You are on United States + Canada website. Select another region to view location-specific content
United States
English
Select another region
Choose region and language
Americas
  • BrasilPortuguês
  • CanadaEnglish
  • CanadaFrançais
  • LATAMEspañol
  • United StatesEnglish
Asia-Pacific
  • AustraliaEnglish
  • Chinese Simplified简体中文
  • Chinese Traditional繁體中文
  • IndiaEnglish
  • Japan日本語
  • Korea한국어
  • SingaporeEnglish
Europe, Middle East and Africa
  • BulgariaБългарски
  • CzechČeština
  • EuropeEnglish
  • FranceFrançais
  • GermanyDeutsch
  • HungaryMagyar
  • Israelעברית
  • ItalyItaliano
  • NetherlandsDutch
  • PolandPolski
  • RomaniaRomână
  • SpainEspañol
  • SwedenSvenska
  • SwitzerlandDeutsch
  • TürkiyeTürkçe
  • United KingdomEnglish
Worldwide
  • GlobalEnglish
  • Americas
    • BrasilPortuguês
    • CanadaEnglish
    • CanadaFrançais
    • LATAMEspañol
    • United StatesEnglish
  • Asia-Pacific
    • AustraliaEnglish
    • Chinese Simplified简体中文
    • Chinese Traditional繁體中文
    • IndiaEnglish
    • Japan日本語
    • Korea한국어
    • SingaporeEnglish
  • Europe, Middle East and Africa
    • BulgariaБългарски
    • CzechČeština
    • EuropeEnglish
    • FranceFrançais
    • GermanyDeutsch
    • HungaryMagyar
    • Israelעברית
    • ItalyItaliano
    • NetherlandsDutch
    • PolandPolski
    • RomaniaRomână
    • SpainEspañol
    • SwedenSvenska
    • SwitzerlandDeutsch
    • TürkiyeTürkçe
    • United KingdomEnglish
  • Worldwide
    • GlobalEnglish
  • Login for service providersAcronis Cyber Protect Cloud
  • Login for business customersAcronis Cyber Protect, Acronis Snap Deploy
  • Login for home usersAcronis True Image
  • Login to Partner PortalAcronis Partner Portal
  • Login to ConnectAcronis Cyber Protect Connect
  • Products
    For service providers
    Acronis Cyber Protect Cloud
    Empowering service providers with backup, DR, cybersecurity, and endpoint management in one integrated solution.
    Cybersecurity
    XDREDRMDRDLP
    Data protection
    Advanced BackupDisaster RecoveryNotarization & eSignature
    Microsoft 365 protection
    Ultimate 365Backup for Microsoft 365Security Posture ManagementEmail SecurityEmail Archiving for Microsoft 365Collaboration SecuritySecurity Awareness Training (SAT)
    MSP operations
    RMMPSA
    • Try it free
    For service providers, telco's and ISPs
    Acronis Cyber Protect Home & Business
    Secure backup and anti-malware solution for small offices and home users.
    For businesses
    Acronis Cyber Protect
    -20%
    The most secure backup and rapid recovery with natively integrated security and endpoint management for reliable business continuity.

    Backup | Security | Endpoint Management
    • Try it free
    For enterprise
    Acronis Cyber Protect Enterprise
    The most secure backup and fastest recovery for Enterprise, designed specifically for multi-site, multi-generational and industrial IT.

