All of the Acronis® software products ("Software") are licensed to end-users by Acronis International GmbH ("Acronis").
The standard licensing policy is based on the number of devices and operating environments running on an End User’s premises or in anyone’s cloud, which Acronis Software is used for.
Definitions:
"End User" means a natural person associated with the Enterprise who installs Acronis software on such person’s Supported Devices for use with Acronis software products.
"Device" means a single hardware system with an operating environment either physical or virtual. For instance, a Windows or Linux operating system is considered a single "device", even if multiple operating systems are installed on a single hardware unit.
"Supported Devices" refers to the devices that are supported for use with the Acronis software products (as indicated in the Acronis documentation).
"Virtual Machine" or “VM” means a software computer that, like a physical computer, runs an operating system and applications. The Virtual Machine is comprised of a set of specification and configuration files and is backed by the physical resources of a host. A single license is required for the use of the software for the protection of a single device. However, a license is not required for the deployment of the software. It means that even if you do not install the software on the device and use it via bootable media, a separate license is required for each protected device.
Such license is non-transferable and non-assignable, except for the following circumstances: when the original machine the Software license was used on: (i) becomes non-functioning or obsolete; and (ii) is taken out of service. In such cases, the license is transferable to a replacement machine.
If the product is used on a cluster, each node of the cluster must be licensed.
Acronis Cyber Protect is available with subscription licenses.
Acronis Cyber Protect Editions Comparison contains detailed info about features included in each license and edition.
The subscription license activation date is calculated from the date of purchase and is not calculated from the date when a license key is registered under the customer’s account on Acronis Customer Portal.
The expiration date of the subscription license is calculated from the date of purchase. For subscription license renewals, the new expiration date will be tied to the current subscription expiration date if the renewal is purchased before the current subscription expiration date. If the subscription license renewal purchased after the current subscription expiration, then the new subscription’s expiration date is calculated from the date of purchase.
Once the purchased Acronis Cyber Protect, Acronis Cyber Protect subscription license key is registered under the customer’s account, the subscription is ready to use for Cloud Agent installations. To use subscriptions in the on-prem installations, the customer needs to synchronize the subscriptions between the product and the customer’s account (internet connection is required on the machine with the installed product).
Onboarding Service for Acronis Cyber Protect
Onboarding Service for Acronis Cyber Protect allows an End User to schedule a live 1:1 phone call and a remote desktop session with a priority support engineer. During this call Acronis will provide personalized help installing Acronis Cyber Protect and advice about product options and configuring a protection plan that best meets the End User’s needs.
One Service fee is valid for one setup session on a single machine and one mobile device.
For more details about what is included in the license, see here: https://kb.acronis.com/content/63538
Acronis Cloud Storage product may only be used in combination with a valid Acronis Cyber Protect license (any editions). This product is available by subscription license only.
Acronis Disaster Recovery Add-on product may only be used in combination with any Acronis Cyber Protect Standard, Acronis Cyber Protect Advanced, or Acronis Cyber Protect - Backup Advanced subscription license and cloud deployment option only. This product is available by subscription license only.
Acronis Cyber Protect Connect is licensed per End User and is only available as a subscription license.
This product is available with subscription license type.
Acronis Files Connect
This product is available with subscription license type.
Definitions
"Image" means an exact replica of an entire state of a computer’s system, including but not limited to: operating system, application(s), and data.
"Deployment" means installing, configuring, running, and testing the installation of an Image onto a Machine.
"Machine" means a computing device composed of a unique combination of motherboard, one or more network interface cards, and one or more CPUs which operates as a single hardware unit.
"License Holder" means an individual or entity that has purchased a Snap Deploy License and has agreed to and accepted the Acronis End User License Agreement.
