Below is a list of previously released product features.
To view the most recent list of releases, link here.

December 2022 Release

  • Advanced Security + EDR Early Access
    Advanced Security + EDR Early Access
    Acronis Advanced Security + EDR is the market’s first MSP-class EDR product that enables partners to protect clients against advanced threats like zero days or hacking. Providers can rapidly turn on and scale the service to DETECT, analyze, and RESPOND to advanced attacks that sneak past other endpoint defenses with minimal effort, and with pre-integrated IDENTIFY, PROTECT and RECOVER capabilities, you can achieve true continuity. Early Access is coming in the following weeks, so hurry up and request now for a chance to be one of the first to try it out.
  • Advanced DLP: Customize sensitive data detection in DLP rules by file types
    Advanced DLP: Customize sensitive data detection in DLP rules by file types
    With the December update, partners gain more granular control of DLP rules and reduce the risk of sensitive data leakage on client endpoints by customizing the DLP policy with rules that prevent unauthorized transfers of specific sensitive file types. We’re committed to further developing our capabilities for customizing sensitive data detection as partners show considerable interest in such functionalities.
  • New agent for Synology NAS backup
    New agent for Synology NAS backup
    Reduce operational costs by removing the need for a dedicated server that will enable NAS backup. The new agent enables you to get improved performance by accessing the data from NAS shares locally, instead of reading it over the network via SMB.
  • Advanced Management: New remote desktop and assistance
    Advanced Management: New remote desktop and assistance
    Increase the efficiency of IT technicians and save time and resources from having to travel on-site with an easy to use, single application for seamless access and support for Windows, macOS, and Linux workloads.
  • Compliance mode for immutable storage
    Compliance mode for immutable storage
    Ensure client backups do not get lost and can easily be recovered in the case of a malware attack, accidental deletion, or malicious deletion by a rogue administrator. Once the compliance mode is enabled, the immutable storage cannot be disabled.
  • Automated test failover
    Automated test failover
    Save time and effort with a simplified, automated test failover. With the Advanced Disaster recovery pack, you can perform automated test failover for any server on a monthly basis, giving you the confidence that you can recover quickly and successfully.
  • Provision N-able N-sight RMM 2.0 customer tenants in Acronis Cyber Protect Cloud
    Provision N-able N-sight RMM 2.0 customer tenants in Acronis Cyber Protect Cloud
    Emerging service providers using N-able N-sight RMM to monitor and manage customer workloads will be able to reduce the cost and fasten the speed of onboarding customers by easily provisioning tenants as new customer tenants in Acronis or mapping to existing Acronis customer tenants. To streamline the process, partners are able to configure automatic tenant provisioning and deprovisioning.
  • Advanced Email Security: Increased visibility of the scope of protected email users
    Advanced Email Security: Increased visibility of the scope of protected email users
    In December, we’re updating Advanced Email Security’s dashboard to show a detailed view of all protected email users per client. The update will enable partners to easily verify newly protected mailboxes and report on the protection scope on a per-client basis with the goal to also reduce billing-related support tickets.
  • Secure sharing of confidential files and folders with external users
    Secure sharing of confidential files and folders with external users
    Get more flexibility and improved security with the ability to share files and folders with external users and enable them to access and preview the shared content, but also disabling the option to download the content.
  • In-product maintenance notifications
    In-product maintenance notifications
    Stay informed about potential service issues, maintenance in progress and upcoming maintenance events.
  • Recovery of deleted accounts
    Recovery of deleted accounts
    Reduce the risk of revenue loss, client churn, reputational damage, legal expenses and fines in the case of an unwanted data deletion caused by accidental data deletion, accidental service de-provisioning, a glitch in partner’s integration, malicious impact, and more.
  • Advanced Email Security: Improved technical documentation
    Advanced Email Security: Improved technical documentation
    We have updated the technical documentation for onboarding technical staff and for configuring Advanced Email Security to introduce a centralized documentation space that is accessible in-product, improving its facility and accessibility.

November 2022 Release

  • MI-assisted backup validation via boot screenshot analysis
    MI-assisted backup validation via boot screenshot analysis
    Ensure consistency and recoverability of backups with MI-assisted validation via boot screenshot analysis. The screenshots are auto-analyzed by an AI / MI engine, eliminating the need for any user interaction.
  • Simplified workload registration
    Simplified workload registration
    Now you can register workloads directly from the partner account — eliminating the need to log in with customer administrator credentials to register workloads in Acronis Cyber Protect Cloud.
  • New integration with HaloPSA
    New integration with HaloPSA
    The new HaloPSA integration enables you to save time and reduce efforts by automating various customer management tasks, including tenant and product provisioning, ticket resolution, and usage reporting and billing.

October 2022 Release

  • Extended protection for Microsoft 365 OneNote
    Extended protection for Microsoft 365 OneNote
    Recover Microsoft 365 OneNote notebooks quickly and easily directly into the Microsoft 365 account.
  • macOS 13 Ventura support
    macOS 13 Ventura support
    Now you can protect macOS 13 Ventura workloads with Acronis Cyber Protect Cloud.
  • Integration with ConnectWise Asio platform
    Integration with ConnectWise Asio platform
    Acronis Cyber Protect Cloud is now fully integrated with ConnectWise Asio – the new unified IT management platform for MSPs, evolving from the existing ConnectWise Command platform.
  • Acronis Cyber Files Cloud: public links to a folder
    Acronis Cyber Files Cloud: public links to a folder
    Enable users to create a direct link to a folder and share files with external users.
    The flexible configuration allows setting up different parameters for the public link, such as expiration date and different access permissions (view only or view and download).

September 2022 Release

  • Effortlessly protect clients’ sensitive data against leakage with Advanced DLP General Availability
    Effortlessly protect clients’ sensitive data against leakage with Advanced DLP General Availability
    Drawing from our vast experience enabling service providers and decades of innovation in data protection, we’re now extending Acronis Cyber Protect Cloud’s capabilities to protect sensitive data against unauthorized exfiltration. Launch a data loss prevention (DLP) service to protect clients’ sensitive data against leakage and strengthen compliance. Minimize effort and cost to value, aided by behavior-based DLP policy creation and extension, thereby unlocking unique simplification and scalability to boost profits.
  • Advanced Security: Firewall management for Microsoft Defender
    Advanced Security: Firewall management for Microsoft Defender
    Reduce the attack surface of a client workload by enabling Microsoft Defender Firewall in the protection plan. Receive prompt alerts in case unintended tampering of the firewall settings occurs, e.g., the firewall is accidentally turned off. Benefit from the recently launched Cyber Scripting functionality in the Advanced Management pack to effortlessly configure Microsoft Defender Firewall on your managed devices.
  • Advanced Email Security: Improved license usage measuring
    Advanced Email Security: Improved license usage measuring
    Maximize billing accuracy and predictability with standardized license usage measuring methods for the Advanced Email Security pack. Manually adjust and manage licenses in cases where the auto-measuring method is not applicable, e.g., protecting a portion of the users within a domain only. Eliminate the need to contact support every time a license usage needs to be adjusted.
  • Acronis Cyber Files Cloud: Fast and efficient local synchronization
    Acronis Cyber Files Cloud: Fast and efficient local synchronization
    Downloading the entirety of your data from the cloud is no longer required when moving or copying local files and folders with Acronis Cyber Files Cloud. Changes in clients’ files and folders are directly synchronized on the local machine, thus increasing bandwidth, and saving time and system resources.
  • Acronis Cyber Files Cloud available in Turkish
    Acronis Cyber Files Cloud available in Turkish
    Provide a higher quality experience for your clients, increase usability, and gain more convenience while working with Acronis Cyber Files Cloud. The user interface is now available in Turkish, making it the fifteenth supported language by the product.
  • Unified integrations catalog in Acronis’ console and website
    Unified integrations catalog in Acronis’ console and website
    The ISV integrations list has been redesigned to improve consistency and provide the same user experience whether you’re accessing the Acronis website or the Management portal. Benefit from a single, unified list of integrations with simultaneous content updates.

