Acronis Cyber Backup Cloud protects more than 20 platforms and incorporates the backup industry’s most advanced anti-ransomware technology, safeguarding data and systems in any environment physical or virtualized, on-premises or in the cloud.
2. 2
Acronis Cyber Backup Cloud
Azure
Windows
Server
Windows
PC
Exchange
SQL
Server
Share
Point
Active
Directory
Hyper-V
Office
365
Mac iPad
iPhone
Linux
Server
Android
Amazon
EC2
VMware
vSphere
Oracle x86
VM Server
Red Hat
Virtualization
Linux
KVM
Citrix
XenServer
Virtuozzo Nutanix
Acronis Cyber Backup Cloud protects more than 20 platforms and
incorporates the backup industry’s most advanced anti-ransomware
technology, safeguarding data and systems in any environment –
physical or virtualized, on-premises or in the cloud.
G Suite
Oracle
Database
SAP
HANA
Tekvizyon
3. 3
Acronis Cyber Backup Cloud: Key Features
Complete
Business Protection
• Windows, Linux, Mac
• VMware, Hyper-V, Virtuozzo, Citrix
XenServer, RHEV, KVM, Oracle VM
Server, Nutanix Acropolis
• Amazon EC2, Azure VMs
• Office 365, G Suite
• Application-aware backup for
Microsoft Exchange, SQL Server,
SharePoint, Active Directory,
SAP HANA, Oracle Database
• iOS, Android
Flexible
Storage Options
• Acronis Cyber Infrastructure (on
customer premises or in the SP
data center)
• Networked storage –
SMB/CIFS/DFS and NFS shares
• Acronis Cyber Cloud Storage
• Google Cloud Platform
• Microsoft Azure
• External NFS shares
• Amazon S3
• IBM Cloud (S3)
• Alibaba Cloud (S3)
• IIJ (S3)
• Cleversafe (S3)
• Swift object storage
• Softlayer (Swift)
Fastest
Recovery
• Granular recovery
• Bare-metal recovery
• Full-image and file-level recovery
• Acronis Universal Restore
• Acronis Instant Restore
• Acronis vmFlashback
• Remote recovery
• Any-to-any migration
• Self-service recovery web console
Intuitive
Scalable Management
• Multi-tenant service
• Multiple points of custom branding
• Granular control over quotas
• Free customer trials
• Automated backup agent updates
Innovative
Data Protection
• Acronis Active Protection
• Acronis Notary
• Acronis ASign
• TIBX archive format
• Encryption and password protection
Tekvizyon
4. 4
Hybrid Cloud Backup and Recovery with Acronis
Centralized data
protection management
Cloud
Storage
AES-256 data encryption
in transit and at rest
Monitoring and
alerting
Backup
to Cloud
Recovery
from Cloud
Self-service
recovery console
CUSTOMER WORKLOADS
Servers Virtual Workstations Cloud Apps Mobile Websites
Local disks,
network storage
Acronis Cyber
Infrastructure
LOCAL STORAGE
Image-based or file-level backups
Incremental and differential backups
In-archive deduplication and compression
Physical data shipping
BACKUP OPTIONS
Full-image and file-level recovery
Bare-metal recovery
Run as VM with Acronis Instant Restore
Dissimilar hardware recovery
Any-to-any migration
RECOVERY OPTIONS
Backup
to Local Storage
Recovery
from Local Storage
Backup Replication
to Cloud
Tekvizyon
5. 5
Complete Microsoft 365 Protection
Backup for
Microsoft OneDrive
for Business
Backup for
Microsoft Exchange
Online
Backup for
Microsoft SharePoint
Online
• Back up from Microsoft data centers directly to cloud storage
• Automatically protect new Microsoft Office 365 users, groups and sites
• Search through Microsoft Office 365 backups to get quick access to your backed-up data
• Support of Office 365 data centers in Germany
NEW NEW
ENHANCED
Tekvizyon
6. 6
G Suite Data Backup with Acronis Cyber Backup Cloud
Get an efficient cloud-to-
cloud solution with nothing
to install
Flexible restore options – from
single items to a user’s entire
Drive or Gmail data
Protection for Gmail, Drive
(including Team Drives),
Calendar and Contacts
Verify the authenticity
of files in Drive backups with
blockchain
Ready-to-use cloud storage
options include Google,
Microsoft, and Acronis
