Acronis Cyber Protect Cloud
Acronis Cyber Protect offers a revolutionary approach to cyber protection by integrating data protection with cybersecurity. This integrated method eliminates complexity challenges, delivers better protection against today’s threats, and maximizes efficiency by saving time and money.
Features
- Advanced Backup
- Advanced Disaster Recovery
- Advanced Security
- Advanced Management
- Advanced Email Security
- Advanced Data Loss Prevention
Benefits
- Reduce recovery times with best-in-industry Recovery Time Objectives
- Minimize expensive downtime by restoring Windows and Linux systems
- Easily restore In the event of a data disaster.
- Protect Data in Microsoft Exchange, Onedrive, Teams and Sharepoint
- Immutable Cloud Storage protects against deletion of Backup files
- Separation of users and resources, reducing risk of unauthorised access
- Identify and close the security gaps in your systems
- Protect yourself from modern cyberthreats
- You can easily schedule or manually deploy patches
- Simplify Disaster Recovery and increase operational efficiency
Pricing
£0.24 to £11.82 a licence a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 3 3 1 2 1 7 3 3 3 8 9 9 2 1
Contact
BECHTLE LIMITED
Public Sector
Telephone: 01249 467900
Email: publicsector.uk@bechtle.com
Service scope
- Service constraints
- No
- System requirements
-
- Windows Server 2003 SP1/2003 R2 and later
- Windows Server 2008, 2008 R2, 2012/2012 R2, 2016, 2019, 2022
- Windows 11, 10, 8/8.1, 7 – all editions
- Linux with kernel from 2.6.9 to 5.14 and glibc 2.3.4
- MacOS Sierra 10.12 and later
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 8 Hours
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Multiple levels of support are available via a separate Managed Service Agreement
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Customers are supplied with user guides, online video tutorials for self-service
Remote and onsite training (case by case basis)
Assisted installation (case by case basis) - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data can be downloaded via the Console at end of the service
- End-of-contract process
-
Downloading data is included in the cost
Physical shipping (upload to hardware) is optional
Using the service
- Web browser interface
- Yes
- Using the web interface
- The entire suite of products can be managed via the Web Interface as a single pane of glass.
- Web interface accessibility standard
- WCAG 2.1 AAA
- Web interface accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
-
Account Management - automates provisioning and billing of Acronis Cyber Cloud services for your customers, and serves as an identity and access management framework.
Alerts API enables activation, inspection, and removal of alerts generated by Acronis Cyber Protection.
Tasks API enables inspection of tasks and activities performed by Acronis Cyber Protection.
Agents API provides information about agents registered in Acronis Cyber Protection and their endpoints.
Resource and Policy Management API enables protection of workloads registered in Acronis Cyber Protection.
Vault Manager API is responsible for meta-information about Vaults, Archives and Backups registered in Acronis Cyber Protection, tracks their data consistency and controls corresponding operations (create, read, update, delete). - API automation tools
- Other
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Tenants are logically separated. Capacity management and monitoring.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
- Other
- Other metrics
-
- Storage Capacity
- Number of Devices
- Type of Devices
- Number of Advanced Licences
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Acronis Cyber Protect Cloud
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Windows Server
- Windows PC
- Linux
- Microsoft SQL Server
- VMware vSphere
- Oracle Database
- Microsoft 365
- Apple Mac
- MySQL
- SAP Hana
- Backup controls
- All backups are configure via the Acronis Cyber Protect Cloud Console.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- Other
- Other protection within supplier network
-
Data is trasfered via TLS, but also encrypted at AES 256, and stored on encrypted hardware
Data is protected at source, in transit and at rest
Availability and resilience
- Guaranteed availability
- Target value is 99.9% uptime for the service. No defined recompense structure.
- Approach to resilience
- Available Upon request
- Outage reporting
- Email Alerts
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
- Username, Password and 2 Factor Authentication
- Access restrictions in management interfaces and support channels
-
Multi-Factor Authentification
Login Control (IP Address lockdown for Console)
Encryption password (for accessing data) - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- Role-based Access
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Standards Institution (BSI)
- ISO/IEC 27001 accreditation date
- 07/03/2014
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Acronis security program based on ISO27001, policies are developed in accordance to this standard's requirements.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- All changes go through formal change management process. Including, if required risk assessment, security approvals, roll back plan, management and operations approvals.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Acronis Software has Vulnerability assessment and patch management built into the management side (for customers, and ourselves)
Systems are scanned daily, and patches are applied instantly or weekly (depending on severity)
Acronis runs 3 global CPOCs which monitor threats and vulnerabilities - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Ongoing independent pen testing, vulnerability assessments, Cyber Security specialists monitoring global events & "friendly hacker" bug bounty program
Issues are closed / patched instantly or weekly depending on severity - Incident management type
- Supplier-defined controls
- Incident management approach
- Network Operations Center (NOC) takes the lead on incident identification and response identifies the root cause of a problem and contacts the appropriate internal incident response team to triage the technology incident. The incident response team is comprised of a carefully selected group that may include representatives from our Information Security and Compliance Department, Data Center Operations, Architecture, and Product Development teams, as well as our Public Relations and Communications teams. All response times are driven by internal SLAs targeted to meet 99.99% availability.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- KVM hypervisor
- How shared infrastructure is kept separate
- Data is encrypted at rest
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
When selecting our data center providers and data
center locations, we thoroughly assess providers taking
into account the capabilities of the facility, the current
evaluation of the threats (constructional, technical,
environmental, etc.), and the relative attractiveness and
business requirements for the specific region.