There are two license types available for Snap Deploy (each, a "Snap Deploy License" and, collectively, the "Snap Deploy Licenses"), which are comprised of the following:
Machine license
A "Machine License" grants the License Holder the right to an unlimited number of Deployments of one or more different Images to a single Machine. A Machine License is therefore bound to the initial License Holder and the single Machine upon which the License Holder first deployed an Image using that License. A Machine License may not be transferred to another person or onto a different Machine. Notwithstanding the foregoing, if the License Holder’s Machine is rendered obsolete or permanently removed from service ("Decommissioned"), such License Holder shall provide to Acronis Customer Service a screenshot of the used Machine License, the MAC address of the Decommissioned Machine, and documentation from the License Holder’s IT department (or equivalent) confirming to the reasonable satisfaction of Acronis that the Machine was Decommissioned. Upon Acronis’s written confirmation to the License Holder that such Machine was Decommissioned and approval of the transfer, the License Holder may transfer the Machine License to a different Machine. To summarize, a Machine License:
1. Is bound to a single Machine.
2. Allows for as many Deployments as License Holder wants.
3. May use multiple Images. (no limit)
4. Is only transferable to another Machine in the event of Decommission.
5. Is not transferable to a different License Holder.
Deployment license
A "Deployment License" permits the License Holder a single Deployment of a unique Image on a single Machine. In the event that the Deployment is not successful, the License Holder may use the same license to perform another Deployment on the same or a different Machine. However, unlike the Machine License, the Image install using the Deployment License may not be changed, nor can it be re-installed. To summarize, a Deployment License:
1. Is bound to a single Machine.
2. Allows for a single Deployment only.
3. May use only one Image.
4. Is not transferrable to another Machine.
5. Is not transferable to a different License Holder.
The foregoing two Snap Deploy Licenses are further differentiated based upon whether they are deployed on a server or a workstation.
• A "Server License" is a Snap Deploy License that is deployed on a server.
• A "Workstation License" is a Snap Deploy License that is deployed on a workstation.
As of 1 August 2023, Acronis offers subscription-based Acronis Snap Deploy Machine licenses only.
This Acronis DeviceLock DLP licensing policy uses the term “Machine” to refer to (A) a single supported operating system instance running on a physical or virtual machine, except for session host servers, or (B) a single supported application, desktop, or virtual desktop infrastructure session running on a session host server.
Acronis DeviceLock DLP licenses are for Microsoft Windows unless the license name indicates otherwise.
As of 1 July 2021, Acronis only offers subscription-based Acronis DeviceLock DLP licenses. A holder of a perpetual Acronis DeviceLock DLP license may continue to order maintenance and support renewals for that license, provided that the maintenance and support contract has not lapsed as of 1 July 2021 and does not lapse at any point on or after 1 July 2021. Any such lapse in support and maintenance for a perpetual Acronis DeviceLock DLP license bars the holder of the license from ordering maintenance and support renewal for that perpetual license.
The minimum order quantity for Acronis DeviceLock DLP licenses is five (5) licenses, except for maintenance and support renewals for perpetual licenses.
Acronis DeviceLock Endpoint DLP is a product with multiple sets of features, each set requiring a separate type of license. Each particular set of features of Acronis DeviceLock Endpoint DLP is a “Component.” The aggregate set of features available on each Machine depends on the Components available on that Machine.
This Acronis DeviceLock Endpoint DLP licensing policy refers to an individual or entity that holds a valid license to use a particular Component as a “Licensee.”
Acronis DeviceLock Core is the fundamental Component of Acronis DeviceLock Endpoint DLP. A Licensee may use Acronis DeviceLock Core alone, without using any other Component.
Acronis DeviceLock Core offers functionality in connection with computer interfaces that do not use network protocols for transmitting data, as well as with peripheral devices that do not use network protocols to connect to a Machine. Such computer interfaces and peripheral devices are, collectively, “Local Interfaces.”
All other Components of DeviceLock Endpoint DLP are add-ons and were discontinued effective 1st of April 2023.
Effective January 1, 2022, Acronis no longer offers new perpetual licenses in any territory (except Japan). This change has no impact on the maintenance and support programs that Acronis and Acronis’s Channel Partners offer for existing perpetual licenses.
Definitions
"Host" means a single instance of a hypervisor, with up to 2 CPU, or 16 CPU Cores per host.
