
  • Windows 7 SP1 (all editions)
  • Windows Home Server 2011
  • Windows XP SP3 (32-bit)  
Apple macOS
  • macOS Mojave 10.14
  • macOS High Sierra 10.13
  • macOS Sierra 10.12
  • OS X El Capitan 10.11

Mobile Operating Systems

  • iOS 8.0 or later
  • Android 4.1 or later
File Systems (Windows)
  • NTFS
  • Ext2/Ext3/Ext4
  • ReiserFS(3)  
  • Linux SWAP  
  • HFS+/HFSX  
  • FAT16/32/exFAT  
File Systems (macOS)
  • APFS
  • HFS+
  • Core Storage
  • FAT32
  • NTFS (including Boot Camp)