Search G Suite backups – with
metadata and full-text (email body
copy) capabilities
Tekvizyon
8. 8
Acronis Cyber Disaster Recovery Cloud
Upsell disaster recovery with the flip of a switch
Built on
Acronis Cyber
Backup Cloud
Turn-key,
SaaS-based
solution
Enable disaster
recovery in
minutes
Virtual and
physical workload
protection
Disaster
recovery
orchestration
Boost your business with a turn-key DRaaS solution for service providers
that is built on top of Acronis Cyber Backup Cloud
Tekvizyon
9. 9
Disaster Recovery to
Acronis Cloud Recovery Site
Full Image Backup
App Replication
Failback
Acronis Cloud Recovery Site
Secure VPN
• Production Failover
• Failover Testing
• Cloud Servers Backup
Recovery & Primary Servers
Customers’ Sites
VIRTUAL SERVERS
PHYSICAL SERVERS
APPLICATIONS
Windows, Linux
With built-in replication
like SQL Server AlwaysOn
VMware vSphere, Microsoft Hyper-V,
Linux KVM, Red Hat Virtualization
Hot and Cold Storage
Tekvizyon
10. 10
Disaster Recovery for Any Workload
Virtualization platforms
• VMware vSphere
• Microsoft Hyper-V
• Linux KVM
• Red Hat Virtualization
• Citrix XenServer
Physical and virtual machines • Windows • Linux
Application-aware backup and recovery • Microsoft Exchange
• Microsoft SQL Server
• Microsoft SharePoint
• Microsoft Active Directory
Cloud servers for real-time
application replication
• For applications with built-in replication
like SQL Server AlwaysOn
Windows
Server
Exchange
SQL
Server
Share
Point
Active
Directory
Hyper-V
Linux
Server
VMware
vSphere
Red Hat
Virtualization
Linux
KVM
Citrix
XenServer
Tekvizyon
11. 11
Improve RTOs and Automate Disaster
Recovery with Runbooks
The new runbooks feature simplifies
and speeds up failover of multiple
machines to a cloud recovery site.
It allows efficient operations to
automate failover and testing and
ensures the systems are recovered
in the right order to address
interdependencies between
applications on different machines.
Tekvizyon
13. 13
Anti-Malware
Next-generation, full-stack, AI/ML-
based protection against malware,
including ransomware and cryptominers
Backup and
Recovery
Fast and reliable recovery of your
apps, systems and data on any
device from any incident
Security and
Management
Comprehensive yet simple
endpoint management
toolkit, which saves IT resources
One solution integrates backup, disaster recovery, AI-based protection against malware
and ransomware, remote desktop, and security tools in a single agent
Acronis Cyber Protect
Tekvizyon
15. 15
One Protection Plan
Covers all cyber
protection aspects:
• Backup
• Anti-malware protection
• URL filtering
• Vulnerability assessment
• Patch management
• Data discovery (via data protection map)
• Windows Defender Antivirus and Microsoft
Security Essentials management
Why? Better protection with less effort, automated
Tekvizyon
16. 16
Vulnerability Assessment and Patch Management
Key features:
▪ Continuous, daily updates of
Acronis’ vulnerability and patch
management database
▪ Local-network-traffic optimization,
by using peer-to-peer update
technology
▪ Patch testing and quality control
with auto-approval capability
▪ Windows and Linux support
Tekvizyon
17. 17
Patch Management
Fix an issue before an issue happens
Large common vulnerabilities and
exposures database, 250-300 new
CVEs weekly
• Auto-approval of patches
• Deployment on a schedule
• Manual deployment
• Flexible reboot and maintenance window options
• Staged deployment
• All Windows updates including MS Office, and
Win10 apps
• Support for patch management of Microsoft and
third-party software on Windows
Why? Automates protection, mitigates potential threats, prevents attacks (e.g. Equifax, WannaCry)
Tekvizyon
18. 18
Significantly Extended Anti-Malware Capabilities
Acronis
Active
Protection
Anti-ransomware, anti-
cryptojacking, AI- and