"Virtual Machine" or “VM” means a software computer that, like a physical computer, runs an operating system and applications. The Virtual Machine is comprised of a set of specification and configuration files and is backed by the physical resources of a host
"License Holder" means an individual or entity that purchased an Acronis Cloud Manager license and agrees to and accepts the Acronis End User License Agreement.
Acronis Cloud Manager licenses
Acronis offers two license types for Acronis Cloud Manager (“Cloud Manager”), a Host License and a Virtual Machine License. Acronis only offers Cloud Manager with subscription licenses.
Host license
A "Host License" grants the License Holder the right to use Cloud Manager to manage an unlimited number of VMs running on a single supported Host (including, but not limited to, Microsoft Hyper-V).
A Host License:
1. Binds to a single hypervisor Host.
2. Allows for the License Holder to manage any number of VMs running on a single, supported Host.
3. Is transferable to another Host by the License Holder.
4. Is not transferable to a different License Holder.
Virtual Machine license
A "Virtual Machine License" permits the License Holder to use Cloud Manager to manage a single VM.
A Virtual Machine License:
1. Binds to a single VM and allows Cloud Manager to manage only that VM.
2. Is not transferrable to another VM.
3. Is not transferable to a different License Holder.
Definitions
"Host" means a single instance of a hypervisor, with up to 2 CPU, or 16 CPU Cores per host.
"Virtual Machine" or “VM” means a software computer that, like a physical computer, runs an operating system and applications. The Virtual Machine is comprised of a set of specification and configuration files and is backed by the physical resources of a host.
"License Holder" means an individual or entity that purchased Acronis Cloud Security license and agrees to and accepts the Acronis End User License Agreement.
Acronis offers two license types for Acronis Cloud Security (“Cloud Security”), a Host License and a Virtual Machine license. Acronis only offers Cloud Security licenses on a subscription basis.
Host license
A "Host License" grants the License Holder the right to use Cloud Security to manage and protect an unlimited number of VMs running on a single, supported, hypervisor host (including, but not limited to, Microsoft Hyper-V).
A Host License:
1. Binds to a single hypervisor Host.
2. Allows the License Holder to manage and protect any number of VMs running on a single , supported Host.
3. Is transferable to another Host by the License Holder.
4. Is not transferable to a different License Holder.
Virtual Machine license
A "Virtual Machine License" permits the License Holder to use Cloud Security to manage and protect a single VM.
A Virtual Machine License:
1. Binds to a single VM and allows Cloud Security to manage and protect only that VM.
2. Is not transferrable to another VM.
3. Is not transferable to a different License Holder.
Acronis Cyber Infrastructure works with Acronis Cyber Appliance, a hardware appliance that offers secure storage for backups. Acronis Cyber Infrastructure comes pre-deployed on a cluster of five servers in a single 3U chassis and is available for activation with all available licensing models.
Acronis offers two types of licenses for Acronis Cyber Infrastructure, a Trial license and a Subscription license.
Trial license
Acronis includes a "Trial License" of Acronis Cyber Infrastructure for evaluation of its features. The Trial License contains a limited, 1 TB storage capacity but can be used in production environment. After reaching 1 TB of storage, Users can switch to a paid subscription to receive more storage capacity.
For non-Acronis partners and customers, the Trial License includes basic support, such as public documentation and knowledge bases. For Acronis partners, the Trial License allows the User to contact Acronis Support for guaranteed response times and service-level agreements (SLAs).
Subscription license
Acronis offers a paid “Subscription License” of Acronis Cyber Infrastructure for flexibility and scalability for businesses and advanced users. The User activates the Subscription License with a license key. The license key is time-limited and grants a certain storage capacity. For additional capacity, the User can upgrade to a new license key with a higher storage limit or a new expiration date.
Subscription Licenses allow the User to contact Acronis Support for guaranteed response times and service-level agreements (SLAs).
