Skip to main content

Help us improve the Digital Marketplace - send your feedback

BECHTLE LIMITED

Acronis Cyber Protect Cloud

Acronis Cyber Protect offers a revolutionary approach to cyber protection by integrating data protection with cybersecurity. This integrated method eliminates complexity challenges, delivers better protection against today’s threats, and maximizes efficiency by saving time and money.

Features

  • Advanced Backup
  • Advanced Disaster Recovery
  • Advanced Security
  • Advanced Management
  • Advanced Email Security
  • Advanced Data Loss Prevention

Benefits

  • Reduce recovery times with best-in-industry Recovery Time Objectives
  • Minimize expensive downtime by restoring Windows and Linux systems
  • Easily restore In the event of a data disaster.
  • Protect Data in Microsoft Exchange, Onedrive, Teams and Sharepoint
  • Immutable Cloud Storage protects against deletion of Backup files
  • Separation of users and resources, reducing risk of unauthorised access
  • Identify and close the security gaps in your systems
  • Protect yourself from modern cyberthreats
  • You can easily schedule or manually deploy patches
  • Simplify Disaster Recovery and increase operational efficiency

Pricing

£0.24 to £11.82 a licence a month

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicsector.uk@bechtle.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 3 3 1 2 1 7 3 3 3 8 9 9 2 1

Contact

BECHTLE LIMITED Public Sector
Telephone: 01249 467900
Email: publicsector.uk@bechtle.com

Service scope

Service constraints
No
System requirements
  • Windows Server 2003 SP1/2003 R2 and later
  • Windows Server 2008, 2008 R2, 2012/2012 R2, 2016, 2019, 2022
  • Windows 11, 10, 8/8.1, 7 – all editions
  • Linux with kernel from 2.6.9 to 5.14 and glibc 2.3.4
  • MacOS Sierra 10.12 and later

User support

Email or online ticketing support
Email or online ticketing
Support response times
8 Hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Multiple levels of support are available via a separate Managed Service Agreement
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Customers are supplied with user guides, online video tutorials for self-service

Remote and onsite training (case by case basis)
Assisted installation (case by case basis)
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data can be downloaded via the Console at end of the service
End-of-contract process
Downloading data is included in the cost
Physical shipping (upload to hardware) is optional

Using the service

Web browser interface
Yes
Using the web interface
The entire suite of products can be managed via the Web Interface as a single pane of glass.
Web interface accessibility standard
WCAG 2.1 AAA
Web interface accessibility testing
None
API
Yes
What users can and can't do using the API
Account Management - automates provisioning and billing of Acronis Cyber Cloud services for your customers, and serves as an identity and access management framework.
Alerts API enables activation, inspection, and removal of alerts generated by Acronis Cyber Protection.
Tasks API enables inspection of tasks and activities performed by Acronis Cyber Protection.
Agents API provides information about agents registered in Acronis Cyber Protection and their endpoints.
Resource and Policy Management API enables protection of workloads registered in Acronis Cyber Protection.
Vault Manager API is responsible for meta-information about Vaults, Archives and Backups registered in Acronis Cyber Protection, tracks their data consistency and controls corresponding operations (create, read, update, delete).
API automation tools
Other
API documentation
Yes
API documentation formats
HTML
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
Tenants are logically separated. Capacity management and monitoring.
Usage notifications
Yes
Usage reporting
Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
Other
Other metrics
  • Storage Capacity
  • Number of Devices
  • Type of Devices
  • Number of Advanced Licences
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Acronis Cyber Protect Cloud

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • Windows Server
  • Windows PC
  • Linux
  • Microsoft SQL Server
  • VMware vSphere
  • Oracle Database
  • Microsoft 365
  • Apple Mac
  • MySQL
  • SAP Hana
Backup controls
All backups are configure via the Acronis Cyber Protect Cloud Console.
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users schedule backups through a web interface
Backup recovery
Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
Other
Other protection within supplier network
Data is trasfered via TLS, but also encrypted at AES 256, and stored on encrypted hardware

Data is protected at source, in transit and at rest

Availability and resilience

Guaranteed availability
Target value is 99.9% uptime for the service. No defined recompense structure.
Approach to resilience
Available Upon request
Outage reporting
Email Alerts

Identity and authentication

User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication
Username, Password and 2 Factor Authentication
Access restrictions in management interfaces and support channels
Multi-Factor Authentification
Login Control (IP Address lockdown for Console)
Encryption password (for accessing data)
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
Role-based Access
Devices users manage the service through
Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Standards Institution (BSI)
ISO/IEC 27001 accreditation date
07/03/2014
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Acronis security program based on ISO27001, policies are developed in accordance to this standard's requirements.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
All changes go through formal change management process. Including, if required risk assessment, security approvals, roll back plan, management and operations approvals.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Acronis Software has Vulnerability assessment and patch management built into the management side (for customers, and ourselves)

Systems are scanned daily, and patches are applied instantly or weekly (depending on severity)

Acronis runs 3 global CPOCs which monitor threats and vulnerabilities
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Ongoing independent pen testing, vulnerability assessments, Cyber Security specialists monitoring global events & "friendly hacker" bug bounty program

Issues are closed / patched instantly or weekly depending on severity
Incident management type
Supplier-defined controls
Incident management approach
Network Operations Center (NOC) takes the lead on incident identification and response identifies the root cause of a problem and contacts the appropriate internal incident response team to triage the technology incident. The incident response team is comprised of a carefully selected group that may include representatives from our Information Security and Compliance Department, Data Center Operations, Architecture, and Product Development teams, as well as our Public Relations and Communications teams. All response times are driven by internal SLAs targeted to meet 99.99% availability.

