True Image 2020

From

$49.99

Cryptomining blocker

Attacks by cryptocurrency mining malware soared by 450% last year. While it might not steal your data, cryptojacking will make your system suffer – stealing computer resources to solve the complex computational problems needed to mine cryptocurrencies. Attacks do more than slow your computer’s performance, they often introduce ransomware and other malware while they have access to your system.

Acronis Active Protection stops that threat by automatically detecting and stopping cryptominers in real time. This addition to the Acronis cyber protection arsenal means your system and network resources are used by you and you alone.

Stopping illicit miners

The boom in cryptocurrencies and their promise of easy money led to an explosion of cryptomining tools last year. The good news is that Acronis Active Protection, our artificial intelligence-based defense, keeps your system from being compromised.

Terminates cryptominers

Stops standalone cryptomining malware that is often packaged with ransomware and other threats

Alerts you to threats

Notifies you immediately when an attack is detected on your Windows PC so you can block it

Blocks future attacks

Updates the behavioral heuristics used to detect attacks so it recognizes new malicious miners

Buy Acronis True Image 2020

Try it free for 30 days!

Try it free for 30-days!

  • Enjoy 1 TB of Acronis Cloud
  • Create a mirror image of your system
  • Back up individual files and folders
  • Replicate local backups in the cloud
  • Build boot media and a recovery drive
  • Use the blockchain to authenticate data
Thanks for trying Mac version! Didn’t get the file? Try again.

Looking for PC version?

Thanks for trying PC version! Didn’t get the file? Try again.

Looking for Mac version?

Have a download link for PC or Mac sent directly to your email address

 

Email has been sent! Check inbox on your PC or Mac and continue installation from there

Send to another email address

Or try Acronis True Image: Mobile to protect your smartphones and tablets

Download installer for  

Installer is available for PCs and Macs

Released on  

Build  

See release notes

Thanks for trying Mac version! Didn’t get the file? Try again.

Looking for PC version?

Thanks for trying PC version! Didn’t get the file? Try again.

Looking for Mac version?

Have a download link for PC or Mac sent directly to your email address

 

Email has been sent! Check inbox on your PC or Mac and continue installation from there

Send to another email address

Or try Acronis True Image: Mobile to protect your smartphones and tablets

Buy Acronis True Image 2020

Get Parallels Toolbox for free with any subscription purchase

  • Essential
  • One-year subscription
  •  
  • $49.99per year
For 1 computer
  1. For 1 computer
  2. For 3 computers
  3. For 5 computers

Add to cart

  • Advanced
  • One-year subscription
  •  
  • $69.99per year
For 1 computer
  1. For 1 computer
  2. For 3 computers
  3. For 5 computers

Includes 500 GB of cloud storage

Add to cart

  • Premium
  • One-year subscription
  •  
  • $99.99per year
For 1 computer
  1. For 1 computer
  2. For 3 computers
  3. For 5 computers
1 TB for free
  1. 1 TB for free
  2. 2 TB
  3. 3 TB
  4. 4 TB
  5. 5 TB

Add to cart

 
Acronis
Need to protect more than 5 computers? Consider Acronis Cyber Backup 12.5
Looking for Standard license?
Buy or Upgrade

Upgrade your older Standard version to Acronis True Image 2020

Upgrade is valid only for Standard 2019 and earlier licenses

Please note that Advanced and Premium licenses automatically update to the latest edition with all the newest features.

For 1 computer$29.99
For 3 computers$59.99
For 5 computers$79.99
  1. What’s new
  2. Faster backups and recoveries
  3. Data deduplication
  4. Enhanced anti-malware
  5. Tray Notification Center
  6. Custom power management

Upgrade

 

Works on multiple platforms

Microsoft Windows
  • Windows 10 (all editions, including November 2019 Update)
  • Windows 8.1 (all editions)
  • Windows 8 (all editions)
  • Windows 7 SP1 (all editions)
  • Windows Home Server 2011
Apple MacOS
  • macOS Catalina 10.15
  • macOS Mojave 10.14
  • macOS High Sierra 10.13
  • macOS Sierra 10.12
  • OS X El Capitan 10.11

Mobile Operating Systems

  • iOS 10.3 or later
  • Android 5.0 or later
File Systems (Windows)
  • NTFS
  • Ext2/Ext3/Ext4
  • ReiserFS(3)  
  • Linux SWAP  
  • HFS+/HFSX  
  • FAT16/32/exFAT  
File Systems (macOS)
  • APFS
  • HFS+
  • Core Storage
  • FAT32
  • NTFS (including Boot Camp)

Looking for help?

Frequently asked questions
What is cryptojacking?

With carjacking, a crook jumps in and takes control of your car. With cryptojacking, online criminals use malware to secretly use the computing resources of your system to mine cryptocurrency – which requires tremendous processing power to calculate exceptionally complex digital equations, called hashes. While the malware does not steal your data, it robs you of considerable system resources, slowing your computer’s performance and significantly increasing your energy use.

Sometimes cryptocurrency mining malware is injected into your system, piggybacking on apps or running in the background hoping to go unnoticed. Other times the malware attacks via your web browser when you go to an infected website and runs as long as you are connected to that site.

What’s the best way and, if so how, to spot Bitcoin miner malware?

Since cryptomining demands a lot of processing power, your CPU will be asked to work overtime. If you want to test a PC for mining malware, open your system’s resource monitor (Task Manager for Windows, Activity Monitor for Macs) to see if the CPU use is unusually high. If you’ve closed all the apps on your system and the CPU is still in overdrive, or if CPU use spikes when you visit a specific website, then you may have a cryptominer at work.

How to stop mining malware?

Since there are two types cryptominers – browser-based and injection-based – you need to take steps to prevent both types of attacks.

For browser-based attacks, the first thing is to determine if your preferred web browser already has an extension available to stop bitcoin mining. Malware detection solutions are available from most popular browsers (e.g. Chrome’s No Coin), and there are plenty of open source extensions available as well.

In the case of injection-based attacks that load the malware onto your system, you’ll need a bitcoin miner scanner. Acronis True Image includes an AI-based cryptomining blocker as part of the integrated Acronis Active Protection technology. So not only do you get the backup and anti-ransomware solution you need to protect your data, your system has a built-in defense against cryptominers.

Media center and forum

In case you have any difficulties, product materials can be found in our Knowledge Base. Be sure to check out video tutorials and other documentation. You can also post questions on our discussion boards.

Phone support

For subscription owners, there is free, 24-hour technical support. Refer to the Technical Support Site to find the appropriate support phone number.