Pay-as-you-go
Acronis offers a pay-as-you-go (“PayGo”) model for an unlimited storage capacity. Acronis charges PayGo customers monthly, per TB, for universal usage of storage resources, including but not limited to, locally deployed iSCSI, NFS, and S3 services. Acronis also charges a monthly subscription plan for protected workloads. Acronis bases usage charges on the actual capacity of data storage, shown on the Acronis Cyber Protect Cloud console.
For PayGo customers, Acronis does not charge for locally deployed Backup service. Acronis allows PayGo customers to connect Backup service to Acronis Cyber Protect Cloud, but not to Acronis Cyber Protect on-premises. PayGo customers will need to use license keys to connect Backup service to Acronis Cyber Protect on-premises.
Acronis allows PayGo customers to contact Acronis Support for guaranteed response times and service-level agreements (SLAs).
Definitions
o "Cyber Protect Management Server " means Acronis’s management console platform that allows Service Provider the ability to manage its customers, resellers and End Users’ use of Acronis Cyber Protect Cloud
o "Acronis Cyber Protect Cloud" means Acronis Cyber Protect Cloud software and services
o "Acronis Cyber Files Cloud" means Acronis Cyber Files Cloud services
o "Acronis Cyber Notary Cloud" means Acronis Notary services
o “Advanced pack” means additional functionality is applied above Acronis Cyber Protect license
o "Application" means an individual instance of Microsoft SQL Server, an individual instance of Microsoft Exchange Server and/or individual instance of Microsoft Active Directory
o "Cloud Backup" means Storage that is managed by Acronis on Service Provider’s behalf
o "Cloud Servers" means a common term representing either a Recovery server or primary server
o "Contract Documents" or "Contract" means the Pricing and Order Form, Order Confirmation, Invoice and/or other purchasing documentation issued by Acronis to Service Provider in connection with the purchase of the Acronis Cyber Protect Cloud license and any subsequent amendment or modification of the terms therein (agreed by Acronis and Service Provider), as applicable
o "Compute point" means a unit of measurement, introduced by Acronis, to simplify pricing and reporting for compute resources utilization
o "Disaster Recovery Storage" - means the size of a data associated with storing and processing cloud servers, including the reserved space
o "Disaster Recovery Infrastructure" means a collection of software and hardware required to provide Disaster Recovery capabilities
o "Electronically signed file" is a file that is electronically signed by persons selected by signature processes initiator. An artefact of that process is a signature certificate a hash of which is calculated and recorded into the Ethereum blockchain to proof its authenticity. Each record in the Ethereum blockchain is time-stamped, immutable, and independently verifiable. "End User" means the ultimate entity or individual using the Acronis Cyber Files Cloud
o "End User" means the ultimate entity or individual using the Acronis Cyber Protect Cloud, Acronis Cyber Files Cloud, Acronis Cyber Notary Cloud
o "Files Cloud Storage" means Storage that is managed by Acronis on Service Provider’s behalf
o “Hosting Server” means a Server or Virtual Machine with installed cPanel or/and Plesk software
o “Hypervisor Host Server” means a computer that can run multiple operating systems on a single machine
o "Local Backup" means Storage that is owned and/or managed by the End User
o "Notary Cloud Storage" means Storage that is managed by Acronis on Service Provider’s behalf
o "Notarized file" – a hash of which is calculated and recorded into the Ethereum blockchain to proof file’s authenticity. Each record in the Ethereum blockchain is time-stamped, immutable, and independently verifiable
o "Primary Server" means a virtual server, deployed in an Acronis Data Center, which is used to host application nodes or as an additional host when other data protection scenarios are required
o "Recovery Server" means a replica of a protected server, which is hosted in an Acronis Data Center and is used for failover or failover-readiness check
o "Public IP Address" means a dedicated public-facing IP address which can be added to a cloud server that requires external network access
o "Server" means a workload that provides data to other computers