Secure development

Approach to secure software development best practice
Supplier-defined process

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
KVM hypervisor
How shared infrastructure is kept separate
Data is encrypted at rest

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
When selecting our data center providers and data
center locations, we thoroughly assess providers taking
into account the capabilities of the facility, the current
evaluation of the threats (constructional, technical,
environmental, etc.), and the relative attractiveness and
business requirements for the specific region.
With regard to the environment, we review their
commitment to sustainability, assess their power usage
effectiveness (PUE) performance, and ask for their ISO
50001 or ISO 14001 certification or membership in the
iMasons Climate Accord. We treat their environmental
performance as an important deciding factor. While we
are not always able to influence a data center’s choice
of power source or greenhouse gas emissions, we
are making a statement by selecting providers that are
serious about protecting the environment.

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Climate change presents a serious threat to individuals, businesses and communities around us. This year, we undertook our first greenhouse gas (GHG) emissions estimate using the 2022 (previous year) data to understand the impact of our operations on the environment and begin a datadriven journey towards a low-carbon future.

The project was undertaken as part of the CVC GHG Foundation Programme with the help of the Schneider Electric sustainability team, who guided us through collecting relevant data and created a GHG inventory management plan (IMP) according to the reporting principles established in the World Resource Institute (WRI) / World Business Council on Sustainable Development (WBCSD) Greenhouse Gas Protocol: Corporate Accounting and Reporting Standard. In 2022, our scope 1, 2 and 3 market-based emissions totaled 57,202 mt CO2e. We will use the 2022 data as the baseline for target setting and plan to bring GHG accounting up to date with the next report.

Covid-19 recovery

As the novel coronavirus/COVID-19 continues to spread and impact individuals, organizations, and communities across the globe, we want to share how Acronis is responding to the pandemic.While our work as a cyber protection company is focused on keeping data, applications, and systems protected, in the face of this crisis, Acronis is committed to ensuring our employees, partners and their families are protected too, while we provide the same high level of support to our partners and customers. We take the health of our extended team seriously and taking all necessary measures to prevent the spread of the disease.

As a global organization, Acronis already has a large number of employees and teams working remotely. Systems and processes were already in place to make this transition fast and simple. Our team easily adapted to “the new normal,” and Acronis remains fully operational and ready to support our customers and partners.

Tackling economic inequality

Acronis engage in a number of programs to address Economic inequality all around the world. Examples of these projects include:
 Engaged in an ongoing humanitarian aid response providing support to over 3,500 victims of natural disasters and war conflicts through fundraising, humanitarian aid, and facilitating education.
 Extended focus on educational activities, both regarding community development and cybersecurity education, by building schools, setting up computer labs, and running IT training classes, impacting over 33,500 people.
 Launched a vendor independent MSP academy as a hub for comprehensive business and cybersecurity education

Equal opportunity

We believe that everyone at Acronis deserves respect and equal treatment, regardless of who they are or where they’re from. We believe this because a diverse and inclusive work environment encourages creativity, encourages innovation and increases productivity. Our goal is to foster an inclusive and equitable environment that nurtures a sense of belonging. We deeply honor, treasure and uphold diverse cultures, backgrounds, genders, religions, races, ages, origins, sexuality and skills of our employees. We firmly believe that embracing diversity is paramount in our efforts to effectively provide customer-centric products and services. At Acronis, our goal is to create an inclusive and equitable environment, where people feel they belong, and see diversity as one of the most important factors in being able to successfully deliver customer-focused products and solutions. As our employees are diverse, so too are our customers, and our diversity enables us to not only look at products, processes and systems from different perspectives, but to also fully understand our customers’ requirements. #CyberWomen at Acronis Our global #CyberWomen network offers career development, mentorship, community and more to support women at Acronis both personally and professionally. Driven on both global and regional levels, we offer virtual and in-person meetups, workshops, training and networking opportunities featuring Acronis women, executives and external participants. We established #CyberWomen regional chapters, creating a global network of local support groups supported by our management. We believe this is the key to implementing the changes needed to identify and develop women for leadership positions and increase their numbers in our industry as a whole. In 2023, #CyberWomen regional chapters were running in 10 different countries and reached more than 200 participants via local meetups.

Wellbeing

We constantly remind our employees to keep a work
and life balance and to care for their mental health.
At Acronis, we take mental health very seriously and
take several precautions to ensure our team has
the resources needed to receive the very best care
and support possible. These initiatives include our
Acronis Days — normal work week days when all
our employees have the same day off to unwind and
recharge — and access to an Employee Assistance
Program (EAP), a global resource available in 27
languages that offers support to our employees and
their family members dealing with stress and liferelated issues.
In May, we highlighted Mental Health Awareness Month
in the United States, a month where we as a nation
recognize the struggles many of us and our loved ones
face every day.
The common, yet often misunderstood affliction of
mental illness is by no means exclusive to the U.S. and
while awareness towards mental health has increased in
recent years, the stigma towards mental health treatment
and counseling remains present. For our global team,
Mental Health Awareness Month gives us an important
opportunity to bring attention to supporting mental health
worldwide, for ourselves and humanity

Pricing

Price
£0.24 to £11.82 a licence a month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
A free trial of all features is available free of charge for a period of 30 Days.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicsector.uk@bechtle.com. Tell them what format you need. It will help if you say what assistive technology you use.