Compare Acronis Cyber Protect Cloud and Wazuh - The Open Source Security Platform

Save your comparisonKeep these tools in one place and come back anytime.
Save to board
At a Glance
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Star Rating
(1,317)4.7 out of 5
Market Segments
Small-Business (69.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Free Trial is available
Browse all 2 pricing plans
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Star Rating
(65)4.5 out of 5
Market Segments
Small-Business (49.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Wazuh - The Open Source Security Platform
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Acronis Cyber Protect Cloud excels in providing a unified cyber-protection platform, which combines a single agent and console for streamlined management. Users appreciate the centralized management that offers strong visibility across client sites, making it easier to integrate with essential tools like Microsoft 365 and SQL Server.
  • Users say Wazuh stands out for its open-source nature and cost-effectiveness, making it an attractive option for small-scale companies. Reviewers highlight its user-friendly interface and simpler learning curve, which can be particularly beneficial for teams with limited resources.
  • According to verified reviews, Acronis Cyber Protect Cloud receives high marks for its ease of use and quick implementation. Users frequently mention that the onboarding process is intuitive, allowing them to start utilizing the platform effectively from day one.
  • Reviewers mention that Wazuh provides impressive visibility and control over security events across the entire infrastructure. Its capabilities in real-time threat detection and log analysis are particularly noted as powerful features for an open-source platform, giving users confidence in their security posture.
  • G2 reviewers highlight the quality of support offered by Acronis Cyber Protect Cloud, with many praising the knowledgeable staff who go above and beyond to assist with inquiries. This level of support can significantly enhance the user experience, especially for businesses that rely on timely assistance.
  • Users report that while Wazuh is easy to install and configure, it may require more technical expertise for advanced customizations. Some users find that creating rules and decoders for custom logs can be challenging, which might limit its appeal for organizations without dedicated IT resources.
Pricing
Entry-Level Pricing
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Free Trial
Browse all 2 pricing plans
Wazuh - The Open Source Security Platform
No pricing available
Free Trial
Acronis Cyber Protect Cloud
Free Trial is available
Wazuh - The Open Source Security Platform
No trial information available
Ratings
Meets Requirements
9.1
1,061
8.8
48
Ease of Use
9.1
1,080
8.6
48
Ease of Setup
9.1
1,027
8.0
29
Ease of Admin
9.1
912
8.6
28
Quality of Support
8.8
1,043
8.2
46
Has the product been a good partner in doing business?
9.3
913
8.5
23
Product Direction (% positive)
9.4
1,024
9.0
46
Features by Category
9.1
697
Not enough data
Compatibility
9.5
638
Not enough data
9.2
605
Not enough data
9.4
613
Not enough data
9.1
530
Not enough data
Management
9.3
589
Not enough data
9.1
589
Not enough data
9.4
612
Not enough data
9.4
611
Not enough data
9.0
586
Not enough data
Compliance
9.2
572
Not enough data
9.3
586
Not enough data
9.0
530
Not enough data
Agentic AI - Server Backup
8.7
49
Not enough data
8.6
49
Not enough data
8.7
51
Not enough data
8.6
50
Not enough data
8.7
50
Not enough data
8.8
49
Not enough data
9.0
393
Not enough data
Functionality
9.0
308
Not enough data
9.4
339
Not enough data
9.4
340
Not enough data
9.2
322
Not enough data
Compatibility
9.1
321
Not enough data
9.1
310
Not enough data
9.1
312
Not enough data
Management
8.9
287
Not enough data
9.2
311
Not enough data
9.2
322
Not enough data
Agentic AI - SaaS Backup
8.6
27
Not enough data
8.5
27
Not enough data
9.0
28
Not enough data
9.1
27
Not enough data
8.9
27
Not enough data
9.0
26
Not enough data
8.8
26
Not enough data
Remote Monitoring & Management (RMM)Hide 19 FeaturesShow 19 Features
Not enough data
Not enough data
Inventory Management - Remote Monitoring & Management (RMM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
IT Operations & Workflow - Remote Monitoring & Management (RMM)
Not enough data
Not enough data
Service Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Remote Monitoring & Management (RMM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.1
