Acronis Cyber Protect Standard Virtual Host - subscription license (5 years) - 1 physical host

Article-No.:
120187
Manufacturer-No.:
VHSAEKLOG21
Technical specifications

General

Category
Online & appliance based services
Packaged Quantity
1

Software

License Type
Subscription license
License Pricing
Academic, Government
License Qty
1 physical host
License Validation Period
5 years
License Category
Subscription license

Service & Support

Type
Technical support
Description
Acronis Cyber Protect integrates backup and AI-based antimalware and endpoint protection management into one solution. Integration and automation provide unmatched protection - increasing productivity while decreasing TCO.
  • Advanced cybersecurity
    Advanced AI-based behavioral detection engine for zero-day attack prevention.
  • Reliable backup and recovery
    Full-image and file-level backup, disaster recovery and metadata collection for security forensics.
  • Integrated protection management
    URL filtering, vulnerability assessments, patch management, and remote management are integrated and automated.
  • Eliminate complexity
    Acronis Cyber Protect offers one agent, one management interface, and one license - removing the complexity and risks associated with non-integrated solutions.
  • Minimize incidents
    With Acronis Cyber Protect, an AI-based threat detection engine leverages backup data to improve detection rates and avoid false-positives. The integration of antimalware and backup enables service providers to recover corrupt data automatically. Backups are protected against attacks on the agent and backup files, ensuring the data is clean - keeping your clients safer.
  • Increase productivity
    More solutions require more time to learn and support. Acronis Cyber Protect's integration of multiple protection technologies into one solution not only increases reliability - it also decreases the time required for IT professionals to learn, deploy, and maintain solutions.
  • Stay ahead of modern threats
    Spend more time focused on your overall security posture, rather than on managing the complexity of your protection.
  • Gain proactive cyber protection
    Avoid downtime, prevent loss of employee productivity, and spend less time on costly recoveries after successful attacks.
  • Eliminate unnecessary expenses
    Improve your team's productivity and avoid the additional cost of maintaining multiple tools.
  • Antimalware and antivirus
    Proactively protect your data, applications, and systems from advanced cyberattacks. With Acronis Cyber Protect, you gain real-time protection with AI-based static and behavioral heuristic antivirus, antimalware, antiransomware, and anticryptojacking technologies.
  • Fail-safe patching
    Eliminate the risk of bad patches rendering a system unusable. Before patches are implemented, an image backup is automatically performed - enabling you to easily restore and roll back to a working state if there is an issue with a patch.
  • Forensic backup
    Simplify future analysis by collecting digital evidence - like memory dumps and process information - from disk-level backups. With Acronis Cyber Protect's Forensic Mode, you'll manage compliance requirements and run faster internal investigations.
  • Safe recovery
    Avoid malware reinfection by automatically patching the machine and then scanning your system and backup images using the antimalware definitions.
  • Continuous data protection
    Acronis' agent monitors every change made in the listed applications and continuously backs them up so recent changes aren't lost if the machine needs to be reimaged.
  • Global threat monitoring and smart alerts
    Benefit from the global network of Acronis Cyber Protection Operation Centers (CPOC) by receiving real-time alerts on malware, vulnerabilities, natural disasters, and other global events that may affect data protection.
  • Data compliance reporting and data protection map
    Ensure compliance reporting by getting detailed information about stored data and use automatic data classification to track the protection status of important files.
  • Global and local whitelists from backups
    Scan backups with advanced antimalware technologies (AI, behavioral heuristics, etc.) and whitelist your organization's unique applications to avoid future false positives.
AlertBrowse fileDownload file