Compare Acronis Cyber Protect Cloud and Microsoft Defender for Endpoint

At a Glance
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Star Rating
(1,307)4.7 out of 5
Market Segments
Small-Business (69.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint
Star Rating
(307)4.4 out of 5
Market Segments
Enterprise (38.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Microsoft Defender for Endpoint
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Acronis Cyber Protect Cloud excels in ease of use, with users highlighting its unified cyber-protection platform that combines a single agent and console. This integration simplifies management and enhances visibility across client sites, making it a favorite among small businesses.
  • Users say that Microsoft Defender for Endpoint offers strong integration with the Microsoft ecosystem, which is particularly beneficial for organizations already utilizing Microsoft 365 and Azure. This tight integration allows for advanced threat detection and automated response capabilities, which users find invaluable.
  • Reviewers mention that Acronis Cyber Protect Cloud provides excellent customer support, with many praising the responsiveness and knowledge of the support team. Users have noted that their inquiries are handled promptly, which contributes to a smoother overall experience.
  • According to verified reviews, Microsoft Defender for Endpoint is recognized for its robust malware protection and threat detection features. Users appreciate its ability to manage security across their organization effectively, although some have noted that it can be complex to configure initially.
  • G2 reviewers highlight that Acronis Cyber Protect Cloud's centralized management system not only enhances visibility but also integrates seamlessly with various products, including Microsoft 365 and SQL Server. This flexibility is particularly appealing to small businesses looking for comprehensive solutions.
  • Users report that while Microsoft Defender for Endpoint has strong capabilities, it faces challenges in user satisfaction compared to Acronis Cyber Protect Cloud, which boasts a higher overall satisfaction score. This difference may influence decisions for organizations prioritizing user experience and support.
Pricing
Entry-Level Pricing
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Free Trial
Browse all 2 pricing plans
Microsoft Defender for Endpoint
No pricing available
Free Trial
Acronis Cyber Protect Cloud
Free Trial is available
Microsoft Defender for Endpoint
No trial information available
Ratings
Meets Requirements
9.1
1,052
8.6
248
Ease of Use
9.1
1,071
8.6
253
Ease of Setup
9.1
1,020
8.5
163
Ease of Admin
9.1
910
8.6
156
Quality of Support
8.8
1,034
8.5
238
Has the product been a good partner in doing business?
9.2
911
8.6
152
Product Direction (% positive)
9.4
1,016
9.1
247
Features by Category
9.1
694
Not enough data
Compatibility
9.5
636
Not enough data
9.2
604
Not enough data
9.4
611
Not enough data
9.1
529
Not enough data
Management
9.3
588
Not enough data
9.1
588
Not enough data
9.4
611
Not enough data
9.4
610
Not enough data
9.0
586
Not enough data
Compliance
9.2
571
Not enough data
9.3
585
Not enough data
9.0
530
Not enough data
Agentic AI - Server Backup
8.7
49
Not enough data
8.6
49
Not enough data
8.7
51
Not enough data
8.5
49
Not enough data
8.7
50
Not enough data
8.8
49
Not enough data
9.0
392
Not enough data
Functionality
9.0
308
Not enough data
9.4
338
Not enough data
9.4
339
Not enough data
9.2
321
Not enough data
Compatibility
9.1
320
Not enough data
9.1
310
Not enough data
9.1
311
Not enough data
Management
8.9
287
Not enough data
9.2
311
Not enough data
9.2
322
Not enough data
Agentic AI - SaaS Backup
8.6
27
Not enough data
8.5
27
Not enough data
9.0
28
Not enough data
9.1
27
Not enough data
8.9
27
Not enough data
9.0
26
Not enough data
8.8
26
Not enough data
9.1
214
Not enough data
Administration
9.1
199
Not enough data
9.1
203
Not enough data
9.1
202
Not enough data
8.9
200
Not enough data
Maintenance
8.9
198
Not enough data
9.1
196
Not enough data
9.2
198
Not enough data
9.0
195
Not enough data
Security
9.1
202
Not enough data
9.2
200
Not enough data
9.1
196
Not enough data
9.2
196
Not enough data
9.2
