Acronis Cyber ​​Protect Cloud - Configurator

VAR - Single Licenses
MSP - Flexible Licenses
Single license purchase to meet specific needs of individual customers

Basic functions included in the platform

Security
Included
  • Anti-ransomware protection
  • ML-based anti-malware protection
  • Vulnerability assestment
  • #CyberFit Score
Management
Included
  • Device detection
  • Centralized management of plans
  • Hardware inventory
DLP
Included
  • Control of devices
Remote Assistance
Included
  • Remote Desktop (RDP)

BACKUP

Model
With the GB model it is possible to take advantage of an unlimited number of agents by paying for the cloud and local space used With the agent model it is possible to take advantage of unlimited local space by paying for the number of agents installed and the space occupied in the Cloud. With both models, you can choose between cloud storage on Acronis infrastructure or CoreTech infrastructure.

STORAGE

Cloud Storage CoreTech (GB) *
Cloud Storage Acronis (GB)
Local Storage (GB)
Select the number of GB you want to use to make a local copy of the backup

Agents

Advanced Backup

The advanced backup functions available depend on the application system and/or the advanced functions used on the agent.

Includes:
  • Microsoft SQL and Microsoft Exchange clusters
  • Oracle DB
  • SAP HANA
  • Data protection Map
  • Continuous data protection
Server
Unlimited
Virtual Machine
Unlimited
Workstation
Unlimited
Hosting Server
Unlimited
Microsoft 365
Unlimited
Microsoft Hosted Exchange
Unlimited
Google Workspace
Unlimited
Mobile Devices (Android, IOS)
Unlimited
Website
Unlimited
vCloud Director VM
Unlimited
NAS
Unlimited
* CoreTech Cloud Storage features
  • Server and service monitoring
  • Centralized Management Panel
  • Support

Files

Cloud file synchronization and sharing service
Model
With the GB model you can take advantage of an unlimited number of users by paying only for the cloud space used.
With the User model the cost of the cloud space used is lower and you pay for the number of users configured for access.
Users
Unlimited
Acronis cloud storage (GB)
Esignature
Service for managing the digital signature of documents. The cost varies according to the number of documents signed.
Notarization
It is a blockchain-based service for notary authentication that allows your customers to ensure the integrity of business-critical data. The cost varies according to the number of authenticated documents.

Advanced functions

Includes:
  • Antivirus and anti-malware protection with local signature-based detection
  • URL filtering
  • Forensic backup; scan backups for malware; safe recovery; corporate allowlist
  • Smart protection plans
Advanced Security + EDR
Includes:
  • Detect, remediate, and respond to security incidents
  • Visibility of incidents with mapping to the MITRE ATT&CK framework
  • Real-time anti-malware and zero-day attack protection
  • Anti-malware scan of backups; safe restore
  • URL filtering, safe browsing
  • Exploit prevention
Advanced Management
Includes:
  • Patch Management
  • Safe patch application
  • Hard disk status
  • Software inventory
  • Cyber scripting
  • Remote desktop and remote assistance
  • Machine intelligence-based monitoring
  • Software deployment
Advanced Email Security
Includes:
  • Anti-phishing
  • Anti-spam protection
  • Anti-malware
  • Protection from APT and zero-day attacks
  • Protection from ATO and BEC attacks
  • In-depth analysis of attachments
  • URL filtering
  • Threat information
  • File Incident response services
Advanced DLP
Includes:
  • Control of content flows
  • Content detection
  • Monitoring of user activities
MDR Standard
  • Powered by Novacoast
  • GDPR compliant
  • 24/7 support by an outsourced SOC
  • 24/7/365 monitoring to identify threats
  • Event triage & prioritization with real-time threat alerting
  • Instant threat containment by SOC team
  • One-click remediation and restoration capabilities
MDR Advanced
  • Powered by Novacoast
  • GDPR compliant
  • 24/7 support by an outsourced SOC
  • 24/7/365 monitoring to identify threats
  • Event triage & prioritization with real-time threat alerting
  • Instant threat containment by SOC team
  • One-click remediation and restoration capabilities
  • Expedited threat remediation by MDR team
  • Outsourced attack rollback & recovery
  • Outsourced patch management, as part of response

GET IN TOUCH

Click here to request more information