Data protection |
File-level backup | | | |
Image-based backup | | | |
Local backup | | | |
| | | |
NAS/shares backup | | | |
Incremental/differential backups | | | |
Backup Window (traffic throttling) | | | |
Multi-destination backup (backup replication) | | | |
Archive compression | | | |
Backup validation (checksums) | | | |
Retention rules | | | |
Blockchain backup notarization | | | |
Bare metal recovery (BMR) | | | |
BMR to dissimilar hardware (Universal Restore), P2V, V2P, P2P, V2V | | | |
XenServer, KVM, RHV, Oracle VM server | | | |
Immutable Storage | | | |
One Click Recovery | | | |
Synology NAS backup | | | |
Agentless Azure VM backup | | | |
Nutanix AHV agentless backup | | | |
Cybersecurity |
Ransomware and cryptojacking protection | | | |
Antivirus and anti-malware protection | | | |
Exploit prevention | | | |
URL filtering | | | |
URL filtering with categorization | | | |
Windows Defender antivirus management | | | |
Microsoft Security Essentials management | | | |
Threat feed | | | |
Remote device wipe | | | |
HDD health monitoring | | | |
Data protection map | | | |
Continuous data protection | | | |
Forensic backup | | | |
Safe recovery of the backups | | | |
Corporate allowlist | | | |
Vulnerability assessments for Windows | | | |
Vulnerability assessments for third-party Windows applications | | | |
Vulnerability assessments for macOS | | | |
Vulnerability assessments for Linux | | | |
Patch management | | | |
Fail-safe patching: backup endpoint before installing patches | | | |
Remote desktop | | | |
Event monitoring | | | |
Automated event correlation | | | |
Prioritization of suspicious activities | | | |
Automated MITRE ATT&CK® attack chain visualization and interpretation | | | |
Single-click response to incidents | | | |
Full threat containment including endpoint quarantine and isolation | | | |
Intelligent search for IoCs including emerging threats | | | |
Attack-specific rollback | | | |
Endpoint protection management |
Group management | | | |
Shared protection plans | | | |
Centralized plan management | | | |
Dashboard configuration | | | |
Reports | | | |
Email notifications | | | |
Hardware and software inventory | | | |
Secure remote desktop access | | | |
Machine learning-based monitoring and alerts | | | |
AI-powered Cyber Scripting to automate tasks | | | |
Acronis Cyber Protect Add-Ons |
Email Archiving for M365 | | | |
Disaster Recovery | | | |