Discover how Acronis outlines competitors with integrated cyber protection, ensuring unmatched security, backup, and recovery solutions.
Research by Kevin Reed, Acronis CISO; Alex Koshelev, Acronis Security Researcher; Ravikant Tiwari, Acronis Senior Security Researcher When a security manufacturer learns of critical vulnerabilities in their devices, there is an expectation they’ll act quickly to fix the problem. Yet August 2019 became the first of the many months when Acronis would patiently wait for an update (in vain, as it turns out) from one manufacturer in particular.
Launched in Britain almost two decades ago, Virus Bulletin is a world leader in security software testing. They award the VB100 certification to security products recognized by Virus Bulletin as legitimate and properly functioning anti-malware solutions. Acronis just joined the latest round of Virus Bulletin’s annual VB100 certification testing and achieved a perfect score—a 100% detection rate with zero false positives.
Around the world, IT has grown in importance for many years – and with the COVID-19 outbreak, it instantly became mission-critical. Almost overnight, it’s become impossible to get essential work done without a reliable remote workplace infrastructure. Today, every person and business depends on IT and reliable IT requires cyber protection. Now Acronis delivers Acronis Cyber Protect, a unique set of innovations that balance all five vectors to provide modern protection in an easy, efficient, and secure way. Easy and efficient protection is made possible due to the deep integration of technologies for data protection, security, and authenticity, and hybrid cloud architecture designed for privacy.
In this report from the Acronis Cyber Protection Operation Center (CPOC), we assess a recent spike in ransomware attacks and take a deep dive into how cybercriminals have adapted their techniques and technologies to profit from stolen data whether their ransom is paid or not. Learn more about how modern ransomware attacks infiltrate networks and sell the data they collect to the highest bidder on a growing number of data leak sites.