ML-enabled
Acronis
static
AI analyzer
On-access and
on-demand
detection
Acronis
anti-malware
engine
Any malware
(cloud and local
detection)
Acronis
behavioral
engine
On-access
detection
Acronis
Cyber Backup
Acronis Cyber Protect
Native integration with Windows Security Center
Why? Active prevention of downtime and data loss, not just recovery after an attack
Tekvizyon
19. 19
Anti-Malware Protection
Full-stack anti-malware protection for
Windows and macOS
• Real-time protection against malware
• Cryptomining process detection
• Ransomware detection
• On-demand scanning
• Self-protection: Protect Acronis components (e.g. registry,
service stopping, Acronis file protecting)
• Network folder protection: Protect the data in shared
folders on your machine against ransomware
• Server-side protection: Protect the data in shared folders
within your network against ransomware
• Files quarantine
• Exclusions management: Specify processes that will not
be considered malware; exclude folders where file
changes will not be monitored; select files and folders
where scheduled scanning will not be executed
Tekvizyon
20. 20
URL Filtering Controls Access to Malicious URLs
URL filtering allows you to control
access to internet websites by
permitting or denying access to
specific websites based on
information contained in
an URL list.
• HTTP/HTTPS interceptor
• Black/whitelists for URLs
• Payload analysis for malicious URLs
Why? Prevent attacks through malicious/hacked websites, gain better compliance and productivity
Tekvizyon
21. 21
Remote Desktop
Remotely operate any endpoint as if you are near the device
• Assist remote users and avoid a gigantic waste of time
• Reach systems that are sitting in a private network without changing firewall settings or
establishing additional VPN tunnels. It uses outgoing connections (443 port).
Why? Fewer tools, less effort to connect, faster reaction
Tekvizyon
22. 22
1. Continuous Data Protection
Define the list of critical apps for every device that
users are working with most often. Acronis’ agent
monitors every change made in the listed applications.
In case of a malware infection, you can restore the
data from the last backup and apply the latest
collected changes so no data is lost.
▪ Ensures users won’t lose their work in-progress
▪ IT controls what is continuously backed up – Office
documents, financial forms, logs, graphic files, etc.
Gain safe and instant remediation without data loss and close to zero RPOs
Why? Protects customer data even between backups
Tekvizyon
23. 23
2. Safe Recovery
A backed-up OS image can have malware that can reinfect
a machine after recovery.
Patching the machine and applying the latest anti-malware
definitions allows users to restore the OS image with the
latest patches, reducing the chance of a reoccurring
infection.
▪ Updates the anti-malware
database
▪ Installs the latest security
patches
Integration of AV updates and patch management into recovery process
Why? Saves time, efforts and data: recover infected/vulnerable images quickly with no efforts
Tekvizyon
24. 24
3. Anti-Malware Scanning of Backups in the
Acronis Cloud
Scanning full disk backups at a centralized location helps
find potential vulnerabilities and malware infections –
ensuring users restore a malware-free backup.
▪ Increases potential rootkit and bootkit detections
▪ Restores only clean data
▪ Reduces loads of client endpoints
Prevent restoring infected files from backups
Why? Better protection with less effort and resources: offload endpoints, more aggressive scans
Tekvizyon
25. 25
5. Fail-Safe Patching
A bad system patch can render a system
unusable. Patch management rollbacks have
limitations and can be slow. Create an image
backup of selected machines before installing a
system or application patch.