o "Service Provider" means an entity using the Cyber Protect Management Server to authorize its customers the right to either use the Cyber Protect Management Server to create their own sub-user accounts for their reseller customers, if any, and/or an entity that markets and delivers the Acronis Cyber Protect Cloud to the End User
o "SP Cloud Backup" means Storage that is owned and/or managed by the Service Provider
o "Storage" means the archiving of data for use by a computer including but not limited to Workstation, Virtual Machine and/or Server
o "Virtual Machine" or “VM” means a software computer that, like a physical computer, runs an operating system and applications. The Virtual Machine is comprised of a set of specification and configuration files and is backed by the physical resources of a host
o "Workload" means an individual Workstation, Virtual Machine, Server, Hosting Server, Website, Mobile Device, Microsoft 365 seat, and/or Google Workspace seat
o "Workstation" means a personal computer or desktop computer terminal
o "Mobile Device" is a personal handheld tablet or phone, or, at Acronis sole discretion, - other device that is made for portability, and is therefore both compact and lightweight
o "Website" is a collection of related web pages and databases, identified with a common domain name, and published on a web server
o "Website Backup" means Website that may be backed up on Cloud Backup using Acronis Cyber Protect Cloud
Acronis Cyber Cloud consists of Acronis Cyber Protect Cloud, Acronis Cyber Physical Data Shipping, and Acronis Cyber Infrastructure. Acronis Cyber Cloud provides these products to service providers on a "pay-as-you-go" model basis. The pricing of this usage is set forth in the purchase order and Acronis will bill the service provider on a monthly basis.
Acronis provides pay-as-you-go-based products (Offering items) for Acronis Cyber Protect Cloud for the terms specified next to the following products:
Acronis Cyber Protect Cloud consists of four components: Cyber Protect Management Server, Cyber Protect Services, Cloud Storage and an agent on the end point device. Three different hosting options are available for Acronis Cyber Protect Cloud:
o With the Acronis Cyber Protect Cloud Acronis Hosted model, Acronis hosts and manages the Cyber Protect Management Server, Cyber Protect Services and Cloud Storage.
o With the Acronis Cyber Protect Cloud Hybrid model, Acronis hosts and manages both the Cyber Protect Management Server and Cyber Protect Services but not the Storage.
With the Acronis Cyber Protect Cloud Service Provider Hosted model, the Service Provider hosts and manages the Cyber Protect Management Server, Cyber Protect Services and Cloud Storage.
Acronis provides the Acronis Cyber Protect Cloud Service Providers on a "Per GB" or "Per Workload" models. A subscription license to the Acronis Cyber Protect Cloud is granted, not a perpetual license.
o Per GB model – the Service Provider is charged for the Acronis Hosted, Service Provider Hosted, and Local storage usage generated by all protected workloads.
o Per Workload model – the Service Provider is charged for the number of protected workloads and Acronis Hosted storage usage generated by all protected workloads. For the Microsoft 365 and Google Workspace workloads Acronis Hosted Storage is included in the price of the Microsoft 365 and Google Workspace seat based on the fair usage policy.
Advanced Security
Advanced Security pack provides security functionality as to protect Server, Virtual Machine, Workstation, and Hosting Server. This product may only be used in combination with an Acronis Cyber Protect Cloud license.
Advanced Security pack is licensed per each Server, Virtual Machine, Workstation, and Hosting Server protected with Advanced Security pack.
Advanced Backup
Advanced Backup pack provides backup and recovery functionality dedicated to protecting advanced workloads such as Microsoft Exchange and Microsoft SQL cluster designed for big environments. This product may only be used in combination with an Acronis Cyber Protect Cloud license.
Advanced Backup pack is licensed per each Server, Virtual Machine, Workstation, and Hosting Server protected with Advanced Backup pack.
Advanced Management
Advanced Management pack provides management functionality for Server, Virtual Machine, Workstation, and Hosting Server. This product may only be used in combination with an Acronis Cyber Protect Cloud license.
Advanced Management pack is licensed per each Server, Virtual Machine, Workstation, and Hosting Server protected with Advanced Management pack.
