Acronis Cyber Protect Cloud Features
Compatibility (7)
File Server Backup
The ability to store information from filesystems.
Database Server Backup
The ability to backup data from relational and NoSQL databases.
Virtual Machines
Support for secure virtualized tape or disk storage.
Repository Models
Support for various backup storage and operational processes. Examples include system imaging, incremental backup, or differential backup.
Endpoint Variety
The ability to back up different devices such as computers
SaaS Application Variety
Backup support for multiple, different software as a service (SaaS) applications
Storage Formats
The ability to store multiple types of file formats or convert files to proper format.
Management (8)
Continuous Backup
The abillity to automate backups or have backup storage updated continuously.
Disaster Recovery
Delegate backup settings to facilitate specific recovery in the result of a disaster.
Storage Capacity
The ability to store large amounts of data or scale capacity to fit storage needs.
Remote Backup
Provides remote access dashboards designed to manage and store data from familiar applications.
Activity Monitoring
Actively monitor status of work stations either on-premise or remote.
File Sharing
Gives users the abilitity to access or send backup files stored online.
Security Standards
The ability to set standards for asset and risk management.
Encrypted Storage
Provides some level of encryption of data in transit and sensitive data while it lives online.
Compliance (3)
Security Standards
The ability to set standards for asset and risk management.
Cloud Data Protection
Provides high quality and wide scope of in-cloud and offline data security capabilities.
Data Deduplication
Deduplication, creating synthetic backup files, to reduce file size and eliminate redundant files.
Functionality (8)
Real-time Sync
Continuously updates backup files to reflect most recent changes and updates.
Storage Capacity
The ability to store large amounts of data or scale capacity to fit storage needs.
Remote Backup
Provides remote access dashboards designed to manage and store data from familiar applications.
Versioning
Keeps track of incrementally changing versions of the same content, data, and files.
System Isolation
Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Firewall
Protects endpoint devices from a variety of attacks and malware threats.
Endpoint Intelligence
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences.
Inventory Management - Remote Monitoring & Management (RMM) (3)
Device Management
Unifies endpoint management of employee devices
Asset Management
Maintains detailed records of network assets and their activity; detects new assets accessing the network
ITIL Policy Compliance
Supports implementation and adherence to ITIL processes and regulations
Monitoring and Management (5)
Remote Monitoring
Monitor IT asset activity remotely from an administrator terminal.
Asset Tracking
Tracks IT assets and financial data.
Application Deployment
Releases applications for access on desktop or mobile devices.
Patch Management
Automates the updating of security measures on enterprise devices.
Asset Tracking
Tracks IT assets including financial and lifecycle data.
IT Operations & Workflow - Remote Monitoring & Management (RMM) (1)
Workflow Management
Enables creation and optimization of workflows for IT support and service delivery
Service Management (3)
Remote Access
Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network.
Service Management (Issue Prioritization)
Analyzes operational data to proactively identify and prioritize IT issues.
Ticketing
Provides tools for creating and managing support tickets across departments
Administration (12)
Intelligence Reporting
Actively gathers data on suspicious sources and characteristics of potentially malicious content
Email Integration Suppor
Supports secure implementation with popular email applications and clients.
Access Management
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Data Loss Prevention
Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information.
Auditing
Documents access and alterations of the database for analytics and reporting.
Data Discovery
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
Access Control
Supports LDAP Protocol to enable access control and governance.
Compliance
Monitors assets and enforces security policies to audit assets and infrastructure security.
Web Control
Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.
Application Control
Blocks endpoint users from accessing restricted applications.
Asset Management
Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Device Control
Manages user network accessibility on laptops and mobile devices.
Maintenance (4)
Auditing
Access pre-built and custom reports to monitor user activity and storage.
Allow and block lists
Prevents previous committers of fraud and other suspicious accounts from future communications
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Archiving
Archives conversations, files, and other communications for future reference
Security (6)
Anti-Malware/Anti-Spam
Prevents malware or spam in emails either through predictive or reactive anti-malware/anti-spam tools.
Encryption
Encrypts the content of emails and their attachments.
Quarantine
Isolates potentially malicious content and files before they can gain network access
Advanced Threat Protection (ATP)
Includes advanced tools, including machine learning analysis to detect threats often missed by traditional filtering tools, such as unsafe attachments, advanced malware, and targetted social engineering attacks.
Anti-Phishing
Prevents both phishing attacks and spear-fishing attacks, including impersonation attacks.
Account takeover prevention
Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information.
Data Protection (5)
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Data Encryption/Security
Manages policies for user data access and data encryption.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Analysis (5)
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Incident Reports
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Behavioral Analysis
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Core Functions (3)
Server Virtualization
Virtualize server resources into one or more isolated virtual environments.
Storage Virtualization
Virtualize and distribute storage capabilties through abstraction.
Network Virtualization
Virtualize network administration and monitoring for other virtualized resources.
General Functionality (4)
Dynamic Scaling
Scale resources automatically, adjusting for usage demands.
High Availability
Maintain high performance and uptime for all users.
Data Security
Offer security options for data and infrastructure access, e.g. encryption, key management, and MFA.
Backup and Recovery
Offer backup and recovery capabilties for virtualized resources.
Configuration (2)
Appliance Independence
Hyperconverged infrastructure solution is appliance independent and functions on a variety of compatible hardware.
Hardware Integration
Integrate with other data center storage and server hardware, as well as software infrastructure.
Platform Features (7)
24/7 support
Provides 24/7 support to customers with technical questions.
Proactive report alerts
Proactively sends reports or alerts to customers.
Application control
Lets users detect and block applications that are not a security threat.
Proactive threat hunting
Proactively hunts threats.
Rapid response time
Provides rapid reponse time to cyber threats.
Customizeable reports
Provides the ability to customize reports.
Managed Services
Offers MDR as a service.
Automation Capabilities (3)
Automated remediation
Ability to automatically neutralize or eliminate active vulnerabilities.
Automated investigation
Ability to automatically investigate networks and endpoints for threats.
AI Agents
Utilizes AI agents for detection and response tasks.
Generative AI (1)
AI Text Summarization
Condenses long documents or text into a brief summary.
Agentic AI - Hyperconverged Infrastructure (HCI) Solutions (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Adaptive Learning
Improves performance based on feedback and experience
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - SaaS Backup (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Server Backup (6)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Remote Monitoring & Management (RMM) (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Services - Endpoint Detection & Response (EDR) (1)
Managed Services
Offers managed detection and response services.