August 2022 Release

  • Advanced Email Security: Detect, prevent, and mitigate account takeover (ATO) for Microsoft 365
    Advanced Email Security: Detect, prevent, and mitigate account takeover (ATO) for Microsoft 365
    Advanced Email Security is now able to intercept account takeover attempts at any stage — ready to detect, prevent, and rapidly respond. Your clients are better protected against ATO by preventing attackers from phishing credentials; constant monitoring of email accounts for anomalies suggesting a compromise;; and ensuring fast remediation and account containment by the incident response team in case of account takeover.
  • Advanced Email Security: Enhance compliance and monitoring capabilities with the audit log
    Advanced Email Security: Enhance compliance and monitoring capabilities with the audit log
    Enable auditing and investigation of any incident with visibility into all actions performed by admin users and the incident response team with a comprehensive audit log.
  • Advanced Email Security: User interface available in additional languages
    Advanced Email Security: User interface available in additional languages
    The Advanced Email Security management console UI is now available in your preferred language — English, or newly added Spanish, German, French, Italian and Portuguese.
  • Advanced Email Security: Chat with the Incident Response team in the management console
    Advanced Email Security: Chat with the Incident Response team in the management console
    Ensure you’ll receive an even swifter response on email security issues. Rapidly reach the Advanced Email Security incident response team and chat with support — directly in the Advanced Email Security management console.
  • Extend anti-malware protection for Macs with Apple M1/M2 CPUs
    Extend anti-malware protection for Macs with Apple M1/M2 CPUs
    Expand anti-malware protection of macOS workloads with Apple M1/M2 CPUs (on top of already-supported Intel CPUs), against new and unknown threats with the extended support of our behavior engine leveraging advanced heuristics.
  • Benefit from Microsoft 365 licensing improvements for blocked seats
    Benefit from Microsoft 365 licensing improvements for blocked seats
    From August, 2022 onward, Acronis will not charge for blocked seats (i.e., inability to log into Microsoft 365) with access to the protected SharePoint Online site and / or Teams, in case their OneDrive and / or mailbox are not protected.
  • AppDirect Integration: Scale your business opportunities with pay-as-you-go billing
    AppDirect Integration: Scale your business opportunities with pay-as-you-go billing
    Partners that leverage the AppDirect Integration are able to answer the dynamic needs of their clients and implement new pricing models to sell the Acronis Cyber Protect Cloud and advanced packs with flexible usage-based billing – per-GB or per workload. Usage reports will be automatically uploaded to AppDirect at the end of each month, triggering billing in the client’s account and will be provided to partners as an accurate account statement reflecting what was consumed during the period.
  • ConnectWise Manage integration: Effortlessly report on billable and nonbillable storage usage
    ConnectWise Manage integration: Effortlessly report on billable and nonbillable storage usage
    Partners are now able to separately report and bill their clients on storage that is billable or nonbillable (e.g., storage included in Microsoft 365 protection) from Acronis. This update allows partners to not bill their customers for storage that is not billed by Acronis, and enables service providers to add the free storage as a separate line item on invoices to clients.
  • Acronis Cyber Files: Synchronize bookmarked folders across all iOS devices
    Acronis Cyber Files: Synchronize bookmarked folders across all iOS devices
    The Acronis Cyber Files mobile application allows users to bookmark frequently-used folders, so that users can navigate to folders faster. With the August, 2022 update, bookmarks are synchronized across all iOS devices. If a user creates, renames or deletes a bookmark on one device, his bookmarks will be available to him when he logs in to the Acronis Cyber Files mobile application on a different iOS device.

July 2022 Release

  • Protect VMware ESXi 7.0 workloads with Advanced Disaster Recovery
    Protect VMware ESXi 7.0 workloads with Advanced Disaster Recovery
    Extend your disaster recovery protection to VMware ESXi 7.0 workloads that are backed up agentless.
  • Advanced Email Security: localized user interface
    Advanced Email Security: localized user interface
    Get more value and convenience by using the user interface in your preferred language.
    Spanish is already available, and more to follow!
  • Enable end users to request and obtain files quickly and securely
    Enable end users to request and obtain files quickly and securely
    The files upload request gives end users a fast and secure way to request and obtain files from anyone, with all files being automatically organized into a user folder. Using an easy, drag-and-drop graphic interface, the file upload request enables end users to securely upload files without being added as a guest user or having access to the particular user account.