Advanced Disaster Recovery
Advanced Disaster Recovery is incremental to Acronis Cyber Protect Cloud infrastructure. With the Advanced Disaster Recovery Acronis Hosted model, Acronis hosts and manages all the components specified in Acronis Cyber Protect Cloud Acronis Hosted model section and the Disaster Recovery Infrastructure. Acronis provides the Advanced Disaster Recovery to Service Providers on a per GB model basis, when the partner is charged for the Acronis Hosted Cloud storage usage on the last day of the month, number of compute points and IP addresses used on the last day of the month. A subscription license to the Acronis Cyber Disaster Recovery Cloud is granted, not a perpetual license. This product may only be used in combination with an Acronis Cyber Protect Cloud license.
Advanced Email Security
Advanced Email Security pack provides security functionality to protect Microsoft 365, Google Workspace and other cloud-based business mailboxes. Advanced Email Security does not support personal mailboxes. Use of this product requires an Acronis Cyber Protect Cloud license.
Advanced Email Security pack is licensed per mailbox protected with Advanced Email Security pack.
Advanced Files Sync & Share
The Advanced File Sync and Share pack extends Acronis Cyber Protect Cloud’s integrated file-sharing capabilities by adding advanced features such as fully remote notarization, verification, and online signing on top of the pay-as-you-go file sync and share service. This product may only be used in combination with an Acronis Cyber Protect Cloud license. Each file that is eSigned and each notarized document requires a separate license.
Advanced Data Loss Prevention
The Advanced Data Loss Prevention pack allows an End User to detect and block unauthorized transmissions of data based on the contents of the data (A) to computer interfaces that do not use network protocols for transmitting data, (B) to peripheral devices that do not use network protocols to connect to a Workstation, Virtual Machine, or Server, and (C) over networks.
Each Advanced Data Loss Prevention license allows an End User to protect one (1) Workstation, Virtual Machine, or Server. In addition, the use of Advanced Data Loss Prevention pack on any Workstation, Virtual Machine, or Server requires an Acronis Cyber Protect Cloud license for that Workstation, Virtual Machine, or Server.
Acronis Cyber Files Cloud consists of four components: Cyber Protect Management Server, Files Management Server, Cloud Storage and an agent on the end point device. Three different hosting options are available for Acronis Cyber Files Cloud:
o With the Acronis Cyber Files Cloud Acronis Hosted model, Acronis hosts and manages the Cyber Protect Management Server, Files Management Server and Cloud Storage.
o With the Acronis Cyber Files Cloud Hybrid model, Acronis hosts and manages the Cyber Protect Management Server and Files Management Server but not the Cloud Storage.
o With the Acronis Cyber Files Cloud Service Provider Hosted model, the Service Provider hosts and manages the Cyber Protect Management Server, Files Management Server and Cloud Storage.
Acronis provides the Acronis Cyber Files Cloud to Service Providers on a "pay per usage" or "pay per seat" basis. A subscription license to the Acronis Cyber Files Cloud is granted, not a perpetual license.
Acronis Cyber Notary Cloud consists of three components: Cyber Protect Management Server, Notary Management Server and Cloud Storage. Two different hosting options are available for Acronis Cyber Notary Cloud:
o With the Acronis Cyber Notary Cloud Hosted model, Acronis hosts and manages the Cyber Protect Management Server, Notary Management Server and Cloud Storage.
o With the Acronis Cyber Notary Cloud Hybrid model, Acronis hosts and manages the Cyber Protect Management Server and Notary Management Server, but not the Cloud Storage.
Acronis provides the Acronis Cyber Notary Cloud to Service Providers on a "pay per usage" basis. A subscription license to the Acronis Cyber Notary Cloud is granted, not a perpetual license.
Acronis’s fair usage policy for offerings with unlimited Acronis Hosted cloud storage included.
In an effort to enable its customers to easily scale their business, Acronis may in some cases provide Acronis hosted cloud storage for Microsoft 365 and Google Workspace (“Workspace Storage”) with no preconfigured technical limitations as to the amount of Workspace Storage that the customers may enjoy.
