Special offer
A limited-time promotional rebate for MSPs when you switch to Acronis Cyber Protect Cloud

Erick Simpson webinar for MSPs

Learn from 2021’s Ransomware Attacks to build your 2022 Cyber Protection Strategy
Thursday, December 9, 11 AM EST
Learn from 2021’s Ransomware Attacks to build your 2022 Cyber Protection Strategy
Join MSP advisor Erick Simpson, Acronis cybersecurity experts and a special guest MSP owner to learn important strategies and tactics to protect your clients and witness a ransomware attack in action.


  • Erick Simpson, MSP Transformation Expert
  • Dawn Wilson, CEO of Bluefin Technology Group
Register now
All Acronis events
More than your average cloud backup – a complete cyber protection solution

Benefit from backup capabilities enhanced with cyber protection – with protection with more than 20 workload types, you can protect your clients’ data confidently. Discover what backup and data protection capabilities you gain with Acronis Cyber Protect Cloud. Harness the power of one solution, one agent, and one console to deliver the comprehensive cyber protection your clients seek.

Acronis Cyber Protect Cloud
With Advanced Backup
File-level, disk-level, image and application backups
Backup popular workloads like Mac, Windows, Linux, Microsoft 365, Google Workspace, Hyper-V, VMware, and much more
Hybrid storage options – Acronis-hosted storage, public clouds such as Microsoft Azure, or MSP local storage
Flexible recovery options from full systems to granular files
Cloud-Physical-Virtual migrations
Archive encryption
Incremental and differential backups
Vulnerability assessments
Expanded backup support: Covers Microsoft SQL clusters, Microsoft Exchange clusters, Oracle DB, and SAP HANA
Data protection map and compliance reporting: Scan clients’ environments to ensure their workloads, files, applications, and users are protected
Scheduled backup reports: Reduce time and highlight your MSP business value with automatic reporting
Continuous data protection (CDP): Acronis’ agent monitors and backs up changes in real time with near-zero RPOs, ensuring no data is lost.
Off-host data processing: Move backup tasks into VM operations to another machine to reduce the load on client’s workloads
Significantly enhance your clients’ data protection

Strengthen your data protection services by ensuring clients never lose data, even between scheduled backups. Extend backup capabilities to SAP HANA, Oracle DB, and application clusters. You can also gain visibility for the protection status of all data across your clients’ infrastructure.

Innovative leader in the data protection industry

  • CRN 2020 Partner Program Guide: 5 Star Data Storage and Backup Vendors
  • Solution Review: Best Backup and disaster recovery companies for 2020
  • DCIG – Top 5 SME Anti-ransomware backup solutions
  • PCWorld Editors' Choice 2021
  • PC Magazine - The Best Ransomware Protection for 2021

Cyber Protect Cloud

Includes all features of Acronis Cyber Backup Cloud

Modernize your clients' security and backup with integrated cyber protection

Expand client protection with advanced capabilities

  • We previously used Veeam as well as legacy solutions such as local NAS. The biggest problem we had with Veeam was that it only worked well in virtual environments, and we needed many other devices and workloads protected. Acronis was fast and simple across multiple platforms including physical servers and Microsoft mailboxes.Read full story

    Andrés F. Ambrosi Chica
    ICT Advisory Manager, AMBROSS-TI
  • Having a single management console for all our backup environments greatly simplified operations, making it possible for a single technician to support the entire process while lowering our costs.Read full story

    Fernando Solano
    Director, S&T Soluciones y Tecnología SAS

Seamless integrations and automation

Easing administrative efforts, Acronis Cyber Protect Cloud natively integrates with commonly used systems by service providers such as RMM and PSA tools, hosting control panels, and billing systems. Custom integrations and automation are also possible through a set of RESTful APIs and SDKs.
Seamless integrations and automation
View all integrations

Expand your services with advanced protection packs

Add other powerful components to strengthen your services even further with advanced protection packs and unique cyber protection capabilities. Control your costs by paying only for the functionalities your clients need.

Advanced packs include:
  • Advanced Security
    Enhance your security services with integrated cyber protection that includes full-stack anti-malware. Increase your detection rate and responsiveness to the latest cyberthreats. Extend cyber protection to web browsing, backed-up data, the recovery process, and exploit prevention. Enable investigations by capturing forensic data in backups.
    • Full stack anti-malware
    • URL filtering
    • Exploit prevention
    Learn more
  • Advanced Backup
    Strengthen your data protection services by ensuring clients never lose data, even between scheduled backups. Extend backup capabilities to SAP HANA, Oracle DB, and application clusters. You can also gain visibility for the protection status of all data across your clients’ infrastructure.
    • Continuous data protection
    • Data protection map
    • Scheduled backup reports
  • Advanced Disaster Recovery
    Get clients back to business in mere minutes when disaster strikes by spinning up their systems in the Acronis Cloud and restoring them anywhere, ensuring immediate data availability. Make disaster recovery painless and increase efficiency with orchestration, runbooks, and automatic failover.
    • Disaster recovery orchestration
    • Production failover
    • Site-to-site VPN
    Learn more
  • Advanced Email Security
    Block any email threat, including spam, phishing, business email compromise (BEC), advanced persistent threats (APTs), and zero-days in seconds before it reaches end-users. Leverage Perception Point’s next-generation technology for lightning-fast detection and easy deployment, configuration, and management.
    • Anti-phishing and anti-spoofing engines
    • Anti-evasion technologies
    • Next-generation dynamic detection against zero-days
    Learn more
  • Advanced File Sync and Share
    Get a full control over data location, management and privacy with a file sync and share service, including a transaction ledger to enable notarization and eSignature capabilities, across all platforms.
    • File notarization
    • Embedded eSignatures
    • Independent file verification
    Learn more
  • Advanced Management
    Streamline vulnerability management and promptly close gaps in your clients’ IT infrastructure through patch management. Gain visibility into your clients’ software assets and data protection to ease daily tracking and planning tasks, and improve clients’ uptime by monitoring disk drives health.
    • Patch management
    • Fail-safe patching
    • Disk drive health monitor
    Learn more

