Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud offers hybrid backup solutions with local and cloud options, advanced encryption, multi-tenancy, and multi-tier architecture. It supports various platforms, virtual machines, and provides granular recovery. Integration capabilities, compliance features, anti-ransomware protection, centralised management, scalability, multiple storage options, and 24/7 support make it comprehensive
Features
- Advanced Backup, Sql, Oracle DB, SAP Hana, Data Protection
- Advanced Security, URL Filtering, Exploit Preventio
- Advanced Management, Patch Management, Software Deployment, Inventory
- Advanced Email Security, Anti Phishing, Anti Spam, Anti Malware, APT
- Advanced Disaster Recovery, Production and Test Failover, Runbooks
- Advanced File Sync and Share, Notarisation, e-signature, collaboration
- Antivirus and Malware Protection
Benefits
- Backup and Restore Data
- Protect your data and devices
- Securely access your data and systems
- Simple fixed price plans (storage costs apply on some products)
Pricing
£1 to £26 a gigabyte a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 7 2 2 9 3 7 2 9 6 5 4 9 7 8
Contact
Transputec Limited
G-Cloud Team
Telephone: 0203 5886570
Email: G-cloud@transputec.com
Service scope
- Service constraints
-
Modern up-to-date browser required; e.g. Google Chrome, Microsoft Edge, Mozilla Firefox, Opera, or Apple Safari
Agent Software Deployment:
The agent software for Windows, macOS, Android, and iOS is available.
Multiple device deployment is supported on Windows only.
Linux servers are also supported, but there is no Linux client for endpoints - System requirements
-
- Windows XP Pro SP1 or higher.
- Windows Server 2003 or highe
- Apple Mac OSX Maverick or higher
- Linux 2.6.9 or higher
- Mobile IOS 12.0 or higher and Android 7.0 or higher
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times are dependant on service level procured
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- None
- Onsite support
- Yes, at extra cost
- Support levels
- Subject to agreement a bespoke service is offered from standard to advanced such as a fully managed service. technical Account Managers and Strategic Advisors are available. Costs are based on scope of agreement
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Subject to scoping requirements with customer but onboarding service will involve consultation and explanation to adopt new service
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Microsoft Word, Excel and PowerPoint
- End-of-contract data extraction
- Agreement on data to be anonymised or deleted. Transfer of any data subject to the data source and destination
- End-of-contract process
- Exit plan agreed as part of managed service agreement defines approach to exit and costs
Using the service
- Web browser interface
- Yes
- Using the web interface
-
Log support request
Subject to support framework:
Via https://cloud.acronis.com. - Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- The API can be used to integration to other Remote Management and Monitoring and Professional Services Automation tools.
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
-
- HTML
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Acronis use logical segregation of tenants and planning and monitoring of their capacities to ensure all customers/users are not affected by the demands of others on the platform
- Usage notifications
- Yes
- Usage reporting
-
- API
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Other
- Other metrics
-
- Agreed metrics as part of managed service agreement
- Job Success/Failure
- Reporting types
-
- API access
- Regular reports
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Acronis
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Hardware containing data is completely destroyed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- File
- Virtual Machines
- Servers
- Databases
- Applications
- Images
- Cloud Data
- Local Storage
- Backup controls
- Protection plan in management console
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users contact the support team to schedule backups
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The standard uptime guarantee for the solution is 99.9% - excluding planned and notified downtime for maintenance.
- Approach to resilience
-
High-availability and redundant infrastructure are designed to minimize associated risks and eliminate single points of failure. Acronis follows the approach of need plus one (N+1) for greater redundancy across all hardware layers of its infrastructure.
Acronis stores customer data employing its own software-defined storage solution, Acronis Storage with Acronis CloudRAID technology. This proprietary erasure-coding algorithm to enhance reliability and protection against failures. - Outage reporting
-
- a public dashboard
- an API
- email alerts
Identity and authentication
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Role based access provisions
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- LRGA Limited
- ISO/IEC 27001 accreditation date
- 31st May 2023
- What the ISO/IEC 27001 doesn’t cover
- Nothing relevant to this framework response
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
ISO/IEC 27001:2013
CyberEssentials
All issues and suspected non-compliance and suspicious activities are reported immediately to our SoC and senior managment (Director level and above) via monitored mailbox/DL (nc@Transputec.com)
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Configuration management - configuration management is documented with any changes being formally defined and agreed.
Change management - RFCs raised for Change Board Authority decision include security impacts including change to availability, integrity and confidentiality, along with rollback plan - subject to sign-off from a technical, service delivery, security and commercial decision maker. Delivery of RFC is in accordance with agreed works including testing and rollback if necessary - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Acronis: internal and external.
External network vulnerability scans are carried out on daily base against all external interfaces (network devices and servers) of the Company assets. At least quarterly External vulnerability scans must be performed by Approved Scanning Vendor (ASV).
Transputec - Internal network vulnerability scans are carried out periodically, based on Internals vulnerability scan program. All elements of corporate network must be covered by this internal vulnerability scans. Regular assessments, timely remediation, and continuous improvement is practiced. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Acronis has 24/7 monitoring of its infrastructure. Acronis’ Network Operations Center (NOC) takes the lead on incident identification process, identifies the root cause of a problem, and contacts the appropriate internal incident response team to triage the technology incident.
All response times are driven by internal SLAs targeted to meet 99.9% availability.
Transputec uses mulitple industry tools to monitor threats and vulnerabilities with a SOC team to assess and mitigate any threats. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- In accordance internal Incident management procedure. Acronis’ incident management culture is based on global best practices. There are seven stages for handling every incident: Preparation, Identification, Containment, Eradication, Recovery, Lessons learned, Notification.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- Other
- Other virtualisation technology used
- VMware, Hyper-V, Xen Server & RHV are all used/available depending on installation.
- How shared infrastructure is kept separate
- Logical separation of tenant, access to the data provide by specific certificate based on Tenant ID
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
IT Equipment and Services: Selection, deployment, and management of IT equipment and services are optimized for efficiency.
Cooling: Acronis pays attention to air flow management, cooling strategies, temperature, and humidity settings.
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
ISO 14001:2013 certified
Science Based Targets Initiative registered
Transputec is committed to managing its CO2 emissions and is focused on working with its clients and suppliers to address Scope 3 emissions
ISO 14001:2013 certified
Science Based Targets Initiative registered
Transputec is committed to managing its CO2 emissions and is focused on working with its clients and suppliers to address Scope 3 emissions For more information please visit https://www.transputec.com/about-us/sustainability/Equal opportunity
Transputec is and always has been a non-discriminatory organisation, employing a global workforce without bias or prejudice and are supportive of gender diversity Transputec is part of the Minority Supplier Development UK (MSDUK) Ethnic Minority Business (EMB) network. As MSDUK EMB suppliers we are part of a broad network of innovative, high growth minority owned businesses, providing an important role in the UK and international IT services supply chain.. for more information please see of website.
https://www.transputec.com/about-us/social-responsibility/Wellbeing
Transputec has an open approach to health and wellbeing, encouraging communication and understanding through wellbeing events delivered generally on an annual basis as well as community out reach and our international outreach programme
https://www.transputec.com/about-us/our-charity-partners/
Pricing
- Price
- £1 to £26 a gigabyte a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 day trial: During the trial, you can fully utilize all features of Acronis Cyber Protect. After the trial period, you’ll have the option to choose between the standard and advanced versions, as well as between the Cyber Backup and Cyber Protect editions