With regard to the environment, we review their
commitment to sustainability, assess their power usage
effectiveness (PUE) performance, and ask for their ISO
50001 or ISO 14001 certification or membership in the
iMasons Climate Accord. We treat their environmental
performance as an important deciding factor. While we
are not always able to influence a data center’s choice
of power source or greenhouse gas emissions, we
are making a statement by selecting providers that are
serious about protecting the environment.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Climate change presents a serious threat to individuals, businesses and communities around us. This year, we undertook our first greenhouse gas (GHG) emissions estimate using the 2022 (previous year) data to understand the impact of our operations on the environment and begin a datadriven journey towards a low-carbon future.
The project was undertaken as part of the CVC GHG Foundation Programme with the help of the Schneider Electric sustainability team, who guided us through collecting relevant data and created a GHG inventory management plan (IMP) according to the reporting principles established in the World Resource Institute (WRI) / World Business Council on Sustainable Development (WBCSD) Greenhouse Gas Protocol: Corporate Accounting and Reporting Standard. In 2022, our scope 1, 2 and 3 market-based emissions totaled 57,202 mt CO2e. We will use the 2022 data as the baseline for target setting and plan to bring GHG accounting up to date with the next report.Covid-19 recovery
As the novel coronavirus/COVID-19 continues to spread and impact individuals, organizations, and communities across the globe, we want to share how Acronis is responding to the pandemic.While our work as a cyber protection company is focused on keeping data, applications, and systems protected, in the face of this crisis, Acronis is committed to ensuring our employees, partners and their families are protected too, while we provide the same high level of support to our partners and customers. We take the health of our extended team seriously and taking all necessary measures to prevent the spread of the disease.
As a global organization, Acronis already has a large number of employees and teams working remotely. Systems and processes were already in place to make this transition fast and simple. Our team easily adapted to “the new normal,” and Acronis remains fully operational and ready to support our customers and partners.Tackling economic inequality
Acronis engage in a number of programs to address Economic inequality all around the world. Examples of these projects include:
Engaged in an ongoing humanitarian aid response providing support to over 3,500 victims of natural disasters and war conflicts through fundraising, humanitarian aid, and facilitating education.
Extended focus on educational activities, both regarding community development and cybersecurity education, by building schools, setting up computer labs, and running IT training classes, impacting over 33,500 people.
Launched a vendor independent MSP academy as a hub for comprehensive business and cybersecurity educationEqual opportunity
We believe that everyone at Acronis deserves respect and equal treatment, regardless of who they are or where they’re from. We believe this because a diverse and inclusive work environment encourages creativity, encourages innovation and increases productivity. Our goal is to foster an inclusive and equitable environment that nurtures a sense of belonging. We deeply honor, treasure and uphold diverse cultures, backgrounds, genders, religions, races, ages, origins, sexuality and skills of our employees. We firmly believe that embracing diversity is paramount in our efforts to effectively provide customer-centric products and services. At Acronis, our goal is to create an inclusive and equitable environment, where people feel they belong, and see diversity as one of the most important factors in being able to successfully deliver customer-focused products and solutions. As our employees are diverse, so too are our customers, and our diversity enables us to not only look at products, processes and systems from different perspectives, but to also fully understand our customers’ requirements. #CyberWomen at Acronis Our global #CyberWomen network offers career development, mentorship, community and more to support women at Acronis both personally and professionally. Driven on both global and regional levels, we offer virtual and in-person meetups, workshops, training and networking opportunities featuring Acronis women, executives and external participants. We established #CyberWomen regional chapters, creating a global network of local support groups supported by our management. We believe this is the key to implementing the changes needed to identify and develop women for leadership positions and increase their numbers in our industry as a whole. In 2023, #CyberWomen regional chapters were running in 10 different countries and reached more than 200 participants via local meetups.Wellbeing
We constantly remind our employees to keep a work
and life balance and to care for their mental health.
At Acronis, we take mental health very seriously and
take several precautions to ensure our team has
the resources needed to receive the very best care
and support possible. These initiatives include our
Acronis Days — normal work week days when all
our employees have the same day off to unwind and
recharge — and access to an Employee Assistance
Program (EAP), a global resource available in 27
languages that offers support to our employees and
their family members dealing with stress and liferelated issues.
In May, we highlighted Mental Health Awareness Month
in the United States, a month where we as a nation
recognize the struggles many of us and our loved ones
face every day.
The common, yet often misunderstood affliction of
mental illness is by no means exclusive to the U.S. and
while awareness towards mental health has increased in
recent years, the stigma towards mental health treatment
and counseling remains present. For our global team,
Mental Health Awareness Month gives us an important
opportunity to bring attention to supporting mental health
worldwide, for ourselves and humanity
Pricing
- Price
- £0.24 to £11.82 a licence a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- A free trial of all features is available free of charge for a period of 30 Days.