• Over 5,500,000
    users worldwide
  • Over 100,000
    prevented cyberattacks last year
  • Over 500,000,000
    clones and backups

Protecting your valuable data has never been easier

  • Personal backup made easy
    Backup made easy: Simplify your system backup with preconfigured personal backup plans — create full system copies to local, external, network or cloud storage. With one more step, you can encrypt your backup by setting up a password as an additional layer of protection for your private data.
  • Flexible backup configuration
    Flexible backup configuration: For advanced users, multiple options to schedule and optimize backups are available. You can configure multiple personal backup plans, create various schedules, use incremental or differential backups, limit the number and age of backup copies, exclude certain files and folders, and much more.
  • Automatic backup and event-based backup
    Automatic backup and event-based backup: Choose to run an automatic backup at every system startup, every time you attach an external drive that is configured as a backup destination, or before rebooting or shutting down the computer. Mac users also have an option to back up their data during Power Nap.
  • Mobile backup * for edition with cloud storage
    Mobile backup * for edition with cloud storage: Keep your mobile contacts, calendars and photos safe. Our Acronis mobile backup app safeguards your device, as well as all of your family’s data — on their smartphones and tablets. Each user may set up a separate encryption password to keep their data private from other users.
  • Microsoft 365 backup * for edition with cloud storage
    Microsoft 365 backup * for edition with cloud storage: Back up your Microsoft 365 mailbox and OneDrive directly to the Acronis Cloud. Safeguard all emails and attachments in your Microsoft Outlook.com, as well as files and folders stored on your OneDrive, with secure, password-protected backups to prevent deletion by malicious actors.
Learn more

Choose a cyber protection plan that meets your needs

Formerly Acronis True Image

What our users say

  • I was always weary of backup software. It is bulky and complicated, and looks like it is designed for an astronaut. With Acronis, I finally found a tool to protect my data that I knew how to use from the first clicks.

    Jessica C.
    Verified user
  • I am a technician at a small MSP firm supporting hundreds of companies, and I use Acronis backup solution at home and recommend it to be used by all of my customers at home. Not to mention that we use the business version of Acronis at work.

    Ian H.
    Verified user
  • Internet taught me that I should have three copies of my data – on my computer, on an external drive and in a secure location on the internet. Acronis made me actually do it, because it is extremely easy.

    Ari S.
    Verified user

Supported platforms

Microsoft Windows

  • Windows 11 (all editions)
  • Windows 10 (all editions)
  • Windows 8+ (all editions)
  • Windows 7 SP1 (all editions)
  • Windows Home Server 2011

    Windows file systems

    • NTFS
    • Ext2/Ext3/Ext4
    • ReiserFS(3)
    • Linux SWAP
    • HFS+/HFSX
    • FAT16/32/exFAT

      Apple macOS

      • macOS Sonoma 14
      • macOS Ventura 13
      • macOS Monterey 12
      • macOS Big Sur 11
      • macOS Catalina 10.15

        macOS file system

        • APFS
        • HFS+
        • Core Storage
        • FAT32
        • NTFS (including Boot Camp)

          Mobile operating systems

          • iOS 12.0 or later
          • Android 7.0 or later
            Acronis

            Mobile backup

            Keep your mobile contacts, calendars, photos and files safe. Our free Acronis Mobile app safeguards your device, as well as all of your family’s smartphones and tablets with Acronis Cyber Protect Home Office (formerly Acronis True Image).

            Looking for help?

            Frequently Asked Questions

            • Why do I need backup software?

              Backup software creates reserve copies of your data. In case of a data loss event, you can use these copies to recover the original data. Backups are useful primarily for two purposes:
              i. To recover an operating system when it is corrupted or cannot start (called disaster recovery).
              ii. To recover specific files and folders after they have been accidentally deleted or corrupted.

            • How often should I back up a computer?

              Back up all your data after every significant event in your system. For example, after you bought a new computer, reinstalled the operating system, or installed an important system update.
              You can also schedule backups to run automatically and on a regular basis. In this case, you will always have the latest version of your data for recovery.

            • Where are backup files stored?

              You can store the backed-up files on your machine, on an external disk, on a networked storage device, or in the cloud.

            • Can I schedule automatic backups with Acronis software?

              Yes. See these procedures for Windows and for Mac.

            • Can I back up multiple devices with Acronis software?

              Yes. You can back up data on all computers, smartphones, and tablets registered for the same account. For more information on backing up multiple devices, see the procedures for Windows and for Mac.

            • Can I monitor and manage backups remotely?

              Yes, you can. Online Dashboard allows you to track and control the protection status and backups of all computers, smartphones, and tablets registered for the same account. For more information, see the procedures for Windows and for Mac.

            • What security measures have Acronis backup software?

              Acronis Cyber Protect Home Office provides the following types of protection:
              i. Active Protection runs constantly in the background to protect your machines in real time while you work as usual.
              ii. Antivirus Scans run on-demand to perform in-depth searches for malicious software throughout the whole system.
              iii. Vulnerability assessment is a daily scan that runs in the background, detects vulnerabilities in your system and apps, and then assesses their severity.
              iv. Identity protection prevents cybercriminals from stealing your personal information.

              Product help
              If you need product assistance, you can find helpful materials in the Knowledge Base. Or, post questions on our discussion boards.
              Technical support
              For subscription owners, there is free, 24-hour technical support. Refer to the Technical Support Site to find the appropriate support contact.

              Sorry, your browser is not supported.

              It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.