Acronis Cyber Protect Cloud Features
Compatibility (7)
File Server Backup
The ability to store information from filesystems.
Database Server Backup
The ability to backup data from relational and NoSQL databases.
Virtual Machines
Support for secure virtualized tape or disk storage.
Repository Models
Support for various backup storage and operational processes. Examples include system imaging, incremental backup, or differential backup.
Endpoint Variety
The ability to back up different devices such as computers
SaaS Application Variety
Backup support for multiple, different software as a service (SaaS) applications
Storage Formats
The ability to store multiple types of file formats or convert files to proper format.
Management (8)
Continuous Backup
The abillity to automate backups or have backup storage updated continuously.
Disaster Recovery
Delegate backup settings to facilitate specific recovery in the result of a disaster.
Storage Capacity
The ability to store large amounts of data or scale capacity to fit storage needs.
Remote Backup
Provides remote access dashboards designed to manage and store data from familiar applications.
Activity Monitoring
Actively monitor status of work stations either on-premise or remote.
File Sharing
Gives users the abilitity to access or send backup files stored online.
Security Standards
The ability to set standards for asset and risk management.
Encrypted Storage
Provides some level of encryption of data in transit and sensitive data while it lives online.
Compliance (3)
Security Standards
The ability to set standards for asset and risk management.
Cloud Data Protection
Provides high quality and wide scope of in-cloud and offline data security capabilities.
Data Deduplication
Deduplication, creating synthetic backup files, to reduce file size and eliminate redundant files.
Functionality (8)
Real-time Sync
Continuously updates backup files to reflect most recent changes and updates.
Storage Capacity
The ability to store large amounts of data or scale capacity to fit storage needs.
Remote Backup
Provides remote access dashboards designed to manage and store data from familiar applications.
Versioning
Keeps track of incrementally changing versions of the same content, data, and files.
System Isolation
Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Firewall
Protects endpoint devices from a variety of attacks and malware threats.
Endpoint Intelligence
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences.
Administration (12)
Intelligence Reporting
Actively gathers data on suspicious sources and characteristics of potentially malicious content
Email Integration Suppor
Supports secure implementation with popular email applications and clients.
Access Management
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Data Loss Prevention
Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information.
Auditing
Documents access and alterations of the database for analytics and reporting.
Data Discovery
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
Access Control
Supports LDAP Protocol to enable access control and governance.
Compliance
Monitors assets and enforces security policies to audit assets and infrastructure security.
Web Control
Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.
Application Control
Blocks endpoint users from accessing restricted applications.
Asset Management
Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Device Control
Manages user network accessibility on laptops and mobile devices.
Maintenance (4)
Auditing
Access pre-built and custom reports to monitor user activity and storage.
Allow and block lists
Prevents previous committers of fraud and other suspicious accounts from future communications
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Archiving
Archives conversations, files, and other communications for future reference
Security (6)
Anti-Malware/Anti-Spam
Prevents malware or spam in emails either through predictive or reactive anti-malware/anti-spam tools.
Encryption
Encrypts the content of emails and their attachments.
Quarantine
Isolates potentially malicious content and files before they can gain network access
Advanced Threat Protection (ATP)
Includes advanced tools, including machine learning analysis to detect threats often missed by traditional filtering tools, such as unsafe attachments, advanced malware, and targetted social engineering attacks.
Anti-Phishing
Prevents both phishing attacks and spear-fishing attacks, including impersonation attacks.
Account takeover prevention
Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information.
Data Protection (5)
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Data Encryption/Security
Manages policies for user data access and data encryption.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Analysis (5)
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Incident Reports
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Behavioral Analysis
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Agentic AI - SaaS Backup (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Server Backup (6)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Services - Endpoint Detection & Response (EDR) (1)
Managed Services
Offers managed detection and response services.