To promote a fair distribution of resources among all of its customers, Acronis establishes the following terms and conditions on the use of Workspace Storage (“Fair Use Policy”).
With the Microsoft 365 and Google Workspace offering where Acronis Hosted Cloud storage is included, a Customers may not utilize an excessive amount of Acronis Hosted Cloud storage, as determined in Acronis’s sole discretion.
Acronis will notify the customers Acronis determines are using excessive Acronis Hosted Cloud storage and provide them with an opportunity to either reduce the amount of Workspace Storage they utilize or license additional Workspace Storage. For repeat violations or substantial abuse, Acronis reserves the right to suspend the customer’s access to Acronis products, charge the customer for the overages at then-current rates, or terminate the customer’s license. Acronis may conduct usage audits to ensure compliance with the Fair Use Policy.
No delay in exercising, or omission to exercise, any right, power or remedy by Acronis upon violation of this Fair Use Policy will impair any such right, power or remedy or be construed to be a waiver thereof or an acquiescence in such violation.
This Fair Use Policy is in addition to and not in derogation of any terms and conditions of the applicable license agreement.
Acronis True Image, formerly known as Acronis Cyber Protect Home Office, software (“Acronis True Image”) is licensed to one License Holder by Acronis International GmbH (“Acronis”).
Definitions:
A "Machine" means a computing device composed of a unique combination of motherboard, one or more network interface cards, and one or more CPUs which operates as a single hardware unit.
A “Mobile Device” means a Machine small enough to hold and operate in one hand, such as a smartphone.
“License Holder” means an individual or entity that has purchased a True Image License and has agreed to and accepted the Acronis End User License Agreement.
Acronis True Image Licenses
There are three license types available for Acronis True Image (each, a “Acronis True Image License” and, collectively the “Acronis True Image Licenses”), which are further divided into 1-, 3-, or 5-machine licenses subtypes. Acronis True Image Licenses may be installed on any combination of Windows or Mac Machines up to the number indicated by the license subtype. Acronis True Image Licenses are comprised of the following license types:
Acronis issues license keys for each license purchased. The end-user is authorized to use each license key to activate and use the Software within the parameters of this Licensing Policy. All subscription licenses are considered activated upon delivery or after a license key activation unless a specific date is otherwise identified in the purchase order. The use, distribution, or sale of Acronis license keys for any purpose other than as specifically permitted by this Policy and in the End User License Agreement is strictly prohibited. Acronis takes all instances of unauthorized use of its Software seriously, and such unauthorized use may result in civil or criminal action to enforce the terms of the EULA and this Policy, and the imposition of civil or criminal fines or penalties. Subscription licensed Software may contain serial keys that are time-stamped and will deactivate upon expiration of the paid subscription term.
Mac® is a trademark of Apple, Inc., registered in the U.S. and other countries. Windows® is a trademark of Microsoft group of companies. All other trademarks are trademarks of their respective owners or Acronis International GmbH.in the U.S. and other countries
All of the Acronis® software products ("Software") are licensed to end-users by Acronis International GmbH ("Acronis").
The standard licensing policy is based on the number of devices and operating environment running on an End User’s premises or in anyone’s cloud, which our Software is used for.
"End User" means a natural person associated with the Enterprise who installs Acronis software on such person’s Supported Devices for use with Acronis software products.
A "Device" means a single hardware system with operating environment either physical or virtual. For instance, a Windows or Linux operating system is considered a single "device", even if multiple operating systems are installed on a single hardware unit.
"Supported Devices" refers to the computing devices that are supported for use with the Acronis software products (as indicated in the Acronis documentation).
A single license is required for use the software for backup of a single device. However, a license is not required for the deployment of the software. It means that even if you do not install the software on the device and use it via bootable media, a separate license is required for each backed up device.
Such license is non-transferable and non-assignable, except for the following circumstances: when the original machine the Software license was used on: (i) becomes non-functioning or obsolete; and (ii) is taken out of service. In such cases, the license is transferable to a replacement machine.
If the product is used on a cluster, each node of the cluster must be licensed.