June 2022 Release

  • Automate routine tasks with Cyber Scripting
    Spotlight
    Automate routine tasks with Cyber Scripting
    Advanced Management pack got a major update, now supporting the management and execution of custom pre-approved Powershell/Bash scripts on remote Windows and Mac machines.
    Increase the efficiency of your MSP technicians by automating provisioning, software and user management, network configuration, system maintenance, and other routine tasks to handle more workloads with less efforts. Streamline your operations and minimize human errors. Have complete visibility into script operations with monitoring capability. Leverage a library of Acronis-verified scripts that can run on any machine group. Fine-tune script tasks and create custom scripts that you can run on-demand, on-schedule, or when start conditions are met – based on your and your clients needs.
  • Manage multiple clients on the partner level
    Manage multiple clients on the partner level
    Streamline your operations for multiple clients, including scripting management and alerts and activities monitoring. Simply select the new “All customers” tab to centrally manage all of your direct clients in the Cyber Protection Console – monitor all services and manage workloads on a partner level. With centralized management you can manage your scripts and execute them across all end-clients, dedicated end-clients, individual workloads and static or dynamic groups of workloads.
  • Recover workloads quickly and effortlessly with One Click Recovery
    Recover workloads quickly and effortlessly with One Click Recovery
    Eliminate the IT bottlenecks requiring high-skilled IT personal for workload recovery and save time and money reducing the downtime in case of attacks and large-scale incidents. Empower end-users to rapidly recover their workloads by enabling them to start an automated recovery with a single click. The One Click Recovery can be enabled in the protection plan.
  • Backup and download Microsoft OneNote files
    Backup and download Microsoft OneNote files
    Protect Microsoft OneNotes files from being lost by backing them up as part of the Microsoft OneDrive and Microsoft SharePoint Online backup process. Additionally, end clients can download the Microsoft OneNote notebooks locally.
  • Recover emails to PST format, even without Outlook
    Recover emails to PST format, even without Outlook
    Minimize the chance of clients not having their in-mail data available by enabling local recovery of emails as PST files even when Microsoft 365 is unavailable.
  • Backup and recover web-hosted servers managed via DirectAdmin
    Backup and recover web-hosted servers managed via DirectAdmin
    Leverage application-consistent backups of web-hosted servers managed via the DirectAdmin application to enable rapid recovery of the entire server in case of a disaster or to granularly restore individual web-hosting accounts, files, databases, websites, and mailboxes. Enable self-service as an option for web hosting end-clients.
  • Advanced DLP: Encrypted removable storage support
    Advanced DLP: Encrypted removable storage support
    Better protect clients data and help them comply with regulations by neutralizing the risks of sensitive data leaving your clients workloads via unencrypted removable storage devices (e.g. USB flash drives). Advanced DLP can now detect encrypted removable storage devices and allow data transfers only to them.
  • Effortlessly manage wildcard SSL certificates for branded URLs.
    Effortlessly manage wildcard SSL certificates for branded URLs.
    Minimize maintenance efforts and costs for your business with free-of-charge, automatically-renewed SSL certificates by Let’s Encrypt certificate authority. Additionally, you will be notified in advance about the expiration of certificates by other authorities and can renew them in the Cyber Protection Console.
  • Enable maintenance notifications for partners and clients
    Enable maintenance notifications for partners and clients
    Provide your partners and clients with greater visibility into maintenance work in Acronis data centers by setting up automatic notifications via email per tenant. Tenant administrators where the Acronis maintenance notifications are enabled can subscribe their users for the email.
  • Effortlessly manage service and bill usage of a tenant level in ConnectWise Manage integration
    Effortlessly manage service and bill usage of a tenant level in ConnectWise Manage integration
    Partners who resell Acronis services to other partners or MSPs that serve larger clients with multiple tenants can now manage their services and bill usage using the ConnectWise Manage integration to map Acronis partner tenants to ConnectWise Manage accounts.
  • Enable or disable ticket synchronization for Kaseya VSA integration
    Enable or disable ticket synchronization for Kaseya VSA integration
    Partners who do not use Kaseya VSA for ticketing, can now effortlessly switch off ticket synchronization between Acronis Cyber Protect Cloud and Kaseya VSA either during tenant provisioning or in the organization settings.
  • Increase awareness with datacenter status and services availability portal
    Increase awareness with datacenter status and services availability portal
    The new datacenter status page, available both in Acronis Cyber Protect Cloud and the Partner Portal, provides a self-service where partners can check services status and upcoming maintenance schedule. This update will strengthen the communication between partners and the Acronis Support team.

May 2022 Release

  • Chat with an Acronis account manager in the management portal
    Chat with an Acronis account manager in the management portal
    Consult with an Acronis account manager about planning, launching and scaling your services with us directly in the Cyber Protect console via chat window. This functionality will be available in all data centers, except partner-owned ones, and only for partners that do not use complete white labeling.
  • Centralize your visibility across cyber protection alerts, including for malicious email detections
    Centralize your visibility across cyber protection alerts, including for malicious email detections
    Prevent potential damage by promptly reacting to malicious email detection alerts in the Cyber Protect console. Demonstrate your email security service value to clients with consolidated statistics on detected malicious emails in the overview dashboard.
  • Automate email security service provisioning for Microsoft 365
    Automate email security service provisioning for Microsoft 365
    Simplify the initial configuration process and speed-up service provisioning by running a ready-to-use script to automatically set up routing between Microsoft 365 and Advanced Email Security.
  • Leverage multiple configuration improvements in the ConnectWise Manage integration
    Leverage multiple configuration improvements in the ConnectWise Manage integration
    Partners can manually trigger the synchronization of usage and quotas for one or more client tenants between Acronis and ConnectWise Manage. Usage is now reported more accurately to ConnectWise Manage, using float point quantities where applicable.
  • Auto-generate product names in mapping wizard for Kaseya BMS and Tigerpaw PSA integrations
    Auto-generate product names in mapping wizard for Kaseya BMS and Tigerpaw PSA integrations
    Acronis Cyber Protect Cloud automatically generates suggested names for new PSA products, using a predictable and understandable naming pattern that simplifies the process of mapping products to Kaseya BMS and Tigerpaw PSA integrations.

April 2022 Release

  • Start planning your service upgrade. Get early access to Advanced DLP, designed for MSPs
    Start planning your service upgrade. Get early access to Advanced DLP, designed for MSPs
    Experience the only data loss prevention (DLP) solution designed for MSPs to prevent leakage of clients’ sensitive data with automatic client-specific policy creation, which eliminates complexity and costs associated with enterprise DLPs. Start planning your service upgrade now to boost profits and reduce security risks for clients with early access to Advanced DLP — at no additional cost.
  • Define your company contacts to receive role-specific updates from Acronis with the new ‘Partner profile’ option
    Define your company contacts to receive role-specific updates from Acronis with the new ‘Partner profile’ option
    Keep your company-related information up-to-date and define which of your company contacts should receive billing, business and / or technical updates from Acronis with the new ‘Partner profile’ tab. Ensure your team only receives information relevant to their specific role.
  • Enable sharing of files and folders with external users via Acronis Files Cloud
    Enable sharing of files and folders with external users via Acronis Files Cloud
    The new “guest user” role empowers Acronis Files Cloud users to share files and folders with external users identified by their email addresses. For repetitive contacts, this an easy alternative to public link sharing that will save time and make the process safer and easily auditable.
  • Reduce service delivery complexity when using both Acronis Cyber Protect Cloud and Splashtop
    Reduce service delivery complexity when using both Acronis Cyber Protect Cloud and Splashtop
    Eliminate the need to manually switch between the Acronis Cyber Protect Cloud and Splashtop consoles. Their native integration enables you to open a remote session to manage devices with the Splashtop Streamer agent directly from the Acronis Cyber Protect Cloud console.
  • Manage macOS and Linux workloads via Kaseya VSA integration
    Manage macOS and Linux workloads via Kaseya VSA integration
    Enable mass deployment of Acronis’ Cyber Protect Cloud agent, manage protection plans, and monitor protection status for macOS and Linux workloads — together with existing support for Windows from within Kaseya VSA.
  • Benefit from an improved Advanced Email Security visual experience
    Benefit from an improved Advanced Email Security visual experience
    The Advanced Email Security’s management console, accessible via Acronis Cyber Protect Cloud’s console through a single sign-on (SSO), has been updated with an Acronis look and feel, enabling administrators to maintain the Acronis console’s visual experience.