    Backup | Security | Endpoint Management
    • Book a call
    For businesses
    Acronis Snap Deploy
    A user-friendly solution that lets you provision all your workstations and servers like you are provisioning just one.
    • Try it free
    For operational technology
    Acronis Cyber Protect OT
    New
    Leading solution for resilience, continuity and compliance across operational technology (OT) infrastructure.
    • Book a call
    For home
    Acronis True Image
    New
    The only personal cyber protection solution that delivers easy-to-use, integrated backup and anti-malware in one.
    • Buy now
    For everyone
    Acronis Cyber Protect Connect
    A remote desktop and monitoring solution that enables you to easily access and manage remote workloads and fix any issues – anytime, anywhere.
    • All products
    Looking to update or renew your product or contact us for help?
  • Solutions
    Solutions
    For service providers
    For business
    • Microsoft 365 backup and recovery
    • Cyber resilience
    • Protected workspace
    • Endpoint protection
    • Hybrid disaster recovery
    • Disaster recovery to Azure
    • Prevention
    • Solutions for service providers
    • Ultimate 365 protection
    • Managed server backup
    • Ransomware protection
    • Managed anti-malware protection
    • Hosting service providers
    • MSP patch management
    • Recovery
    • Management
    • Automation
    • Security
    • Data Protection
    • All integrations
  • Pricing
    • For Service Providers
    • For Businesses & Enterprise
    • For Home
  • Partners
    Partner with Acronis
    • Acronis Partner Program
      Meet customer demand with one partner program for MSPs, VARs, OEMs and Hybrid Partners
    • Join the partner program
    • Acronis Technology Alliances Program (TAP)
      Integrate with Acronis to build powerful solutions for the MSP ecosystem
    Partner success kit
    • MSP Academy
      Training and resources to grow your MSP business
    • Active promotions
      Explore current deals and limited-time offers
    • Partner Certification
      Partners now have access to all sales and technical training — a $999 annual value per partner
    Locators
    • Find an IT provider
      Browse verified Acronis IT service providers worldwide by region and specialization
    • Find a distributor
      Browse verified Acronis distributors worldwide by type and location
  • Support & Resources
    Support
    • Customer service and support
      Get help, find answers, and contact our support team
    • Product documentation
      Everything you need to understand and use the product
    • Support knowledge base
      Self-service support with guides and solutions
    Resources
    • Resource center
      All-in-one hub for expert insights and resources
    • Acronis blog
      Explore articles on security, backup, and innovation
    • Acronis Threat Research unit
      Insights on cyber protection, tech trends, and news
    Webinars
    • Upcoming events and webinars
      Register for live demos and webinars led by Acronis experts
    • On-Demand webinars
      Watch on-demand webinars at your convenience and learn from Acronis' top experts
  • Why Acronis
    • About Acronis
      Learn about our mission, vision, and team
    • Industry recognitions
      Recognized by industry leaders for innovation and excellence
    • Compliance and certification
      See how we meet global compliance and regulatory requirements
    • Customer stories
      Real-world success stories from our global clients
    • Acronis vs competition
      Why businesses choose Acronis over the competition
  • Trials
    • For Service Providers
    • For business and enterprise
    • For Home
  • Buy online
    • For business and enterprise
    • For Home
  • Contact us
    • Contact sales
    • Contact renewals
    • Contact support
    • Professional services
Choose region and language
Americas
  • BrasilPortuguês
  • CanadaEnglish
  • CanadaFrançais
  • LATAMEspañol
  • United StatesEnglish
Asia-Pacific
  • AustraliaEnglish
  • Chinese Simplified简体中文
  • Chinese Traditional繁體中文
  • IndiaEnglish
  • Japan日本語
  • Korea한국어
  • SingaporeEnglish
Europe, Middle East and Africa
  • BulgariaБългарски
  • CzechČeština
  • EuropeEnglish
  • FranceFrançais
  • GermanyDeutsch
  • HungaryMagyar
  • Israelעברית
  • ItalyItaliano
  • NetherlandsDutch
  • PolandPolski
  • RomaniaRomână
  • SpainEspañol
  • SwedenSvenska
  • SwitzerlandDeutsch
  • TürkiyeTürkçe
  • United KingdomEnglish
Worldwide
  • GlobalEnglish
  • Americas
    • BrasilPortuguês
    • CanadaEnglish
    • CanadaFrançais
    • LATAMEspañol
    • United StatesEnglish
  • Asia-Pacific
    • AustraliaEnglish
    • Chinese Simplified简体中文
    • Chinese Traditional繁體中文
    • IndiaEnglish
    • Japan日本語
    • Korea한국어
    • SingaporeEnglish
  • Europe, Middle East and Africa
    • BulgariaБългарски
    • CzechČeština
    • EuropeEnglish
    • FranceFrançais
    • GermanyDeutsch
    • HungaryMagyar
    • Israelעברית
    • ItalyItaliano
    • NetherlandsDutch
    • PolandPolski
    • RomaniaRomână
    • SpainEspañol
    • SwedenSvenska
    • SwitzerlandDeutsch
    • TürkiyeTürkçe
    • United KingdomEnglish
  • Worldwide
    • GlobalEnglish
Acronis True Image
FOR HOME
MenuMenu
Acronis True Image
Overview
Backup
Cloning
Security
  • Backup features
    Easy BackupEmail BackupAutomatic BackupCloud BackupMobile BackupBackup ReplicationImaging SoftwareData MigrationData RecoverySurvival Kit
  • Security features
    Anti-Malware SoftwareIdentity ProtectionAntivirus SoftwareActive ProtectionReliable CybersecurityCryptojacking BlockerSecurity for MacData Protection
  • Solutions
    Gaming SecurityCloud Photo StorageElectronic SignatureMobile App
All features
Compare
Backup
Cloning
Security
Product features
Backup features
Easy BackupEmail BackupAutomatic BackupCloud BackupMobile BackupBackup ReplicationImaging SoftwareData MigrationData RecoverySurvival Kit
Security features
Anti-Malware SoftwareIdentity ProtectionAntivirus SoftwareActive ProtectionReliable CybersecurityCryptojacking BlockerSecurity for MacData Protection
Solutions
Gaming SecurityCloud Photo StorageElectronic SignatureMobile App
All features
Compare
Acronis

