Product Summary

THE SERVICE

Cyber Protection platform for MSPs and IT departments

Ease of use

Single agent, single console and single  policy for all services, and a single dashboard for monitoring

Operational efficiency

Mass management in multitenant environments designed for distributed,  diverse customer infrastructure

Integration platform

Extensible and customizable platform  to integrate all IT tools into single technology stack

Integrated cybersecurity, data protection and RMM in a single solution

INNOVATION

Innovative cyber protection scenarios

  • Avoid even the smallest data loss in key applications

  • Auto-adjust patching, scanning, and backing up based on threat alarms from Acronis Cyber Protection Operations Centers

  • Rapidly detect, analyze and respond to, and recover from advanced threats with guided AI-based incident interpretations and single-click response, incl. recovery

  • Integrate anti-malware updates and patches into the recovery process

  • Automatically back up endpoints before installing any patches, enabling immediate rollback.

  • Automate service provisioning, initial  client-specific policy creation and follow-up adjustments, and minimize  the impact of human errors.

  • Monitor the  protection status of files with classification, reporting, and unstructured data analytics

  • Image-based backups that capture  additional data needed for forensic  investigations

  • Created from backups to support more aggressive heuristics, preventing false detections

  • Protect mailboxes from spam, phishing, business email compromise (BEC), account takeover (ATO), malware, zero-day and advanced persistent threats (APTs)

  • Automate repetitive/day-to-day workload monitoring and management tasks through scripting

COVERAGES

Provide protection for 30+ workload types from infrastructure to SaaS apps

SUMMARY

Complete coverage of NIST framework with Cyber Protection

  • GOVERN

    Provisioning via a single agent and platform

    Centralized policy management

    Role-based management

    Information-rich dashboard

     Schedulablereporting

  • IDENTIFY

    Device Sense™ for   device discovery Software & hardware inventory

    Content discovery

    Data classification

    Vulnerability assessments

  • PROTECT

    Security configuration management

    DeployPilot™ for software deployment

    Patch management

    Device control

    Data Loss Prevention (DLP)

    Security training

    Backup integration

    AIscripting

  • DETECT

    AI/ML-based behavioral detection

    Exploit prevention

    Anti-malware & anti- ransomware

    Email security

    URL filtering

  • RESPOND

    Rapid incident prioritization

    AI-guided analysis

    Remediation and isolation

    Forensic backups

    Remote access for investigation

  • RECOVER

    Rapid rollback of attacks

    One-click mass recovery

    Self-recovery

    Backup integration

    Disaster recovery integration