Workstations, Servers (Windows, Linux, Mac) backup |
|
|
|
Virtual machine backup |
|
|
|
Public cloud VM agent-based backup (Azure Google, Amazon) |
|
|
|
VMware vSphere VM agentless backup |
|
|
|
Hyper-V VM agentless backup |
|
|
|
VMware vSphere VM agent-based backup |
|
|
|
Hyper-V VM agent-based backup |
|
|
|
File-level backup |
|
|
|
Entire machine and disk-level backup |
|
|
|
Mobile backup (iOS, Android) |
|
|
|
ESXi configuration backup |
|
|
|
NAS/shares backup |
|
|
|
Standard applications backup (Microsoft 365, G Suite, Microsoft Exchange, Microsoft SQL, Microsoft SharePoint) |
|
|
|
Advanced applications backup (Microsoft SQL and Microsoft Exchange clusters, Oracle DB, SAP HANA) |
|
|
|
Active Directory domain controller backup/restore |
|
|
|
Backup to local storage |
|
|
|
Backup to cloud storage |
|
|
|
Cloud storage included into device license (amount depends on device type and edition) |
|
|
|
Backup Options |
Essentials |
Standard |
Advanced |
Archive encryption |
|
|
|
Incremental/differential backups |
|
|
|
Multi-destination backup (backup replication) |
|
|
|
Archive compression |
|
|
|
Backup validation (checksums) |
|
|
|
Retention rules |
|
|
|
Backup notarization |
|
|
|
Cybersecurity |
Essentials |
Standard |
Advanced |
Acronis Active Protection |
|
|
|
Vulnerability assessment (VA) and patch management (PM) |
|
|
|
Antivirus and Antimalware protection, Exploit prevention, URL filtering |
|
|
|
Forensic mode, scan backups for malware, safe recovery, corporate whitelist |
|
|
|
Threat feed |
|
|
|
Remote device wipe |
|
|
|
HDD Health Essential |
|
|
|
HDD Health Extended |
|
|
|
#CyberFit Score (protection assessment) |
|
|
|
Continuous data protection |
|
|
|
Backup scan for malware |
|
|
|
Data protection map |
|
|
|
Management & Monitoring |
Essentials |
Standard |
Advanced |
Group management of devices |
|
|
|
Centralized plans management |
|
|
|
Dashboards and reports |
|
|
|
Email notifications |
|
|
|
Mass update for agents |
|
|
|
Predefined user roles: admin and user |
|
|
|
Provisioning and management of users through Active Directory integration |
|
|
|
Management of multiple company branches (set quota, delegate management, etc.) |
|
|
|
Cyber Protection Desktop |
|
|
|
Software inventory |
|
|
|
Hardware inventory |
|
|
|