March 2022 Release

  • Failover Azure VMs to Acronis Cyber Protect Cloud
    Failover Azure VMs to Acronis Cyber Protect Cloud
    Enable enhanced protection against Azure cloud outages while utilizing the public cloud. Benefit from the predictable and simple monthly billing that Acronis provides, unlike the billing of native Azure disaster recovery tools — Acronis MSP partners are billed only for storage and not for outbound network traffic consumption and / or hot disk usage.
  • Provide anti-malware services for Apple M1 ARM-based workloads
    Provide anti-malware services for Apple M1 ARM-based workloads
    Protect and manage all Mac-based devices for clients, regardless of the hardware inside. With Acronis, you can now extend your anti-malware services to the ever-growing market of Mac devices based on M1 ARM-based chips.
  • Effortlessly recover workloads protected by BitLocker
    Effortlessly recover workloads protected by BitLocker
    Leverage a streamlined, intuitive process for the recovery of BitLocker-protected workloads. Recover disks, volumes and files encrypted by BitLocker with the ease you recover unencrypted ones — without the need to reboot or take any additional steps.
  • Get visibility and report on usage for trial tenants in Autotask PSA and ConnectWise Manage
    Get visibility and report on usage for trial tenants in Autotask PSA and ConnectWise Manage
    Enable reporting on usage for trial tenants by empowering service technicians to set up a pay-as-you-go (PAYG) or prepaid option with overage billing models. This enhances the capability to provision clients as trial tenants, which was introduced in this past February’s update.

February 2022 Release

  • Reduce deployment time with a single, unified Acronis Cyber Files Cloud and Acronis Cyber Protect Cloud agent
    Reduce deployment time with a single, unified Acronis Cyber Files Cloud and Acronis Cyber Protect Cloud agent
    Ensure fast, hassle-free deployment and consolidated agent updates – the file sync and share functionality is now fully integrated into Acronis’ cyber protection agent. This enhancement improves efficiency with fewer system resources used. Plus, by removing silos, you’re empowered with cohesive, easy to deliver services.
  • Extend Acronis Cyber Files Cloud support to iOS 15
    Extend Acronis Cyber Files Cloud support to iOS 15
    Enable secure collaboration and uninterrupted data access to file sync and share users who are leveraging the latest iOS version on their mobile devices.
  • Meet your clients’ privacy requirements with a new Admin role in Acronis Cyber Files Cloud
    Meet your clients’ privacy requirements with a new Admin role in Acronis Cyber Files Cloud
    Manage file sync and share settings without accessing clients’ sensitive data. A new Admin role enables administrators to respond to clients’ privacy and compliance restrictions with ease.
  • Preserve revisions and links when moving files and folders in Acronis Cyber Files Cloud
    Preserve revisions and links when moving files and folders in Acronis Cyber Files Cloud
    Improve the file sync and share user experience for clients – users no longer need to re-share links when moving or copying files and folders.
  • Enable usage of custom DHCP with L2 site-to-site VPN connectivity
    Enable usage of custom DHCP with L2 site-to-site VPN connectivity
    Unlock more failover scenarios in Advanced Disaster Recovery. Simply enable clients to use their own DHCP server when one or more servers are in failover on Acronis Cloud, and DHCP traffic is sent via an L2 Site-to-site VPN tunnel.
  • Support failover from immutable recovery points in Advanced Disaster Recovery
    Support failover from immutable recovery points in Advanced Disaster Recovery
    Mitigate malicious or accidental deletion of recovery points by protecting them with immutable storage. Engaging this functionality allows you to initiate failover to Acronis Cloud from a deleted recovery point – whether during regular testing or given a real disaster.
  • Empower clients with self-service anti-malware scanning of files, folders and drives
    Empower clients with self-service anti-malware scanning of files, folders and drives
    Allow clients to perform on-demand anti-malware scans of any file, folder and / or drive on their workstations. Manual anti-malware scanning is supported on Windows, Linux and macOS.
  • Gain more granular control over ransomware protection settings
    Gain more granular control over ransomware protection settings
    Configure your clients’ ransomware protection preferences with ease. Administrators can now choose whether to separately enable ransomware protection, self-protection and cryptomining-process detection.
  • Start a free 30-day trial for ConnectWise Manage and Autotask PSA integrations
    Start a free 30-day trial for ConnectWise Manage and Autotask PSA integrations
    Provision new customer tenants as trial accounts and give them full access to Acronis Cyber Protect Cloud’s seamless integrations with ConnectWise Manage and Autotask PSA. Manually switch them to production or wait for the automatic upgrade when the trial period ends.

January 2022 Release

  • Bring your corporate style to the agent installer and tray monitor
    Bring your corporate style to the agent installer and tray monitor
    Customize the Acronis Cyber Protect Cloud Windows and Mac agent installers and tray monitor with your corporate style. The new branding capabilities include agent installer file name and logo, agent name, tray monitor name and color schemes for both the agent installer and the tray monitor.
  • Provide administrators with recommendations based on disk and ransomware alerts
    Provide administrators with recommendations based on disk and ransomware alerts
    Administrators will be provided with additional context on the steps they can take to reduce the risks related to ransomware and disk alerts. Ransomware alerts will signal administrators to activate anti-malware protection to limit the attack surface. Disk alerts advise when to turn on continuous data protection (CDP) to achieve near-zero RPOs on critical data.
  • Increase visibility into the disaster recovery protection status of workloads
    Increase visibility into the disaster recovery protection status of workloads
    See which workloads are protected with disaster recovery services right from the list of all workloads and receive accessible in-product information on how to enable disaster recovery for a workload.
  • Ensure disaster recovery failover from a malware-free recovery point
    Ensure disaster recovery failover from a malware-free recovery point
    When starting a disaster recovery failover, administrators will be able to see indicators of recovery points infected by malware to ensure a faster return to productivity and a better response to threats.
  • Know when the disaster recovery compute points quota is exceeded
    Know when the disaster recovery compute points quota is exceeded
    When service provider administrators are selecting a primary server to be powered on that exceeds the quota for disaster recovery compute points, they will be provided with an in-product notification that the quota is exceeded and that they need to contact the Acronis support team.
  • Report on recently affected workloads
    Report on recently affected workloads
    Service providers will benefit from new dashboard widgets showing recently affected workloads within the last 200 days along with the threat that impacted them.
  • Acronis Cyber Files Cloud: Extending support to Android 12
    Acronis Cyber Files Cloud: Extending support to Android 12
    Allow data access via secure file sync and share services to users with mobile devices running on Android 12, strengthening data availability and protection across your clients’ organizations.