Complete, reliable and easy-to-use cyber protection

New version: Now with boosted security

From $49.99 per year

Industry recognition
Industry recognitionAcronis True Image excels in AV-TEST certification: Unmatched protection and usability  

One solution for all your data protection needs

Backup and recovery

Never lose a file again; quickly move your data to new drives and computers.

  • Full image backups
    Full image backups
    Create complete system disk or partition replicas for efficient recovery of entire systems, individual files or folders as needed.
  • Backup and recovery
    Backup and recovery
    Never lose a file again; quickly move your data to new drives and computers.
  • Realtime disk cloning
    Realtime disk cloning
    Create a disk clone on Windows or macOS without interruption, enabling seamless data migration to larger or faster disks, including the operating system, files, applications and settings.
  • Recovery drive
    Recovery drive
    Effortlessly restore systems to identical or different hardware using bootable media and the integrated Survival Kit tool.
  • Microsoft 365 backup
    Microsoft 365 backup
    Establish direct cloud-to-cloud backups for Microsoft 365 accounts, protecting emails, attachments and OneDrive files and folders.
  • Selective file and folder backups
    Selective file and folder backups
    Control the nature of your backups. Select individual files and folders that you want specific replicas of when you don't want a full image copy.
  • File synchronization and sharing
    File synchronization and sharing
    Replicate your local backup in the cloud automatically so you always have an off-site copy available for recovery. Following the 3-2-1 backup rule has never been easier.
  • Dual protection
    Dual protection
    Create multiple copies of your data locally and in the cloud, ensuring adherence to the 3-2-1 backup rule and the availability of off-site copies for recovery in case of a loss of a local backup.
  • Cloud restore
    Cloud restore
    Access files in your cloud backup from anywhere: download a single file or folder to recover it to another machine, or access your data from another device while traveling.
  • User-specified encryption keys
    User-specified encryption keys
    Establish encrypted backups for individual users in your family, secured by their passwords.
  • End-to-end cryptography
    End-to-end cryptography
    Enterprise-grade AES-256 encryption protects backups on-site, in transit, and in the cloud, maintaining data privacy for everybody, including Acronis.
  • Secure data storage infrastructure
    Secure data storage infrastructure
    Backup data to Acronis data centers, which adhere to stringent security standards, including on-site protections, 24/7 video surveillance, and biometric access control.
  • Try and Decide tool
    Try and Decide tool
    Safely test new software, drivers, system updates and settings with the option to revert to the previous configuration.

Cybersecurity

Prevent viruses and ransomware, and never lose time to recover your system again.

  • Anti-ransomware and cryptojacking protection
    Anti-ransomware and cryptojacking protection
    Defend files, applications and systems against ransomware and cryptojacking attacks through advanced detection and prevention technology, enabling automatic recovery of impacted files.
  • Patch management
    Windows only
    Patch management
    Old apps have security holes that hackers can exploit. What patch management does is make sure these holes don't exist anymore, which will help you to regularly update your applications. This makes your computer, other devices and all your apps much safer.
  • Vulnerability assessments
    Vulnerability assessments
    Evaluate potential security weaknesses in the operating system and applications with a comprehensive vulnerability assessment tool, offering recommendations for updates to enhance security.
  • Two-factor authentication (2FA)
    Two-factor authentication (2FA)
    Protect your account by requiring two different forms of identification, such as a password and a unique verification code.
  • Real-time protection
    Real-time protection
    Safeguard devices and backup files against malicious activity, using continuous threat monitoring to address previously unknown risks.
  • Malicious URL filtering
    Malicious URL filtering
    Restrict access to URLs attempting to deliver malware, ransomware or cryptojackers to systems.
  • On-demand antivirus scan
    On-demand antivirus scan
    Execute malware scans as needed, selecting between rapid file scans or comprehensive system analyses.
  • Signature-based threat analysis
    Signature-based threat analysis
    The threat database is updated every five minutes, ensuring continuous defense against emerging risks.
  • Behavioral analysis engine
    Behavioral analysis engine
    Detect malware upon execution using a dynamic detection engine that identifies threats based on interactions with the system.
  • Quarantine and exclusion management
    Quarantine and exclusion management
    Isolate potential threats while maintaining approved program functionality through controlled exclusion lists.
  • Videoconference security
    Videoconference security
    Protect privacy during Zoom, Cisco Webex or Microsoft Teams videoconferencing sessions.

