last posts

Acronis Cyber Protect 15.0.1 Build 30984

Acronis Cyber ​​Protect software ensures business users avoid downtime, data loss and security breaches at low cost. It is the only solution that natively integrates network security, privacy and management to protect endpoints, systems and data. Integration and automation provide unrivalled protection—increasing productivity while reducing the total cost of ownership.


  • Next-generation cybersecurityHigh-level artificial intelligence-based conduct location motor for zero-day assault avoidance
  • Reliable backup and recovery. Full-picture and document-level reinforcement, calamity recuperation and metadata assortment for security criminology
  • Integrated protection management. URL sifting, weakness appraisals, fixing the board, and distant administration are coordinated and mechanized

Eliminate complexity

Traditional endpoint protection product stacks lack integration and require more time to manage - maintaining licenses, installing updates and patches, checking updates for compliance, and managing multiple policies through a variety of different user interfaces.

Acronis Cyber ​​Protect provides agents, management interfaces and licenses - eliminating the complexities and risks associated with non-integrated solutions.

Minimize Incidents

With Acronis Cyber Protect, an AI-based threat detection engine leverages backup data to further develop recognition rates and stay away from misleading up-sides. The mix of cutting-edge antimalware and reinforcement permits the recuperation of degenerate information naturally. Reinforcements are safeguarded against assaults on the specialist and reinforcement documents, it is perfect to guarantee the information.

Increase productivity

Complex, unintegrated endpoint solution stacks require more time to learn and support, and do not benefit from integration and automation.

Unifying multiple protection technologies into a single solution not only increases its reliability but also reduces the time required to learn, deploy and maintain the solution. Acronis Cyber ​​Protect lets you simplify management, reduce unnecessary administration time and lower the total cost of ownership.

Turn challenges into opportunities
    With a single integrated solution, you can bridge any gaps in IT infrastructure and endpoint protection, reducing incident volume and minimizing incident response time

  • Stay ahead of modern threats. Spend more time focused on your overall security posture, rather than on managing the complexity of your protection
  • Gain proactive cyber protection. Avoid downtime, prevent loss of employee productivity, and spend less time on costly recoveries after successful attacks
  • Eliminate unnecessary expenses. Improve your team’s productivity and avoid the additional cost of maintaining multiple tools
Integration and automation

No matter how great each individual solution might be, a patchwork of system and endpoint protection tools will create gaps in your defences. This Acronis software is a unified approach that eliminates those gaps.

  • One agent. Increases performance and avoids endpoint/agent conflicts
  • One license. Simplifies software license management
  • One vendor. Ensures seamless, fully integrated protection
  • One backend. Reduces infrastructure needs
  • One console. Enables faster employee onboarding and maintenance
  • One experience. Simplifies the education of IT resources
Capabilities designed for modern protection
  • Anti-malware and antivirus. Proactively protect your data, applications, and systems from advanced cyberattacks. With Acronis Cyber Protect, you gain real-time protection with AI-based static and behavioural heuristic antivirus, antimalware, anti-ransomware, and anticryptojacking technologies.
  • Fail-safe patching. Eliminates the risk of a bad patch rendering the system unusable. The program automatically performs an image backup before implementing the latest patches. This allows you to easily recover and get back to working order if something goes wrong with your patch.
  • Forensic backup. Simplify future analysis by collecting digital evidence – like memory dumps and process information – from disk-level backups. With Forensic Mode, you’ll manage compliance requirements and run faster internal investigations.
  • Safe Recovery. Avoid malware reinfection by automatically patching the machine and then scanning your system and backup images using the latest antimalware definitions.
  • Continuous data protection. Safeguard new data. Acronis’ agent monitors every change made in the listed applications and continuously backs them up so recent changes aren’t lost if the machine needs to be re-imaged.
  • Global threat monitoring and smart alerts. Benefit from the global network of Acronis Cyber Protection Operation Centers (CPOC) by receiving real-time alerts on malware, vulnerabilities, natural disasters, and other global events that may affect data protection.
  • Data compliance reporting and data protection map. Ensure compliance reporting by getting detailed information about stored data and using automatic data classification to track the protection status of important files.
  • Global and local whitelists from backups. Scan backups with advanced antimalware technologies (AI, behavioural heuristics, etc.) and whitelist your organization’s unique applications to avoid future false positives.

What’s new in Acronis Cyber Protect 15:
Autodiscovery and remote installation

Simplify the simultaneous installation of multiple agents in the cloud and on-premise.