▪ Full image backups are the fastest and easiest
way to revert to a usable state
Back up endpoints before patching to enable
quick rollback to a working state
Why? Saves resources, faster and more reliable operations
Tekvizyon
26. 26
6. Include Backup Information for Forensic
Investigation
By activating a special “Forensic Mode” in the product,
memory dumps and full HDD images on a sector level
can be collected.
▪ Keeps key evidence secure in the backup
▪ Makes future investigations easier and less costly
Back up vital data as well as information
that’s useful for future analysis
Why? Enables investigation, better compliance
Tekvizyon
28. 28
Service providers email security challenges
Increasing email
threats
▪ 94% of malware is delivered via email
▪ Phishing attacks account
for more than 80% of reported
security incidents
▪ 98% of attack rely on social
engineering
▪ 80% of breaches are new
or unknown “zero-day attacks”
Sources: CSO Online; “Phishing and Social Engineering in 2018“, KnowBe4; Security Boulevard; State of Endpoint Security Risk”, Ponemon Institute;
“Cost of Data Breach Report”, Ponemon Institute, 2020; “Security Technology Sprawl Report”, ReliaQuest, 2019
Inefficient
protection
▪ APTs (Advanced persistent threats)
go undetected on average 71 days
in the Americas, 177 days in EMEA,
and 204 days in APAC.
▪ 43% of organizations experience
false-alerts in 1/5 of detection cases
▪ Traditional sandboxing solutions
take between 7 to 20 minutes to
deliver a verdict
Management complexity
and skill shortage
▪ 53% of security professionals admit
that the number of security tools is
so burdensome that it adversely
impacts security and increases risk
▪ 84% of organizations are
experiencing an IT security skills
shortage
Tekvizyon
29. 29
Higher profitability
Expand/Enhance your
stack of services
Start planning your
services’ upgrade
Upgrade your costs,
margins, profitability
Leverage consumption-
based pricing
Unlock new revenue streams
Expand or enhance your
stack of services with
email security
Start planning the upgrade
of your services without
worrying for the time
needed to implement,
email security is enabled
with the flip of a switch.
Upgrade your costs,
margins, profitability, and
business plan and secure
additional revenue
streams
Leverage pricing per
protected mailbox (unique
mailbox per user)
Tekvizyon
30. 30
Stronger protection
Minimize clients’
risks
Prevent email-
borne threats
Block advanced
attacks
Cover 100% of
traffic
Protect your clients’ #1 threat vector from any attack
Leverage a leading
technology
Minimize the risks to
clients when they
communicate via
email and stop threats
before they reach
end-users' Microsoft
365, Google
Workspace, or Open-
Xchange mailboxes
Prevent spam,
phishing, business
email compromise
(BEC), spoofing,
malware, malicious
URLs, zero-days and
APTs (Advanced
Persistent Threats)
Block sophisticated
attacks that evade
conventional
defenses: APTs,
Zero- and N-days
Analyze every bit of
content at any scale
Build your services on
top of a leading
technology in
independent
evaluations (SELabs)
Ensure minimum
delays and receive
clear verdict within 3
seconds on average
with near-zero false
positives, compared
to 7-20 mins for
sandboxing
solutions
Don’t disrupt
processes
Tekvizyon
31. 31
Advanced Email Security: Stop any
email-borne threat
Malware and ransomware. Prevent known and zero-day
malware with multiple antivirus engines and next-
generation dynamic scans. Detect hidden malicious
content. Leverage powerful threat intelligence to stay
ahead of emerging threats.
Phishing. Block known malicious URLs based on four
leading URL reputation engines. Catch unknown malicious
URLs with unique image recognition engine. Unpack
deeply embedded, hidden phishing attempts and leverage
threat intelligence from six market-leading sources.
