sb-au logo
Story image

Acronis makes remote work environments more secure; launches Acronis Cyber Protect

05 May 2020

Acronis has launched its new cyber protection solution Acronis Cyber Protect, which is designed to integrate a variety of the most common cybersecurity features such as anti-malware, backup, disaster recovery, and management tools.

The solution, which expands Acronis’ Cyber Protect to businesses worldwide, will be available to small business and enterprise customers through Acronis’ managed service provider (MSP) partners.

MSPs will now be able to access a single solution to deliver backup, anti-malware, security and management capabilities such as vulnerability assessments, URL filtering, patch management, and even total Zoom security, as well as COVID fake news blocking.

“Traditional backup is dead because it’s not secure enough, and traditional anti-viruses do not protect data from modern cyber threats. Legacy solutions are no longer able to counter the dangers businesses face,” comments Acronis founder and CEO Serguei “SB” Beloussov. 

“Service providers need to offer their clients integrated cyber protection that covers all Five Vectors of Cyber Protection - safety, accessibility, privacy, authenticity and security.”

He says that Acronis Cyber Protect enables service providrs to deliver solutions that will ensure their customers are ‘CyberFit’ and ready to face threats to applications, data, and systems.

Features include:

  • Malware protection and vulnerability assessment for top collaboration tools: Zoom, WebEx, MS Teams, all popular VPN clients
  • COVID fake news blocking and security alerts
  • Free cyber protection for new business customers till August
  • Remote data wipe and Touch-less control remote connection to office machines
  • Default secure protection plan templates for remote workers, built-in VPN capability

IDC’s Phil Goodwin and Robyn Westervelt outlined common use cases for Acronis Cyber Protect. They also describe it as a solution that "is among the most comprehensive attempts to provide data protection and cybersecurity to date."

“Common use-cases for Acronis Cyber Protect, in addition to normal backup and recovery, include autoresponse to emerging threats, real-time (CDP) protection of important documents, 0-day malware and ransomware protection and recovery, and compliance and forensic analysis," Goodwin and Westervelt state.

To ensure that Acronis Cyber Protect was up to standard, security analyst and testing firm AV-Test.org tested a pre-release version of the solution. AV-Test tested both the status and dynamic detection rates of Acronis Cyber Protect, scanning a set of 6932 malicious Windows executable (PE) files, and Acronis scored perfectly with a verified 100% detection rate, while in the false-positive test, Acronis delivered a perfect result. 

Ingram Micro’s vice president of cloud channel sales Tim Fitzgerald, comments, “The unique integration of AI-powered data protection and cybersecurity in Acronis Cyber Protect enables Ingram Micro Cloud to satisfy the cyber protection needs of service providers, small and medium businesses, and enterprise-edge workloads.”

Acronis says it plans to release an on-premise edition of Acronis Cyber Protect in the second half of 2020.

Visit Acronis' website to sign-up online or request a fully-functional trial.

You can also read our recent interview with Acronis CEO Serguei Beloussov here.

Link image
Webcast series: The necessary tools to secure a remote workforce
Experts from across the A/NZ region discuss the best security practices in a remote working world - with sessions available on the first Thursday of every month.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
Just one click – that’s all it takes to let in cyber-crime
So how do organisations ensure that users are not compromised by simply doing their work?  The answer is surprisingly simple, writes Bufferzone Security business strategist for A/NZ Greg Wyman.More
Link image
Webinar: Best practices for managing disparate security solutions
As budgets get more constrained, the emphasis shifts from merely finding threats to increased efficiency in managing security operations. Learn how to juggle a crowded field of solutions.More
Story image
ConnectWise launches bug bounty program to bolster cybersecurity strategy
“Crowdsourcing in this way represents a solid additional layer of security, and we clearly value the community's expertise and participation in helping us keep our products secure."More
Story image
Report: Rushing into cloud migration directly related to security issues
A new report from Radware highlights the impact of COVID-19 on organisations compelled to digitally transform in order to maintain business continuity. More