Benefit from backup capabilities enhanced with cyber protection – with protection with more than 20 workload types, you can protect your clients’ data confidently. Discover what backup and data protection capabilities you gain with Acronis Cyber Protect Cloud. Harness the power of one solution, one agent, and one console to deliver the comprehensive cyber protection your clients seek.
File-level, disk-level, image and application backups | ||
Backup popular workloads like Mac, Windows, Linux, Microsoft 365, Google Workspace, Hyper-V, VMware, and much more | ||
Hybrid storage options – Acronis-hosted storage, public clouds such as Microsoft Azure, or MSP local storage | ||
Flexible recovery options from full systems to granular files | ||
Cloud-Physical-Virtual migrations | ||
Archive encryption | ||
Incremental and differential backups | ||
Vulnerability assessments | ||
Continuous data protection (CDP): Acronis’ agent monitors and backs up changes in real-time for with near-zero RPOs, ensuring no data is lost | ||
Expanded backup support: Covers Microsoft SQL clusters, Microsoft Exchange clusters, Oracle DB, and SAP HANA | ||
Data protection map and compliance reporting: Scan clients’ environments to ensure their workloads, files, applications, and users are protected | ||
Scheduled backup reports: Reduce time and highlight your MSP business value with automatic reporting |
Strengthen your data protection services by ensuring clients never lose data, even between scheduled backups. Extend backup capabilities to SAP HANA, Oracle DB, and application clusters. You can also gain visibility for the protection status of all data across your clients’ infrastructure.
Modernize your clients' security and backup with integrated cyber protection
Get a seamless hybrid experience and ensure ultimate data safety and accessibility by backing up and recovering customers’ systems, applications, and data via both local and cloud storage. Oversee all clients from a single pane of glass with management components centrally located in the Acronis Cloud.
Add other powerful components to strengthen your services even further with advanced protection packs and unique cyber protection capabilities. Control your costs by paying only for the functionalities your clients need. Advanced packs include:
You first need to create a customer and an account for them. Once that is done, you can either log in as that customer or, in the Account management console, select the customer to manage their backups. This will bring you to the Backup management console where you can download the backup agent.
1. Resource usage is relative to the system specifications and a number of other factors, such as disk speed, disk size, available bandwidth, etc. By default, the Acronis backup process runs on low priority, with the operating system dynamically throttling its resources.
2. On modern servers and workstations, the CPU usage is typically around 3-4% and RAM consumption will be up to 500 MB with CPU spikes during the snapshot phase.
Acronis provides a hardware-independent software solution that can work with almost any hardware on industry-standard protocols like SMB and NFS. Acronis can also support any block-based storage, as long as it's supported by the operating system.
In the backups section of the backup portal:
We also have online documentation
This will depend on the size and performance of the hard disk, the amount of data changed, and the available bandwidth. Testing needs to be done, but the minimum threshold is 10 minutes.
We recommended you perform agentless backup for Hyper-V guest VMs, unless the VM needs to have ransomware protection and application-aware backups. Then, installing a Windows application agent is required.
1. Acronis backup agents support deduplication, in archives, for a single machine. Any new duplicated files will be skipped and not backed up.
2. Acronis Cyber Protect Cloud does not use a centralized deduplication server as the client's data can be encrypted and containerized for security purposes.
Compression rates vary depending on the type of data but generally, you can expect around 30-40% compression unless the data is exclusively media files.
Yes, Acronis Cyber Protect Cloud and its services use encryption on all levels.
Acronis Active Protection is an advanced anti-ransomware technology. Completely compatible with the most common anti-malware solutions, our artificial-intelligence-based technology actively protects all of the data on your systems, including documents, media files, programs, Acronis Cyber Protect Cloud files, and more. It can detect and deflect attacks, and restore impacted data. For more information, review this guide in the Knowledge Base.
Granular recovery can restore individual items from the mailbox: a single email, contact, or calendar item.
Bare metal restores can be done by booting the target machine using bootable media, point to the backup repository for the image file. (Refer to: https://www.acronis.com/en-us/support/documentation/BackupService/index.html#42056.html).
The destination VM needs to have an OS pre-installed with the Acronis agent. The restoration will then be done using either P2V or V2V. It's not possible to use bootable media in Azure/Google/Amazon.
Yes. It’s possible to restore a disk image to a smaller drive if the smaller drive has enough space to accommodate the occupied space of the larger disk (e.g. if you have a 200 GB disk with 100 GB of space used, you can transfer an image of this disk to a 150 GB drive, but not to an 80 GB disk).
This process is done in two stages:
Customers with active product maintenance or subscription are entitled to 24/7 technical support. Follow the instructions at the Technical Support Site to get prompt support by phone, chat or e-mail.