All Acronis Cyber Protect plans include

All-in-One Cyber Protection

Full-image and file-based backup for 25+ workload types. Free, secure cloud storage, Acronis Active Protection and vulnerability assessments.

Integrated Backup and Recovery

Flexible backup options, including full-image backups, file-level backups, and incremental backups, ensuring quick and reliable data recovery.

Comprehensive cybersecurity

Proactively detect and neutralize cyber threats, including ransomware, viruses, and other malware.

Centralized Management and Monitoring

Acronis Cyber Protect delivers centralized management and visibility over cyber protection for the entire organization.

Compare Acronis Cyber Protect editions

Data protection
File-level backup
Image-based backup
Local backup
Mobile backup
NAS/shares backup
Incremental/differential backups
Backup Window (traffic throttling)
Multi-destination backup (backup replication)
Archive compression
Backup validation (checksums)
Retention rules
Blockchain backup notarization
Bare Metal Recovery (BMR)
BMR to dissimilar hardware (Universal Restore), P2V, V2P, P2P, V2V
XenServer, KVM, RHV, Oracle VM server
Immutable Storage
One Click Recovery
Synology NAS backup
Cybersecurity
Ransomware and cryptojacking protection
Antivirus and anti-malware protection
Exploit prevention
URL filtering
URL filtering with categorization
Windows Defender Antivirus management
Microsoft Security Essentials management
Threat Feed
Remote device wipe
HDD health monitoring
Data protection map
Continuous data protection
Forensic backup
Safe recovery of the backups
Corporate allowlist
Vulnerability assessments for Windows
Vulnerability assessments for third-party Windows applications
Vulnerability assessments for macOS
Vulnerability assessments for Linux
Patch Management
Fail-safe patching: backup endpoint before installing patches
Remote Desktop
Event monitoring
Automated event correlation
Prioritization of suspicious activities
Automated MITRE ATT&CK® attack chain visualization and interpretation
Single-click response to incidents
Full threat containment including endpoint quarantine and isolation
Intelligent search for IoCs including emerging threats
Attack-specific rollback
Endpoint protection management
Group management
Shared protection plans
Centralized plan management
Dashboard configuration
Reports
Email notifications

Looking for help?

Frequently asked questions

Sorry, your browser is not supported.

It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.