December 2021 Release

  • Protect backups from data deletion with immutable storage
    Protect backups from data deletion with immutable storage
    Strengthen regulatory compliance by preventing accidental or malicious deletion of clients’ backups. Simply configure the number of days that deleted data should be retained – even if your clients’ workloads are compromised. Deleted data can be recovered via the Acronis Cyber Protect Cloud console.
  • Extend data protection services to MariaDB and MySQL databases with Advanced Backup
    Extend data protection services to MariaDB and MySQL databases with Advanced Backup
    Protect clients’ data across more workloads. Acronis collects metadata for each database running on it while the entire workload is backed up. This means you can browse databases and/or fully or granularly recover data and tables without recovering the entire workload.
  • Unlock broader failover control and more failover scenarios for licensed applications
    Unlock broader failover control and more failover scenarios for licensed applications
    Gain more control over network configurations and IP address leases by running your own DHCP service on a recovery server during failover or test failover. For example, you can edit the MAC address of primary and recovery servers so they can run applications bound to MAC addresses.
  • Automate updates to Acronis-Autotask PSA contracts
    Automate updates to Acronis-Autotask PSA contracts
    Synchronize all changes made in the Acronis Cyber Protect Cloud management console with Autotask PSA contracts, and vice versa. You can assign cyber protection plans to new workloads without waiting for manual updates in the Autotask PSA contracts, and without waiting for the migration of tenants to new billing modes. All changes are reflected immediately.
  • Enhance your file sync and share service with unified iOS applications
    Enhance your file sync and share service with unified iOS applications
    Deliver a better client user experience with the unification of the Acronis Cyber Files Cloud application for iOS and the Acronis Cyber Files on-premises application. This approach not only makes it easier for a client to correctly select an application for file sync and share but also enables simultaneous product updates and improvements.
  • Improve clients’ visibility and control over the notarization process
    Improve clients’ visibility and control over the notarization process
    Elevate client insight into any notarization process with new, instant-status visibility and prompt notifications. Clients can also download notarization certificates as a PDF and easily copy the file notarization information for trusted verification.
  • Build trust and make the eSigning process more transparent for clients
    Build trust and make the eSigning process more transparent for clients
    Enhance your eSignature services and increase transparency by letting clients see all the emails that are included in an e-signing invitation.

November 2021 Release

  • Maximize workload performance through off-host data processing in Advanced Backup
    Maximize workload performance through off-host data processing in Advanced Backup
    Reduce the load on your clients’ workloads by moving backup replication, validation, retention and conversion into a VM operation for another machine with the Advanced Backup for Acronis Cyber Protect Cloud. These operations can be performed independently from existing protection plans that are on a separate schedule.
  • Achieve near-zero RTOs by scheduling backup conversion into ready-to-start virtual machines
    Achieve near-zero RTOs by scheduling backup conversion into ready-to-start virtual machines
    Optimize your RTOs by scheduling a regular conversion of important workload backups into ready-to-start virtual machines (Instant Restore) with the Advanced Backup pack for Acronis Cyber Protect Cloud. The converted VMs are updated incrementally with each conversion task execution. Backup conversion operations can be performed on a separate schedule and different agent.
  • Provide greater control of backup and recovery tasks to VMware Cloud Director’s backup operators
    Provide greater control of backup and recovery tasks to VMware Cloud Director’s backup operators
    More data protection options are available for tenants in the VMware Cloud Director tenant portal. VM backup operators can access more backup/recovery options to comply with tenants’ backup policies.
  • Protect Windows 11 and Windows Server 2022 with anti-malware and anti-ransomware technologies
    Protect Windows 11 and Windows Server 2022 with anti-malware and anti-ransomware technologies
    Strengthen workload protection by extending your next-generation anti-malware and anti-ransomware services to Windows 11 and Windows Server 2022 to counter modern cyber threats.
  • Extend disaster recovery to Linux workloads with logical volumes (LVM)
    Extend disaster recovery to Linux workloads with logical volumes (LVM)
    Protect Linux physical and virtual machines that have logical volumes (LVM) with disaster recovery services.
  • Leverage a web installer for MacOS
    Leverage a web installer for MacOS
    Minimize provisioning efforts with a lightweight web installer for MacOS that works on both Intel and Apple M1 CPUs to eliminate the need to download different installers based on a CPU model.
  • Easily match usage metrics to their related prices in the price list (SKUs)
    Easily match usage metrics to their related prices in the price list (SKUs)
    Easily do a one-to-one match between usage and related SKUs with the introduction of new SKU-related fields in the usage report. Streamline invoice preparation and minimize errors.
  • Leverage a one-click access to integration management in the Acronis Cyber Protect Cloud console
    Leverage a one-click access to integration management in the Acronis Cyber Protect Cloud console
    The improved user experience of the Acronis Cyber Protect Cloud console makes integrations much more easily accessible, through one-click access via the navigation pane.
  • Benefit from folder improvements in Acronis Cyber Files
    Benefit from folder improvements in Acronis Cyber Files
    Leverage extended folder functionalities in Acronis Cyber Files that allow users to drag and drop folders and files from the Web UI.

October 2021 Release

  • Benefit from new, simplified licensing for Microsoft 365
    Benefit from new, simplified licensing for Microsoft 365
    Leverage a new, simplified Microsoft 365 licensing model that offers attractive per-seat pricing for partners – with unlimited Acronis Hosted Cloud Storage included. This change is available within “per workload” licensing.
  • Delegate backup and recovery task management without compromising vCloud Director security
    Delegate backup and recovery task management without compromising vCloud Director security
    Gain more granular control over who is responsible for VMware backup and recovery management. vCloud Director administrators can now delegate backup and recovery capabilities by manually creating new “Organization self-service VM backup operator” roles with a custom set of permissions.
  • Enjoy improved security of API permissions within ConnectWise Manage integrations
    Enjoy improved security of API permissions within ConnectWise Manage integrations
    Provide more control and greater security of API permissions by no longer relying on the generic “admin” role. Now you can set your own granular permissions for the API user within your ConnectWise Manage environment.
  • Ensure support for upcoming macOS and Android OS versions
    Ensure support for upcoming macOS and Android OS versions
    Ensure you will be able to protect clients’ Android 12 and macOS 12 workloads with cyber protection from day one of the upcoming releases.

September 2021 Release

  • New third-party integrations
    New third-party integrations
    Supporting your operational efficiency, Acronis Cyber Protect Cloud features new native integrations with commonly used RMM tools. Our list of new integrations includes Addigy, Datto RMM, Ninja RMM, and Paessler PRTG.

August 2021 Release

  • Intuitive Section Management for Client Executive Summary Report
    Intuitive Section Management for Client Executive Summary Report
    The Executive Summary report enables you to demonstrate the value of your services to clients. Further demonstrate your value in this report by adding, naming, or changing the order of sections within the report to better represent the organization of your client’s business.
  • Differentiate the network protection folder path for Windows and macOS
    Differentiate the network protection folder path for Windows and macOS
    Protect both Windows and macOS workloads within a single protection plan by specifying the Network Folder Protection Restore path for either Windows or macOS separately.
  • Increased visibility and management of links used within eSignature
    Increased visibility and management of links used within eSignature
    Users are now empowered to better manage links for the eSignature capability in Advanced File Sync and Share; allowing them to view, edit or even revoke shared links. History is also provided by link type and duration of link validity.
  • New third-party integrations
    New third-party integrations
    Easing your administrative efforts, Acronis Cyber Protect Cloud provides native integrations with commonly used RMM tools. Our list of new integrations includes N-able RMM and N-able N-central.

