You are on United States + Canada website. Select another region to view location-specific content
United States
English
Select another region
Choose region and language
Asia-Pacific
- Americas
- Asia-Pacific
- Europe, Middle East and Africa
Subscription licenses for Acronis Cyber Protect are available for one, three or five years with maintenance included.
We license both physical and cloud systems, as well as virtual hosts. Additionally, any license supports an unlimited number of VMs. It couldn't be easier – simply count the servers, workstations, hosts and VMs you want to cover and you're done.
Acronis Cloud Storage is also licensed as a subscription with several capacity and license term options.
Data protection | |||
File-level backup | |||
Image-based backup | |||
Local backup | |||
Mobile backup | |||
NAS/shares backup | |||
Incremental/differential backups | |||
Backup Window (traffic throttling) | |||
Multi-destination backup (backup replication) | |||
Archive compression | |||
Backup validation (checksums) | |||
Retention rules | |||
Blockchain backup notarization | |||
Bare metal recovery (BMR) | |||
BMR to dissimilar hardware (Universal Restore), P2V, V2P, P2P, V2V | |||
XenServer, KVM, RHV, Oracle VM server | |||
Immutable Storage | |||
One Click Recovery | |||
Synology NAS backup | |||
Agentless Azure VM backup | |||
Nutanix AHV agentless backup | |||
Cybersecurity | |||
Ransomware and cryptojacking protection | |||
Antivirus and anti-malware protection | |||
Exploit prevention | |||
URL filtering | |||
URL filtering with categorization | |||
Windows Defender antivirus management | |||
Microsoft Security Essentials management | |||
Threat feed | |||
Remote device wipe | |||
HDD health monitoring | |||
Data protection map | |||
Continuous data protection | |||
Forensic backup | |||
Safe recovery of the backups | |||
Corporate allowlist | |||
Vulnerability assessments for Windows | |||
Vulnerability assessments for third-party Windows applications | |||
Vulnerability assessments for macOS | |||
Vulnerability assessments for Linux | |||
Patch management | |||
Fail-safe patching: backup endpoint before installing patches | |||
Remote desktop | |||
Event monitoring | |||
Automated event correlation | |||
Prioritization of suspicious activities | |||
Automated MITRE ATT&CK® attack chain visualization and interpretation | |||
Single-click response to incidents | |||
Full threat containment including endpoint quarantine and isolation | |||
Intelligent search for IoCs including emerging threats | |||
Attack-specific rollback | |||
Endpoint protection management | |||
Group management | |||
Shared protection plans | |||
Centralized plan management | |||
Dashboard configuration | |||
Reports | |||
Email notifications | |||
Hardware and software inventory | |||
Secure remote desktop access | |||
Machine learning-based monitoring and alerts | |||
AI-powered Cyber Scripting to automate tasks | |||
Acronis Cyber Protect Add-Ons | |||
Email Archiving for M365 | |||
Disaster Recovery |
Protect your data from any threat
From $85.00 per year
Sorry, your browser is not supported.
It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.