Acronis Perpetual Product Licenses
Acronis provides perpetual product licensing for the terms specified next to the following products:
Acronis discontinued certain add-on components of DeviceLock Endpoint DLP on 1 April 2023.
Except for the licenses mentioned in the Acronis DeviceLock DLP Section above, all other Components of DeviceLock Endpoint DLP are add-on Components that fall into one of two types: those that have the word “server” in their name (each a “Server Add-On”) and all the other Components (each an “Agent Add-On”).
To use an Agent Add-On, a Licensee must use Acronis DeviceLock Core on the same Machine.
The use of Agent Add-Ons may generate log entries in the various Acronis DeviceLock Endpoint DLP log databases. Licensee may store these log databases on a separate Machine (“Database Server”). Server Add-Ons offer functionality for use in connection with the Database Server. To use any Server Add-On in connection with logs collected from various Machines, a Licensee must use Acronis DeviceLock Core on each of the Machines from which the logs originate. The Licensee does not need a separate Acronis DeviceLock Core license on the Database Server.
Acronis DeviceLock Endpoint DLP log databases combine log entries for licensing purposes as follows: one (1) entry associated with the use of the Acronis DeviceLock User Activity Monitor Add-On together with one (1) entry associated with the copies of data transmitted via specific ports or devices that certain Components may generate together with five (5) other entries are collectively a “File.”
Acronis may offer Component bundles from time to time. All Components in one bundle apply to the same Machine. All Components in the bundle have the same subscription term. The Acronis DeviceLock Core subscription term is one (1) year. The term of Add-Ons subscribed for during the term of an existing Acronis DeviceLock Core subscription shall expire on the expiration date of the Acronis DeviceLock Core subscription term.
Acronis DeviceLock Discovery
Only one type of license is available for Acronis DeviceLock Discovery:
The subscription license becomes activated once the purchased license key is registered under customer’s Acronis Account. To use subscriptions in the product, one needs to synchronize them with the account (Internet connection is required on a machine with the installed product).
Acronis provides subscription-based product licensing for the terms specified next to the following products:
Once the purchased Acronis Backup subscription license key is registered under customer’s Acronis Account, the subscription becomes activated and ready to use for Cloud Agent installations. To use subscriptions in the on-prem installations, one need to synchronize them with the account (Internet connection is required on a machine with the installed product).
If you have any questions regarding Acronis’ licensing policies, please refer to the Acronis Licensing FAQ, or contact Acronis.
Definitions
"Application" means an individual instance of Microsoft SQL Server, an individual instance of Microsoft Exchange Server and/or individual instance of Microsoft Active Directory
"Cloud Storage" means Storage that is managed by Acronis
"Device" means an individual Workstation, Virtual Machine and/or Server
"End User" means the ultimate entity or individual using the Acronis Backup Service software and services
"Local Storage" means Storage that is owned and/or managed by the End User
"Cyber Protect Management Server" means Acronis’s management console platform that allows End Users’ use of the Acronis Backup Service software and services
"Server" means a Device that provides data to other computers
"Storage" means the archiving of data for use by a computer including but not limited to Workstation, Virtual Machine and/or Server
"Virtual Machine" means a software computer that, like a physical computer, runs an operating system and applications. The Virtual Machine is comprised of a set of specification and configuration files and is backed by the physical resources of a host
"Workstation" means a personal computer or a desktop computer terminal.
Acronis Backup Service software and services product consist of three components; the Cyber Protect Management Server, Cloud Storage and an agent on the end point device. With the Acronis Backup Service software and services, Acronis hosts and manages both the Cyber Protect Management Server and Cloud Storage. A subscription license to the Acronis Backup Service software and services is granted, not a perpetual license.
Acronis provides subscription-based product licensing for the terms specified next to the following products:
This product is available with perpetual and subscription license types.
The following licenses were discontinued, effective 1 April 2025.
There are two legacy license types of Acronis True Image software (“Legacy True Image”). Legacy True Image licenses are no longer available for purchase. The following terms govern the use of Legacy True Image Licenses.