July 2021 Release

  • Full support and integration with VMware vCloud Director
    Full support and integration with VMware vCloud Director
    Cloud providers hosting with the vCloud Director can now offer tenants Acronis Cyber Protect Cloud. Enable clients with proactive cyber protection and fast recovery through a simple web interface requiring no client-side deployment. Per-tenant reports allow flexible billing.
  • Proactive notifications after Microsoft 365 Data Recovery
    Proactive notifications after Microsoft 365 Data Recovery
    Clients now can react quickly if needed with proactive notifications after recovery or downloading of backed up data on Microsoft 365.
  • ”Restore Operator” role for Microsoft 365/Google Workspace
    ”Restore Operator” role for Microsoft 365/Google Workspace
    Protect your client’s data and prevent accessibility when assigning the “Restore Operator” role, which allows the assignee to recover data on behalf of the client/user without providing access to its content.
  • New Advanced File Sync and Share Pack
    New Advanced File Sync and Share Pack
    Improve the collaboration and productivity of your clients’ teams. The Advanced File Sync and Share pack extends Acronis Cyber Protect Cloud’s integrated secure file-sharing capabilities with fully remote notarization, file verification, and online signing.
  • Advanced audit trail in eSignature certificate
    Advanced audit trail in eSignature certificate
    Know exactly the status of your document by viewing a detailed audit trail and tracing the flow of actions within the signature certificate.
  • Backup slice management for Android 2.3.0
    Backup slice management for Android 2.3.0
    View, select, delete or restore any mobile backup slices of your choice through this intuitive slice management capability.
  • Easily and selectively restore backed up pictures and videos for Android 2.3.0
    Easily and selectively restore backed up pictures and videos for Android 2.3.0
    Save time and restore only the pictures or videos needed by quickly and easily selecting multiple files at once; by days, sequentially.
  • New third-party integrations
    New third-party integrations
    Easing your administrative efforts, Acronis Cyber Protect Cloud features new native integrations with commonly used RMM and PSA tools. Our list of new integrations includes ConnectWise Command, Jamf Pro, CloudBlue PSA, and Matrix42.

June 2021 Release

  • Device control for macOS
    Device control for macOS
    Reduce your client’s risk from insider data breaches on Mac computers by controlling user access to peripheral devices and local interfaces on protected computers running macOS Catalina and Big Sur.
  • Executive Summary Reports to present key performance metrics to clients
    Executive Summary Reports to present key performance metrics to clients
    Easily demonstrate the value of the services you deliver to your clients with these customizable reports. Reported metrics include: patches installed, malicious URLs blocked, malware blocked, protection status of machines…and more. Available on partner and customer levels in the Management Portal.
  • Simplified delivery of initial backup to the cloud for backup plans with replications
    Simplified delivery of initial backup to the cloud for backup plans with replications
    Physical Data Shipping with replication to cloud is now possible for locations with Always Incremental scheme only.
  • Privacy warnings for Microsoft 365 and Google Workspace backups
    Privacy warnings for Microsoft 365 and Google Workspace backups
    Prevents accidental access to client data by warning the partner and that action will be logged before accessing sensitive data.
  • Client Access to audit log for Microsoft 365 and Google Workspace backups
    Client Access to audit log for Microsoft 365 and Google Workspace backups
    The client or administrator is able to search and review events related to Microsoft 365 or Google Workspace cloud-to-cloud backup for any investigation or analysis of possible deviations.
  • Brand-neutral Acronis Cyber Protect installer
    Brand-neutral Acronis Cyber Protect installer
    Acronis partners are able to provide a brand-neutral solution to their customers. Partners can enable white-labeling in the partner settings; allowing the client to download a brand-neutral installer and Cyber Protect Monitor.
  • Support licensing for hosting servers
    Support licensing for hosting servers
    For Acronis partners utilizing web hosting control panels, special web hosting server protection pricing and licensing has been introduced for: DirectAdmin, Virtualmin, ISPmanager.

May 2021 Release

  • Advanced Email Security Pack
    Advanced Email Security Pack
    Email is the biggest threat vector for your clients, neutralize it and minimize risks by blocking any email threat, including spam, phishing, business email compromise, advanced persistent threats, and zero-days; before it reaches end-users.
  • Auto-update for cyber protection agents
    Auto-update for cyber protection agents
    Ensure all agents are updated to the latest version without any manual operation. Available for Windows, Linux, and Mac machines.
  • Registration token changes
    Registration token changes
    Generate registration tokens without having to log out from the Partner account and back in as a customer. Empowers script-based integrators to provide flexibility.
  • Flexible deployment of agent without anti-malware component
    Flexible deployment of agent without anti-malware component
    Use Acronis Cyber Protect Cloud without the anti-malware component to decrease the number of services running on the machine, optimize RAM consumption, and improve compatibility with third-party antivirus solutions.
  • Monitor signed applications by using behavior detection
    Monitor signed applications by using behavior detection
    Increase the security of Acronis-protected workloads by monitoring signed applications for potential threats. All signed applications, (non-Microsoft certificates) are monitored via the improved performance of the Acronis Behavior Engine to quickly react to new developing threats.
  • Document templates for Acronis Cyber Notary Cloud
    Document templates for Acronis Cyber Notary Cloud
    Simplify the process of signing typical documents by using templates for employment contracts, service agreements, or NDAs.
  • Software inventory improvements in Advanced Management Pack
    Software inventory improvements in Advanced Management Pack
    Automatically be alerted when there is a need to change your current service quota. Software inventory scan results are updated without having to refresh.
  • Improved failback planning in Advanced Disaster Recovery Pack
    Improved failback planning in Advanced Disaster Recovery Pack
    Save the time and effort needed for planning failback activities and gain immediate visibility of the size of backup data to be transferred back to the local site.