Looking for help?

Frequently Asked Questions

  • I signed up for a trial. Where can I download the backup agents?

    You first need to create a customer and an account for them. Once that is done, you can either log in as that customer or, in the Account management console, select the customer to manage their backups. This will bring you to the Backup management console where you can download the backup agent.

  • How much system resource usage will it take to back up?

    1. Resource usage is relative to the system specifications and a number of other factors, such as disk speed, disk size, available bandwidth, etc. By default, the Acronis backup process runs on low priority, with the operating system dynamically throttling its resources.

    2. On modern servers and workstations, the CPU usage is typically around 3-4% and RAM consumption will be up to 500 MB with CPU spikes during the snapshot phase.

  • Can you integrate with my storage solution?

    Acronis provides a hardware-independent software solution that can work with almost any hardware on industry-standard protocols like SMB and NFS. Acronis can also support any block-based storage, as long as it's supported by the operating system.

  • How can I set up a backup to a network drive?

    In the backups section of the backup portal:

    • Select Add Location
    • Select a Network folder and enter the network path

    We also have online documentation

  • How frequently can I back up (RPO)?

    This will depend on the size and performance of the hard disk, the amount of data changed, and the available bandwidth. Testing needs to be done, but the minimum threshold is 10 minutes.

  • What are the best practices to back up Hyper-V?

    We recommended you perform agentless backup for Hyper-V guest VMs, unless the VM needs to have ransomware protection and application-aware backups. Then, installing a Windows application agent is required.

  • Does Acronis support deduplication?

    1. Acronis backup agents support deduplication, in archives, for a single machine. Any new duplicated files will be skipped and not backed up.

    2. Acronis Cyber Protect Cloud does not use a centralized deduplication server as the client's data can be encrypted and containerized for security purposes.

  • What is the compression rate?

    Compression rates vary depending on the type of data but generally, you can expect around 30-40% compression unless the data is exclusively media files.

  • Does Acronis support encryption?

    Yes, Acronis Cyber Protect Cloud and its services use encryption on all levels.

  • How does ransomware protection work?

    Acronis Active Protection is an advanced anti-ransomware technology. Completely compatible with the most common anti-malware solutions, our artificial-intelligence-based technology actively protects all of the data on your systems, including documents, media files, programs, Acronis Cyber Protect Cloud files, and more. It can detect and deflect attacks, and restore impacted data. For more information, review this guide in the Knowledge Base.

  • How granular is Exchange/Microsoft 365 recovery?

    Granular recovery can restore individual items from the mailbox: a single email, contact, or calendar item.

  • How do I do a bare metal restore?

    Bare metal restores can be done by booting the target machine using bootable media, point to the backup repository for the image file. (Refer to: https://www.acronis.com/en-us/support/documentation/BackupService/index.html#42056.html).

  • How can I restore a VM to Azure/Google/Amazon?

    The destination VM needs to have an OS pre-installed with the Acronis agent. The restoration will then be done using either P2V or V2V. It's not possible to use bootable media in Azure/Google/Amazon.

  • •Can I restore from a smaller disk to a larger disk and vice versa?

    Yes. It’s possible to restore a disk image to a smaller drive if the smaller drive has enough space to accommodate the occupied space of the larger disk (e.g. if you have a 200 GB disk with 100 GB of space used, you can transfer an image of this disk to a 150 GB drive, but not to an 80 GB disk).

  • My customer has low bandwidth. How can I upload the initial backup?

    This process is done in two stages:

    • Creation of the initial backup on external media, please refer to the online documentation.
    • Sending the data, which can be done through physical shipment, also described in this Knowledge Base article, or upload via WAN from an alternative location using a special tool.

  • Product help
    In case you have any difficulties, we have collected all the useful materials for this product in our FAQ, Knowledge Base, Video Tutorials and documentation. Also you can always ask your question on our Discussion Boards.
  • Technical support

    Customers with active product maintenance or subscription are entitled to 24/7 technical support. Follow the instructions at the Technical Support Site to get prompt support by phone, chat or e-mail.

Sorry, your browser is not supported.

It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.