196
Not enough data
9.1
194
Not enough data
9.0
569
Not enough data
Data Protection
8.9
438
Not enough data
9.2
488
Not enough data
9.0
490
Not enough data
8.9
459
Not enough data
9.0
458
Not enough data
Analysis
8.8
431
Not enough data
8.9
452
Not enough data
Feature Not Available
Not enough data
Administration
8.9
459
Not enough data
9.0
458
Not enough data
8.9
461
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
9.0
135
8.6
24
Administration
9.1
123
8.8
21
9.0
128
8.3
21
8.9
126
8.6
21
9.1
127
8.5
21
9.1
125
8.8
21
Functionality
8.9
122
9.0
21
8.9
122
8.6
21
9.1
126
8.9
22
9.2
126
8.5
21
Analysis
9.0
121
8.4
22
9.1
120
8.4
21
9.1
120
8.3
21
Not enough data
8.0
57
Generative AI
Not enough data
8.0
52
Not enough data
8.0
52
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
9.4
36
Not enough data
Services - Endpoint Detection & Response (EDR)
9.4
36
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint
Acronis Cyber Protect Cloud and Microsoft Defender for Endpoint are categorized as Endpoint Detection & Response (EDR) and Endpoint Protection Platforms
Unique Categories
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud is categorized as Cloud Data Security, Cloud Email Security, Server Backup, SaaS Backup, and Patch Management
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint is categorized as Antivirus
Reviews
Reviewers' Company Size
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Small-Business(50 or fewer emp.)
69.8%
Mid-Market(51-1000 emp.)
27.8%
Enterprise(> 1000 emp.)
2.4%
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint
Small-Business(50 or fewer emp.)
26.7%
Mid-Market(51-1000 emp.)
34.8%
Enterprise(> 1000 emp.)
38.5%
Reviewers' Industry
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Information Technology and Services
35.1%
Computer & Network Security
25.3%
Computer Software
4.4%
Accounting
4.4%
Computer Networking
2.8%
Other
28.0%
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint
Information Technology and Services
25.3%
Computer & Network Security
14.2%
Financial Services
6.1%
Computer Software
6.1%
Telecommunications
2.4%
Other
45.9%
Alternatives
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud Alternatives
CyberSentriq
CyberSentriq
Add CyberSentriq
Druva Data Security Cloud
Druva Data Security Cloud
Add Druva Data Security Cloud
NinjaOne
NinjaOne
Add NinjaOne
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint Alternatives
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Trellix Endpoint Security
Trellix Endpoint Security
Add Trellix Endpoint Security
Discussions
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud Discussions
What is Acronis Cyber Protect Cloud used for?
2 Comments
AM
Acronis Cyber protect cloud is a all in one package for the entire business cyber security which includes Antivirus, Ransomware and malware protection ,Patch...Read more
can you provide learning docs or links to learn more about the product.
1 Comment
Official Response from Acronis Cyber Protect Cloud
Hi! Thank you for your interest in Acronis Cyber Protect Cloud! We'd recommend checking out our Demo Center and “Under 10min” overviews...Read more
How do I prevent VSS writer issues that prevent Acronis from running?
1 Comment
Official Response from Acronis Cyber Protect Cloud
Hi Cassidy! Thank you for your question! VSS-related issues might be somewhat tricky to prevent, but here we have a troubleshooting article that provides...Read more
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint Discussions
What is Endpoint Defender?
1 Comment
kiran p.
KP
In general terms, "Endpoint Defender" could potentially refer to a category of cybersecurity solutions designed to protect individual devices (endpoints)...Read more
Which feature in Microsoft Defender for endpoint?
1 Comment
Niket M.
NM
Comprehensive protection: Microsoft Defender for Endpoint provides protection against a wide range of threats, including viruses, malware, ransomware, and...Read more
when scheduled scan starts it consume 100% CPU, can you kindly provide solution for it.
1 Comment
PQ
Method I: Ensure that no other Adware, Antimalware or Antivirus software is installed or not fully removed Method II: Prevent Windows Defender from scanning...Read more