April 2021 Release

  • Vulnerability assessments and Acronis Active Protection for macOS
    Vulnerability assessments and Acronis Active Protection for macOS
    Increase protection for your clients’ macOS workloads by protecting them from advanced threats with Acronis Active Protection. If a macOS is infected with ransomware, Acronis Active Protection is able to detect this activity, stop it, and recover your clients’ data.
  • Vulnerability assessments for macOS
    Vulnerability assessments for macOS
    Strengthen your clients’ macOS workloads by running scheduled vulnerability assessments. Detect known issues before they become a problem with easy to run scans within the Cyber Protection console. If issues arise, you can quickly remediate them to keep your clients’ data safe.
  • UX improvements for licensing of Advanced packs
    UX improvements for licensing of Advanced packs
    Simplify your management and monitoring processes with new UX improvements to Acronis Cyber Protect Cloud. This enables you to easily switch from one client account to another so that you can get at-a-glance views quickly and easily – saving you and your technicians time.
  • Collecting hardware inventory from agent-based virtual machines
    Collecting hardware inventory from agent-based virtual machines
    Save time and effort with hardware inventory information for agent-based virtual machines on a clients’ network. With on-demand scans, you can easily monitor hardware changes, receive detailed reports for devices and ensure that they are adequately protected.
  • Performance improvement for behavior engine
    Performance improvement for behavior engine
    Improved performance for our behavior engine helps you protect your clients from antivirus and anti-malware with less strain on their systems. With significant performance enhancements, you can increase protection for them with fewer resources.
  • Firewall policies management
    Firewall policies management
    Easily manage firewall policies on your clients’ behalf for their disaster recovery servers through the Acronis Cyber Protect Cloud console. This enables you to simplify the support process and manage outbound and inbound firewall policies.
  • Device control: support of encrypted removable media and screenshot capture access
    Device control: support of encrypted removable media and screenshot capture access
    Eliminate the risk of data leaks with encrypted removable media and screenshot capture control. This enables users to keep sensitive information within their organization – should a removable device get in the wrong hands or prevent screenshots from being copied to the clipboard. Keeping your clients’ sensitive data safe and secure.
  • Storing cPanel metadata in the backup archive meta
    Storing cPanel metadata in the backup archive meta
    Quickly and easily restore massive amounts of data by storing cPanel metadata in the archive. Data heavy environments – such as hundreds of websites – can traditionally take a significant amount of time to recover. This enables you to get cPanel instances up and running quickly.

March 2021 Release

  • Acronis Cyber Cloud new licensing
    Acronis Cyber Cloud new licensing
    Leverage a set of essential cyber protection tools in Acronis Cyber Protect Cloud at no cost or in a pay-as-you-go model. Deliver optimum levels of cyber protection with our new advanced packs - Advanced Backup, Advanced Disaster Recovery, Advanced Security, and Advanced Management – which you can mix and match based on your clients’ needs.
  • Automated failback with near-zero downtime
    Automated failback with near-zero downtime
    Achieve best-in-class failback times, ensure business continuity, and safeguard your clients’ data by transferring it to the local site, while the virtual machine in the cloud is still running. Get information about the progress and estimated downtime, and plan the failback process accordingly.
  • Agentless backup and restore for Red Hat Virtualization
    Agentless backup and restore for Red Hat Virtualization
    Perform agentless backups and restores of Red Hat Virtualization (RHV) virtual machines and granular recovery of files and folders.
  • Support for Scale Computing HC3
    Support for Scale Computing HC3
    Protect even more workloads with full support for agentless backup and recovery of Scale Computing HC3 virtual machines.
  • Protection for macOS on ARM
    Protection for macOS on ARM
    Provide full protection for macOS on the newly released ARM CPU with Acronis Cyber Protect Cloud’s vulnerability assessments, patch management, antivirus and anti-malware capabilities.
  • Integration with Kaseya VSA
    Integration with Kaseya VSA
    Centrally monitor and manage all of your workloads and alerts within the Kaseya VSA interface, including provisioning services, managing devices and protection plans, ticketing, reporting, etc.

February 2021 Release

  • Data Loss Prevention (DLP) via device and port control
    Data Loss Prevention (DLP) via device and port control
    Strengthen data protection and prevent leaks of sensitive information via local physical and virtual workloads. Enforce context-aware controls over local data access and transfer operations on workloads, including clipboard operations.
  • Anti-malware for Linux
    Anti-malware for Linux
    Increase protection for your clients’ Linux-based environments. Anti-malware protection for Linux provides real-time protection and scheduled scans so that you can notify clients, and block and quarantine suspicious activity in real-time.
  • Support checks for updates via peer-to-peer
    Support checks for updates via peer-to-peer
    Maintain your clients’ system updates with ease. With peer-to-peer updates in Acronis Cyber Protect Cloud, as long as one agent is connected to the cloud, it will receive and share updates with other agents on the network. If this agent is down or not connected the rest of the agents will go to Acronis Cloud and will receive updates there – ensuring they are all up to date.
  • Bootable Media Builder
    Bootable Media Builder
    Recover clients’ data even faster with the bootable media builder, now available in Acronis Cyber Cloud. This enables you to easily create a customized Linux-based or Windows-based media that can be moved to USBs, ISO, or WIM without downloading any additional software – saving you time and resources.
  • IPsec multisite VPN support
    IPsec multisite VPN support
    Strengthen security with support of IPSec multisite VPN support. Available in Acronis Cyber Disaster Recovery Cloud, IPsec multisite VPN support integrates secure protocols and algorithms, so you can easily support clients with multiple sites that are hosting critical workloads with higher requirements for security, compliance, and bandwidth.
  • Custom DNS configuration
    Custom DNS configuration
    Provide flexibility by setting up your custom DNS configurations for the disaster recovery site in the Acronis cloud. This enables you to easily adjust DNS settings for your cloud servers, that are dependent on your own DNS services.
  • Enhanced security mode
    Enhanced security mode
    Provide even better security for your clients with enhanced security mode. This mode restricts data access for everyone but the data owner – it safeguards all backups by ensuring they are encrypted and the management console doesn’t store or archive any passwords.
  • Acronis Cyber Files Cloud for Android
    Acronis Cyber Files Cloud for Android
    Protect even more Android files with additional functionalities within Acronis Cyber Files – including localization support in Spanish. With this new software update, users can now take photos within the app, and provide an even better user experience with pdf files: improved speed, enhanced search performance, and more.

January 2021 Release

  • Monitor all of your protected workloads
    Monitor all of your protected workloads
    Easily track the total number of workloads protected across all editions enabled within a specific partner, customer, folder, or unit.
  • Save time and effort on service quota management
    Save time and effort on service quota management
    Manage service quotas for multiple devices directly from the devices grid, instead of going through each device individually.
  • Gain clear visibility into hardware and software inventory changes
    Gain clear visibility into hardware and software inventory changes
    See what’s changed over a specific time period in your hardware and software inventory at a glance with new widgets.
  • Access all the system information you need in one place
    Access all the system information you need in one place
    Resolve customer issues faster with all required performance logs and system information, available in the management portal.

December 2020 Release

  • Proactive AI-based Ransomware Protection for Linux
    Proactive AI-based Ransomware Protection for Linux
    Secure all data on Linux systems with real-time protection from ransomware. The AI-based Acronis Active Protection technology uses sophisticated analysis tools to recognize suspicious behavior and a wide variety of ransomware types, stopping their attack.
  • Acronis Cyber Notary Cloud e-signature API
    Acronis Cyber Notary Cloud e-signature API
    Customize, integrate, and extend your services with an advanced e-signature functionality that enables easy, efficient, and secure online signing of files with embeddable e-signatures, no matter where the files are stored.
  • Software and Hardware Inventory Collection
    Software and Hardware Inventory Collection
    Save time and effort with up-to-date software and hardware inventory information.
    Discover all software/hardware assets installed on customer machines through automatic or on-demand scans. In addition, you can browse and filter software/hardware assets by multiple criteria, easily generate inventory reports, and auto-delete records once a machine or tenant is removed.