Acronis RMM

Eliminate the complexity of protecting and managing multiple devices.

  • Cyber protection dashboard
    Cyber protection dashboard
    Easily monitor all devices' backups, data statistics and cybersecurity metrics through an intuitive interface.
  • Flexible management
    Flexible management
    Configure schedules, destinations, and backup types — full image, incremental, differential or custom. Execute remotely quick or full antivirus scans on demand.
  • Unlimited mobile device protection
    Unlimited mobile device protection
    Protect all family smartphones and tablets under a single license.
  • Remote data access
    Remote data access
    Retrieve files or folders from cloud backups on any computer or mobile device, anytime and anywhere.
  • Mobile backup inspection
    Mobile backup inspection
    Browse mobile backup contents directly on the local system.

Identity Protection *

Be in control of your personal data.

* Only available in the U.S. for Advanced and Premium subscriptions.
  • Identity monitoring
    Identity monitoring
    Safeguard personal information, such as social security numbers, and financial details to prevent identity theft.
  • Monitoring portal
    Monitoring portal
    Easy to use portal that monitors the safety of your data and warns you when there is any suspicious activity.
  • Resolution services
    Resolution services
    24 hours a day, every day of the year available to help you restore your identity or losses in case of any breach or theft.
  • Cyber insurance
    Cyber insurance
    You will have up to $1 million in coverage.

Choose the Acronis True Image plan that meets your needs

Essentials

Local backup and anti-ransomware protection

One-year subscription

$49.99per year

  • For 1 computer
  • For 3 computers
  • For 5 computers
  • No data
  • Cloud is not available
  • No data
  • Flexible backups: full image to file level
  • Active disk cloning
  • Quick recovery / Universal restore
  • Ransomware protection
  • FREE UPGRADES to the most recent product version
  • Phone, email and chat support
  • Available for Windows and macOS

Advanced

Local and cloud backup and security

Most popular

One-year subscription

$72.99per year

  • For 1 computer
  • For 3 computers
  • For 5 computers
  • No data
  • 50GB
  • 250GB
  • 500GB
  • No data
  • Flexible backups: full image to file level
  • Active disk cloning
  • Quick recovery / Universal restore
  • Ransomware protection
  • +
  • Identity Protection
  • Block viruses and malware
  • Cloud backup and features
  • Automatic replication of data in the cloud
  • Microsoft 365 backups
  • FREE UPGRADES to the most recent product version
  • Phone, email and chat support
  • Available for Windows and macOS

Premium

Up to 5TB of cloud and local backup and security

One-year subscription

$124.99per year

  • For 1 computer
  • For 3 computers
  • For 5 computers
  • No data
  • 1TB for free
  • 2TB
  • 3TB
  • 4TB
  • 5TB
  • No data
  • Flexible backups: full image to file level
  • Active disk cloning
  • Quick recovery / Universal restore
  • Ransomware protection
  • +
  • Identity Protection
  • Block viruses and malware
  • Cloud backup and features
  • Automatic replication of data in the cloud
  • Microsoft 365 backups
  • +
  • Blockchain certification of files
  • Electronic signatures on files
  • Ability to add up to 5TB of cloud storage
  • FREE UPGRADES to the most recent product version
  • Priority phone, email and chat support
  • Available for Windows and macOS

Give the gift of cyber protection

Get Acronis True Image as a gift

Students save 50% off regular price

Get Acronis True Image for students

(Proof of enrollment required)

Need more details?

Compare our products in depth

Please wait, this may take

a few seconds...