Business email compromise (BEC). Prevent payload-
less attacks and impersonation attempts through machine-
learning algorithms with IP reputation, SPF, DKIM, and
DMARC record checks. Reduce “further along the line”
BEC attacks with threat intelligence, phishing, and
antivirus engines.
Internal phishing. Prevent lateral phishing with a zero-
trust approach, scanning 100% of traffic at any scale with
Perception Point’s lighting-fast technology.
Account takeover. Stop account takeover attempts with
multiple security layers, including phishing and anti-
malware engines, threat intelligence, and anti-evasion
technology.
Zero-days and APTs. Catch advanced threats that evade
conventional defenses with a unique CPU-level technology
that detects and blocks attacks at the exploit stage, prior to
malware release.
Evasion techniques – Detect hidden malicious content by
recursively unpacking the content into smaller units which
are then dynamically checked by multiple engines.
Tekvizyon
32. 32
What makes Advanced Email Security unique?
Scan 100% of
traffic in real time
Prevent APTs and
zero-day attacks
Effortless rapid
deployment
Incident response
services
Leverage a single, multi-layered email security solution
for lightning-fast detection that’s easy to deploy and manage
Unmatched
detection speed
Ensure every bit of content
(emails, files, and URLs) is
analyzed at any scale and
a clear verdict is delivered
in seconds before the
content reaches end
users.
Block sophisticated threats
that evade conventional
defenses with a unique
CPU-level analysis that
acts earlier in the attack
chain than other
technologies to block
threats at the exploit
stage, prior to malware
release.
Cloud-native deployment
within a few minutes that
integrates the solution
directly in the email
system without a need for
additional configurations to
reduce the administrative
burden, associated with
standard SEG (secure
email gateway) solutions.
Empower your service
delivery team with direct
access to cyber analysts
and email security experts
that monitor all customer
traffic and analyze
malicious intents with
ongoing reporting and
support, including handling
FPs, remediating and
releasing as required.
Leverage an unmatched
detection speed that
enables you to prevent all
threats before they reach
end-users – which is better
than the reactive approach
of standard email security
technologies
Tekvizyon
33. 33
Unmatched detection speed
Legacy sandboxing technologies, are inherently slow:
waiting to see how the malware acts, which leads to detection
delays and forces CISOs to:
• Move their security solution to detection mode, with
post-email delivery analysis
• Scan only a fraction of all incoming data, which leaves gaps
in defenses, especially against unknown attack techniques
Moreover, Content Disarm and Reconstruction (CDR) solutions
can make harm reconstructed content or make it unusable.
Perception Point’s technology shortens content scanning
from up to 20 minutes to under 30 seconds, with no tampering
of any kind
Get proactive and move from detection to prevention due near-zero delays
Advanced
Email Security
Powered by
Perception Point
Sandbox
7-20 min
Tekvizyon
34. 34
Enhance your Microsoft 365 native defenses
Excel where native Microsoft defenses fall short – prevent more threats and
leverage lightning-fast detection
Functionality Advanced Email Security
(powered by Perception Point)
Microsoft 365
Detection speed < 30 sec 5-20 mins
Detection accuracy ● ● ● ● ● ●
Threat coverage ● ● ● ● ● ● ● ●
URL scanning ● ● ● ● ● ● ● ● ●
Detection of zero-days ● ● ● ● ● ● ● ●
Prevention of APTs ● ● ● ● ● ×
Anti-evasion ● ● ● ● ● ×
Incident response services ● ● ● ● ● ×
Tekvizyon
35. 35
Multi-layered protection
7 layers of protection against any email-borne threat
Why? Block any email-borne threat before it reaches end-users
Advanced
Email Security
Powered by
Perception Point
Anti-spam
Engine
Anti-evasion
Anti-spoofing
Static
Detection
Anti-
phishing
Threat Intelligence
Next-generation
Dynamic Detection
(against APTs and
zero-days)
Tekvizyon