November 2020 Release

  • Agentless backup and restore for Virtuozzo Hybrid Server 7.5 virtual machines
    Agentless backup and restore for Virtuozzo Hybrid Server 7.5 virtual machines
    Now you can back up and restore Virtuozzo Hybrid Server 7.5 virtual machines and perform granular recovery of files and folders.
  • Support for VMware vSphere 7.0
    Support for VMware vSphere 7.0
    Acronis Cyber Cloud provides full support for agentless backup and recovery of virtual machines running on VMware vSphere 7.0.
  • New UX for Acronis Cyber Protect Monitor
    New UX for Acronis Cyber Protect Monitor
    The Acronis Cyber Protect Monitor is now enhanced with current protection status, date and time of the last backup, and more.

October 2020 Release

  • Simplified and automated disaster recovery setup
    Simplified and automated disaster recovery setup
    Setting up a disaster recovery infrastructure has never been easier – just enable the disaster recovery functionality in a protection plan and a default infrastructure will be automatically set up based on the device’s CPU, RAM, and network configuration.
  • Support for macOS Big Sur
    Support for macOS Big Sur
    Acronis Cyber Cloud provides full support for the newest version of macOS Big Sur, set to be released this fall.

September 2020 Release

  • Embeddable e-signatures
    Embeddable e-signatures
    Accelerate and automate the signature process while reducing costs with embeddable e-signatures and Ethereum-based blockchain notarization for them. In Acronis Cyber Notary Cloud, clients can easily execute every step of the document workflow – from creation, to sending the document to multiple signees – with an easy drag, drop, and sign feature.
  • Protection for Citrix Workspace
    Protection for Citrix Workspace
    Acronis Cyber Protect Cloud provides enhanced security for Citrix Workspace to proactively protect workspaces with vulnerability assessment, patch management, code injection prevention, and anti-malware capabilities.

August 2020 Release

  • Acronis Cyber Protect Essentials Edition
    Acronis Cyber Protect Essentials Edition
    Every workload is different, but every workload needs cyber protection – whether it stores business-critical data or nothing at all. With Acronis Cyber Protect Cloud Essentials Edition, you can protect workloads that don’t need to be backed up with bullet-proof cyber protection capabilities — antivirus and anti-malware, URL filtering, vulnerability assessment, patch management, and remote desktop.
  • Exploit prevention
    Exploit prevention
    Until a patch is applied, your clients’ machines are vulnerable. With exploit prevention, you can stop and prevent attacks with memory protection, return-oriented programming protection, code injection protection, and privilege escalation protection.
  • URL filtering widget report
    URL filtering widget report
    Simplify administrative management with an easy to read URL filtering report. At a glance, you can see a static list of URL categories and the number of items that were detected in the defined period of time.
  • Read-only role for disaster recovery
    Read-only role for disaster recovery
    Enhance the security of your internal operations with a read-only role for Acronis Cyber Disaster Recovery Cloud. With this additional user permission, your technicians can monitor and manage the account without the permissions needed to make changes within accounts.

July 2020 Release

  • #CyberFit Score
    #CyberFit Score
    This security assessment and scoring tool is now available to everyone as a standalone tool. It identifies the security gaps in an IT environment by looking at common threat vectors and provides detailed recommendations on how an organization can improve its security posture, safeguarding its systems against modern threats.
  • Microsoft Teams backup and recovery
    Microsoft Teams backup and recovery
    Backup and recover your clients’ entire Microsoft 365 Teams site and channels, including team mailboxes, meetings, and channel content. You can also perform full-text searches within channel conversations.
  • Enhanced URL filtering
    Enhanced URL filtering
    Help your clients manage employee productivity with URL filtering. Advanced categorization by website type allows you to choose which categories users have access to when browsing the web, ensuring they are more focused.
  • Assign users access permissions
    Assign users access permissions
    One of the best ways to secure data is to compartmentalize who has access to it and who has permissions to change it. We take a similar approach to our platform and now have read-only user permissions to help you better secure clients’ accounts within your organization.
  • Enhanced password strength policy
    Enhanced password strength policy
    Common or compromised passwords are an easy way for cybercriminals to access an account. New password precautions for the Acronis Cyber Cloud platform checks users’ passwords against top leaked and bad password databases, identifies company and user names, and leverages a password strength meter to encourage better password practices.

Acronis Cyber Cloud 9.0 Update 2

  • Point-to-site remote VPN access
    Point-to-site remote VPN access
    With our new VPN feature, clients on DR-enabled tenants can establish a secure (L2 VPN) connection to the corporate network with their personal devices. This secure point-to-site connection allows clients to access files from the local site or the cloud so they can do their job without compromising the security of the network.
  • Updated patch management capabilities
    Updated patch management capabilities
    Software patches and updates are essential to securing a business environment. New customization capabilities in Acronis Cyber Protect Cloud enable you to postpone machine reboots until after backups are complete.

Acronis Cyber Cloud 9.0 Update 1

  • #CyberFit Score
    #CyberFit Score
    This security assessment and scoring tool, available for Acronis Cyber Protect Cloud, identifies the security gaps in an IT environment by looking at common threat vectors and suggesting ways you can improve your #CyberFit score. By addressing these areas, you can improve your security posture and safeguard your system against modern threats.
  • Protection for Zoom, WebEx, and Microsoft Teams
    Protection for Zoom, WebEx, and Microsoft Teams
    Collaboration tools like WebEx and Zoom can help an organization become more efficient, but the problem is a lot of these tools are not secure. With Acronis Cyber Protect Cloud, you can actively protect these popular collaboration tools with antivirus and anti-malware protection.
  • Remotely wipe devices
    Remotely wipe devices
    Instead of letting business-critical data get into the wrong hands, you can now remotely wipe compromised or missing Windows devices. Built into Acronis Cyber Protect Cloud, you can successfully prevent data from being deleted by disgruntled employees or being accessed from lost or stolen devices.
  • Remote desktop enhancements
    Remote desktop enhancements
    Employees working from home may need access to files or apps on their work machines, they might not have a configured VPN. Now you can share a secure link with end users so they can remotely access their machine.
  • Predefined protection plans
    Predefined protection plans
    Protect your clients’ remote and office workers quickly and easily by choosing one of three preconfigured protection plans. These options help you save time while ensuring you that your clients’ workloads and environments are protected.
  • Voice control for Acronis Cyber Protect
    Voice control for Acronis Cyber Protect
    Your personal safety and security are our top priority. Given the current environment, we want to enable you to help clients without needing to physically touch their machines. Voice control for Acronis Cyber Protect Cloud means you can now control the console hands-free.

Acronis Cyber Protect Cloud

Modernize your clients' security and backup with integrated cyber protection

Sorry, your browser is not supported.

It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.