  • Network-based discovery
  • Active Directory-based discovery
  • Importing a list of machines from a file
  • Automatic application of protection plans
  • Batch remote installation of agents by using the discovery wizard
Single protection plan covering all aspects of cyber protection
  • Backup
  • Anti-malware protection
  • URL filtering
  • Vulnerability assessment
  • Patch management
  • Data protection map (data discovery)
  • Windows Defender Antivirus and Microsoft Security Essentials management
Smart protection plan

Perform smart remediation actions based on security alerts from Acronis Cyber Protection Operations Centers (CPOC).

Full-stack anti-malware protection for Windows and macOS
  • Real-time protection against malware
  • Cryptomining process detection
  • Ransomware detection
  • On-demand scanning
  • Self-protection: Protect Acronis components (e.g. registry, service stops, Acronis file protecting)
  • Network folder protection: Protect the data in shared folders on your machine against ransomware
  • Server-side protection: Protect the data in shared folders within your network against ransomware
  • Files quarantine
  • Exclusions management: Specify processes that will not be considered malware; exclude folders where file changes will not be monitored; select files and folders where scheduled scanning will not be executed
Scan backups for malware in local storage, network shares, and Acronis Cloud Storage

Scan disk backups in the local storage, network shares, and Acronis Cloud Storage, to detect malware infections

Safe recovery

Safe recovery allows you to restore an OS image without the malware found in it, to avoid reinfection after recovery.

URL filtering that controls access to malicious URLs

URL filtering allows you to permit or deny access to specific websites based on information contained in a URL list.

  • HTTP/HTTPS interceptor
  • Black/whitelists for URLs
  • Payload analysis for malicious URLs
Vulnerability assessment

Automated verification of system vulnerabilities to cyber threats

Patch management
  • Automatic approval of patches
  • Deployment on a schedule
  • Manual deployment
  • Flexible reboot and maintenance window options
  • Staged deployment
  • Support for patch management of Microsoft and third-party software on Windows desktop and server operating systems
Windows Defender Antivirus and Microsoft Security Essentials Management
  • Enforce settings across multiple machines
  • Collect all Windows Defender Antivirus and Microsoft Security Essentials detection events and display them in the management console
HTML5-based secure Remote Desktop access

Lay out a protected RDP association with your gadgets right from the web console interface, including cross-destinations associations, with no VPN pre-imperatives

Full-fledged read-only role support
  • Manage roles on a user level.
  • Added support for read-only mode access.
Disk health monitoring

Proactively track disk health status, before an issue happens.

Continuous Data Protection (CDP) for important files and application data
  • Ensures users won’t lose their work-in-progress
  • It controls what is continuously backed up – Office documents, financial forms, logs, graphic files, etc.
Acronis #CyberFit score for protected devices

The #CyberFit protection score includes the following assessments:

  • Anti-malware software is installed
  • A backup solution is available
  • A firewall is available and enabled
  • VPN is enabled and running
  • Full disk encryption enabled
  • NTLM is restricted for outgoing traffic
Protection for Remote Work Tools

Prioritized patch management and antimalware protection for:

  • Zoom
  • Slack
  • Teams
  • Skype
  • Webex
  • Skype for Business
  • TeamViewer
Application-aware backup for VMs on Hyper-V

The new application-mindful reinforcement of Hyper-V VMs by the Specialist for Hyper-V works on the reinforcement and recuperation of Microsoft SQL Server, Microsoft Trade Server, Microsoft SharePoint, and Microsoft Dynamic Index Area Administrations running on Microsoft Hyper-V.

Finalizing the virtual machine running from backup on Hyper-V

While a virtual machine is running from a reinforcement, the substance of the virtual circle is taken straightforwardly from its reinforcement. Thusly, the machine will become out of reach or even undermined assuming the association is lost to the reinforcement area or to the reinforcement specialist. You have the choice to make this machine extremely durable, or at least, recuperate its virtual plates, alongside the progressions that happened while the machine was running, to the information store that stores these changes. This cycle is named the conclusion.

This process is now supported for both ESXi and Hyper-V.

Scale Computing HC3 hypervisor support
  • Agent-less backup and recovery for Scale Computing VMs
  • Automated remote deployment of Agent for Scale Computing in the form of a virtual appliance
Data protection map (data discovery)

Monitor the protection status of files with classification, reporting and unstructured data analytics.

Forensic Backup

Image-based backup with valuable, additional data added to backups

Remote device wipe

Helps you prevent data loss from stolen devices.

Updated Cyber Protection Monitor

Displays real-time antivirus protection status.

Comments



Font Size
+
16
-
lines height
+
2
-