sb-au logo
Story image

Expansion adds on-prem access to Acronis Cyber Protect solution

16 Jun 2020

The flagship Acronis Cyber Protect product has this week launched a new expansion, enabling IT managers and teams to test the solution for themselves through a new beta release.

Acronis Cyber Protect was previously deployed as a cloud offering through service providers. It is now available as a beta on-premise solution, enabling IT teams to deliver data protection, cybersecurity, and endpoint management across data, applications and systems.

Acronis states that its flexible deployment model enables Acronis Cyber Protect to meet the needs of teams with air gapped environments, in regulated industries that deploy local non-networked devices, and companies with remote work policies that must meet organisational data protection and cybersecurity standards.

Acronis CEO Serguei ‘SB’ Beloussov says that more businesses adopt remote work policies as a result of the COVID-19 pandemic.

Furthermore, a recent Gartner survey found that 74% of organisations may permanently shift some employees to remote work, meaning that cybersecurity is now a critical business need beyond centralised offices.

“While remote work offers a lot of benefits, it can put valuable company data at risk as it is accessed and used on home networks that are more vulnerable to cyber attacks,” comments Beloussov.

“We’ve already seen how Acronis Cyber Protect can eliminate those risks in third-party managed environments. Releasing it as a beta empowers more organisations to choose how they protect their data, devices, and infrastructure.”

Acronis Cyber Protect includes tools that protect remote workers from cyber threats – for example, it can block Zoom vulnerabilities, and prevent session ID theft. Similar tools are also available for other videoconference platforms such as Microsoft Teams, WebEx, and others.

Recently AV-Test rated Acronis Cyber Protect as having a 100% detection rate with zero false positives, meaning that the combination of real-time protection based on behavioural and heuristic anti-malware is able to effectively detect and block malware threats.

Furthermore, Acronis Cyber Protect has been positively received by analyst firms such as IDC, Frost & Sullivan, and managed service providers alike.

UCIT Solutions (Australia) director Lyndon Reynolds says that Acronis’ solution helps the company provide secure and reliable technology.

“UCIT believes the recently launched integrated solution will benefit our partners and clients immensely and we are excited to be offering it.”

Acronis Cyber Protect’s integrated and automated architecture offers capabilities such as: 

  • Vulnerability assessments and patch management, removal of malware from backups, hard drive
  • health checks, and patching on recovery to prevent reoccurring infections offer proactive
  • protection against downtime.
  • Continuous data protection, real-time defenses against viruses, ransomware, and cryptojacking,
  • and self-defense capabilities that guard the agent and backup storage deliver active protection
  • from threats.
  • Integrated disaster recovery, metadata storage for the forensic investigation of incidents, and the
  • ability to co-exist with other security solutions provide reactive protection.

To sign up for the Acronis Cyber Protect beta, click here.  

Story image
Report: Brute-force attacks feed on remote working vulnerabilities
A new report from ESET has detailed the extent to which attackers employ brute-force tactics to infiltrate remote desktop protocols.More
Story image
Remote working trend bolsters cybersecurity investment - but downturn predicted
A new report from Canalys indicates investment in cybersecurity has increased 9.7% - but worsening economic conditions could turn the statistic around.More
Story image
Claroty and Deloitte partner up to deliver cybersecurity for industrial tech
“Industrial organisations are keen to transform themselves into digital utilities, but often security can be an obstacle rather than an enabler of digital transformation.”More
Story image
Research: Rapid growth of embedded security market inevitable
With the rise of IoT, as cybercriminals find new ways to gain access to devices, new secure embedded hardware can block their points of entry.More
Story image
Why DX is not complete without a transformed security architecture
Secure Access Services Edge (SASE) is the process by which core WAN edge capabilities like SD-WAN, routing, and WAN optimisation at branch locations are integrated with cloud-based security services like secure web gateways, firewall-as-a-service, cloud access security brokers, and more.More
Story image
BYOD security in remote work era still riddled with issues
Bitglass’ 2020 BYOD Report suggests that BYOD and personal device security in organisations still leave much to be desired, even as more organisations adopt flexible BYOD arrangements.More