Award-winning cyber protection solution

Over 5.5 million users rely on Acronis True Image every day

Best Windows backup software, PCWorld
Best Windows backup software, PCWorld
Cybersecurity Excellence Awards Winner
Cybersecurity Excellence Awards Winner
Editors' Choice, PCWorld
Editors' Choice, PCWorld
OPSWAT Anti-malware Platinum certification
OPSWAT Anti-malware Platinum certification
100% Detection Rate and 0 False Alarms in independent tests
100% Detection Rate and 0 False Alarms in independent tests
All Awards

Looking for help?

Frequently Asked Questions

  • How do you back up a computer?

    A computer backup is a second copy of your data that you store separately from the original. That includes family photos and videos, documents, emails, contacts, apps and even the operating system that powers your computer. If the originals are located on your laptop or a mobile device, you keep the backup somewhere else that’s safe — that way, you can use the second copy to restore your files or system if something happens to the original.

    To ensure all of this data is accurately copied so you can use it to recover your computer, backup software is a must. A solution like Acronis True Image automatically captures changes to everything, including hidden files that can be missed by manually copying files, and makes the process of recovery easy and efficient.

  • How do you back up a computer to an external hard drive?

    With Acronis True Image, creating a full image backup on an external hard drive is as easy as two clicks. Once the drive is connected and Acronis True Image is running, click Add backup. The entire computer is the default backup source, so you simply need to assign the external drive as the backup destination and then click Back up now.

  • What does it mean to back up a computer to the cloud?

    Computer backups need to be stored someplace safe. Acronis recommends the 3-2-1 backup rule, which includes storing three copies of your data on at least two different types of media (such as external hard drives, network drives, and NAS devices) and keeping one copy off-site. That way, if a fire or flood damages both your original files and the local backup, the off-site copy is available to use for recovery.

    "The cloud" is a term that describes a remote network of computers and servers that you access via the internet. The cloud is a convenient way to store your files off-site, where they are safe from local damage. Subscriptions to the Advanced and Premium editions of Acronis True Image include cloud storage, as well as cloud-based features and "anywhere access" to your data.

    With Acronis True Image, you also have the ability to automatically replicate local backups in the Acronis Cloud, so you always have an off-site copy of your data available without having to manage a separate backup plan. By choosing this option, after the first successful backup, your backup and replication will be done simultaneously.

  • What is Acronis anti-malware protection?

    Acronis' advanced anti-malware gives you peace of mind by delivering outstanding multilayered threat protection. It uses a set of integrated technologies that address specific attack vectors:

    • Superb protection against known and unknown malware, including ransomware, cryptojackers, and fileless attacks.
    • Behavioral analysis and dynamic detection rules that combat any emerging threats.
    • On-demand antivirus scan that checks all files on your computer for any kind of malware: Trojans, viruses, backdoors, worms, keyloggers, spyware and others.

    Acronis continuously safeguards your device and backups from the latest cyberthreats.

  • Do I need Acronis anti-malware protection if I already have specialized antivirus, anti-malware, firewall, or other security software?

    Yes. Acronis anti-malware uses a set of integrated technologies that deliver data protection capabilities many third-party antiviruses don't.

    • It keeps your backup safe. A dedicated module of Acronis anti-malware protection guards your backup files and the backup agent, preventing deletion or alteration by malware.
    • It restores ransomware-affected files automatically. The majority of other security software only prevents the attack, without automatically recovering the ciphered data.

  • Is Acronis' anti-malware protection compatible with other anti-malware solutions?

    We are aware that you may have specialized antivirus, web filtering, or other security software installed on your device. Although we recommend uninstalling the third-party software and fully relying on Acronis' anti-malware solution, you can still keep it active.

    Acronis' anti-malware protection is compatible with most common anti-malware solutions. They do not conflict with each other for resources and do not create extra overhead on the system.

    However, our real-time protection switches on only if there is no third-party real-time protection solution running on your device. If third-party software is detected, you'll receive a message on your protection dashboard notifying you that another piece of software is protecting you from malicious files.

    Note: If you continue using an existing third-party solution for device protection rather than Acronis' anti-malware, we cannot guarantee the reliability of that third-party protection.

Product help
If you need product assistance, you can find helpful materials in the Knowledge Base. Or, post questions on our discussion boards.
Technical support
For subscription owners, there is free, 24-hour technical support. Refer to the Technical Support Site to find the appropriate support contact.
Engage with Acronis

Tips, news and promo offers

  • Legal information
  • Privacy policy
  • Cookie Notice
  • Notice of collection
  • Sustainability & governance
© 2003–2025 Acronis International GmbH.

Sorry, your browser is not supported.

It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.

© 2003–2025 Acronis International GmbH. All rights reserved.
Legal information