216
Not enough data
Administration
9.1
200
Not enough data
9.1
204
Not enough data
9.1
203
Not enough data
8.9
201
Not enough data
Maintenance
8.9
199
Not enough data
9.1
197
Not enough data
9.2
199
Not enough data
9.0
195
Not enough data
Security
9.1
203
Not enough data
9.2
201
Not enough data
9.1
197
Not enough data
9.2
197
Not enough data
9.2
198
Not enough data
9.1
195
Not enough data
9.0
573
Not enough data
Data Protection
8.9
439
Not enough data
9.2
489
Not enough data
9.0
492
Not enough data
8.9
460
Not enough data
9.0
459
Not enough data
Analysis
8.8
432
Not enough data
9.0
454
Not enough data
Feature Not Available
Not enough data
Administration
8.9
461
Not enough data
9.0
459
Not enough data
8.9
462
Not enough data
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
9.0
137
Not enough data
Administration
9.2
124
Not enough data
9.0
129
Not enough data
8.9
127
Not enough data
9.1
128
Not enough data
9.1
126
Not enough data
Functionality
8.9
123
Not enough data
8.9
122
Not enough data
9.1
127
Not enough data
9.2
128
Not enough data
Analysis
9.0
122
Not enough data
9.1
121
Not enough data
9.1
121
Not enough data
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Platform Features
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Automation Capabilities
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
9.4
37
Not enough data
Services - Endpoint Detection & Response (EDR)
9.4
37
Not enough data
Not enough data
8.0
27
Response
Not enough data
7.9
24
Not enough data
7.9
23
Not enough data
7.8
22
Not enough data
8.5
25
Records
Not enough data
9.1
25
Not enough data
8.2
25
Not enough data
7.9
22
Management
Not enough data
8.8
24
Not enough data
7.9
21
Not enough data
7.9
21
Generative AI
Not enough data
7.0
10
Not enough data
6.7
10
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Acronis Cyber Protect Cloud and Wazuh - The Open Source Security Platform are categorized as Endpoint Detection & Response (EDR)
Reviews
Reviewers' Company Size
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Small-Business(50 or fewer emp.)
69.9%
Mid-Market(51-1000 emp.)
27.7%
Enterprise(> 1000 emp.)
2.4%
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Small-Business(50 or fewer emp.)
49.2%
Mid-Market(51-1000 emp.)
36.5%
Enterprise(> 1000 emp.)
14.3%
Reviewers' Industry
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Information Technology and Services
35.4%
Computer & Network Security
25.2%
Computer Software
4.4%
Accounting
4.3%
Computer Networking
2.8%
Other
27.9%
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform
Information Technology and Services
38.1%
Computer & Network Security
19.0%
Computer Software
11.1%
Security and Investigations
4.8%
Hospital & Health Care
4.8%
Other
22.2%
Alternatives
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud Alternatives
NinjaOne
NinjaOne
Add NinjaOne
CyberSentriq
CyberSentriq
Add CyberSentriq
Druva Data Security Cloud
Druva Data Security Cloud
Add Druva Data Security Cloud
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
Datadog
Datadog
Add Datadog
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
CrowdSec
CrowdSec
Add CrowdSec
Discussions
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud Discussions
What is Acronis Cyber Protect Cloud used for?
2 Comments
AM
Acronis Cyber protect cloud is a all in one package for the entire business cyber security which includes Antivirus, Ransomware and malware protection ,Patch...Read more
can you provide learning docs or links to learn more about the product.
1 Comment
Official Response from Acronis Cyber Protect Cloud
Hi! Thank you for your interest in Acronis Cyber Protect Cloud! We'd recommend checking out our Demo Center and “Under 10min” overviews...Read more
How do I prevent VSS writer issues that prevent Acronis from running?
1 Comment
Official Response from Acronis Cyber Protect Cloud
Hi Cassidy! Thank you for your question! VSS-related issues might be somewhat tricky to prevent, but here we have a troubleshooting article that provides...Read more
Wazuh - The Open Source Security Platform
Wazuh - The Open Source Security Platform Discussions
What is Wazuh - The Open Source Security Platform used for?
1 Comment
Nikhil D.
ND
We use wazuh in Amazon AWS to monitor virtual machines and cloud instances. Apart from it it can be used for endpoint security, we just need to install an...Read more
Monty the Mongoose crying
Wazuh - The Open Source Security Platform has no more discussions with answers