Skip to main content

Help us improve the Digital Marketplace - send your feedback

Transputec Limited

Acronis Cyber Protect Cloud

Acronis Cyber Protect Cloud offers hybrid backup solutions with local and cloud options, advanced encryption, multi-tenancy, and multi-tier architecture. It supports various platforms, virtual machines, and provides granular recovery. Integration capabilities, compliance features, anti-ransomware protection, centralised management, scalability, multiple storage options, and 24/7 support make it comprehensive

Features

  • Advanced Backup, Sql, Oracle DB, SAP Hana, Data Protection
  • Advanced Security, URL Filtering, Exploit Preventio
  • Advanced Management, Patch Management, Software Deployment, Inventory
  • Advanced Email Security, Anti Phishing, Anti Spam, Anti Malware, APT
  • Advanced Disaster Recovery, Production and Test Failover, Runbooks
  • Advanced File Sync and Share, Notarisation, e-signature, collaboration
  • Antivirus and Malware Protection

Benefits

  • Backup and Restore Data
  • Protect your data and devices
  • Securely access your data and systems
  • Simple fixed price plans (storage costs apply on some products)

Pricing

£1 to £26 a gigabyte a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at G-cloud@transputec.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 7 2 2 9 3 7 2 9 6 5 4 9 7 8

Contact

Transputec Limited G-Cloud Team
Telephone: 0203 5886570
Email: G-cloud@transputec.com

Service scope

Service constraints
Modern up-to-date browser required; e.g. Google Chrome, Microsoft Edge, Mozilla Firefox, Opera, or Apple Safari
Agent Software Deployment:
The agent software for Windows, macOS, Android, and iOS is available.
Multiple device deployment is supported on Windows only.
Linux servers are also supported, but there is no Linux client for endpoints
System requirements
  • Windows XP Pro SP1 or higher.
  • Windows Server 2003 or highe
  • Apple Mac OSX Maverick or higher
  • Linux 2.6.9 or higher
  • Mobile IOS 12.0 or higher and Android 7.0 or higher

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times are dependant on service level procured
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
None
Onsite support
Yes, at extra cost
Support levels
Subject to agreement a bespoke service is offered from standard to advanced such as a fully managed service. technical Account Managers and Strategic Advisors are available. Costs are based on scope of agreement
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Subject to scoping requirements with customer but onboarding service will involve consultation and explanation to adopt new service
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
Microsoft Word, Excel and PowerPoint
End-of-contract data extraction
Agreement on data to be anonymised or deleted. Transfer of any data subject to the data source and destination
End-of-contract process
Exit plan agreed as part of managed service agreement defines approach to exit and costs

Using the service

Web browser interface
Yes
Using the web interface
Log support request

Subject to support framework:
Via https://cloud.acronis.com.
Web interface accessibility standard
WCAG 2.1 AA or EN 301 549
Web interface accessibility testing
None
API
Yes
What users can and can't do using the API
The API can be used to integration to other Remote Management and Monitoring and Professional Services Automation tools.
API automation tools
  • Ansible
  • Chef
  • OpenStack
  • SaltStack
  • Terraform
  • Puppet
API documentation
Yes
API documentation formats
  • HTML
  • PDF
Command line interface
No

Scaling

Scaling available
Yes
Scaling type
Automatic
Independence of resources
Acronis use logical segregation of tenants and planning and monitoring of their capacities to ensure all customers/users are not affected by the demands of others on the platform
Usage notifications
Yes
Usage reporting
  • API
  • Email

Analytics

Infrastructure or application metrics
Yes
Metrics types
  • CPU
  • Disk
  • Memory
  • Other
Other metrics
  • Agreed metrics as part of managed service agreement
  • Job Success/Failure
Reporting types
  • API access
  • Regular reports

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Acronis

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Hardware containing data is completely destroyed
Equipment disposal approach
A third-party destruction service

Backup and recovery

Backup and recovery
Yes
What’s backed up
  • File
  • Virtual Machines
  • Servers
  • Databases
  • Applications
  • Images
  • Cloud Data
  • Local Storage
Backup controls
Protection plan in management console
Datacentre setup
Multiple datacentres with disaster recovery
Scheduling backups
Users contact the support team to schedule backups
Backup recovery
Users contact the support team

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
The standard uptime guarantee for the solution is 99.9% - excluding planned and notified downtime for maintenance.
Approach to resilience
High-availability and redundant infrastructure are designed to minimize associated risks and eliminate single points of failure. Acronis follows the approach of need plus one (N+1) for greater redundancy across all hardware layers of its infrastructure.
Acronis stores customer data employing its own software-defined storage solution, Acronis Storage with Acronis CloudRAID technology. This proprietary erasure-coding algorithm to enhance reliability and protection against failures.
Outage reporting
- a public dashboard
- an API
- email alerts

Identity and authentication

User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Role based access provisions
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password
Devices users manage the service through
Dedicated device on a segregated network (providers own provision)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
LRGA Limited
ISO/IEC 27001 accreditation date
31st May 2023
What the ISO/IEC 27001 doesn’t cover
Nothing relevant to this framework response
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO/IEC 27001:2013
CyberEssentials
All issues and suspected non-compliance and suspicious activities are reported immediately to our SoC and senior managment (Director level and above) via monitored mailbox/DL (nc@Transputec.com)

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Configuration management - configuration management is documented with any changes being formally defined and agreed.

Change management - RFCs raised for Change Board Authority decision include security impacts including change to availability, integrity and confidentiality, along with rollback plan - subject to sign-off from a technical, service delivery, security and commercial decision maker. Delivery of RFC is in accordance with agreed works including testing and rollback if necessary
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Acronis: internal and external.
External network vulnerability scans are carried out on daily base against all external interfaces (network devices and servers) of the Company assets. At least quarterly External vulnerability scans must be performed by Approved Scanning Vendor (ASV).

Transputec - Internal network vulnerability scans are carried out periodically, based on Internals vulnerability scan program. All elements of corporate network must be covered by this internal vulnerability scans. Regular assessments, timely remediation, and continuous improvement is practiced.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Acronis has 24/7 monitoring of its infrastructure. Acronis’ Network Operations Center (NOC) takes the lead on incident identification process, identifies the root cause of a problem, and contacts the appropriate internal incident response team to triage the technology incident.
All response times are driven by internal SLAs targeted to meet 99.9% availability.

Transputec uses mulitple industry tools to monitor threats and vulnerabilities with a SOC team to assess and mitigate any threats.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
In accordance internal Incident management procedure. Acronis’ incident management culture is based on global best practices. There are seven stages for handling every incident: Preparation, Identification, Containment, Eradication, Recovery, Lessons learned, Notification.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Virtualisation technology used to keep applications and users sharing the same infrastructure apart
Yes
Who implements virtualisation
Supplier
Virtualisation technologies used
Other
Other virtualisation technology used
VMware, Hyper-V, Xen Server & RHV are all used/available depending on installation.
How shared infrastructure is kept separate
Logical separation of tenant, access to the data provide by specific certificate based on Tenant ID

Energy efficiency

Energy-efficient datacentres
Yes
Description of energy efficient datacentres
IT Equipment and Services: Selection, deployment, and management of IT equipment and services are optimized for efficiency.
Cooling: Acronis pays attention to air flow management, cooling strategies, temperature, and humidity settings.

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

ISO 14001:2013 certified
Science Based Targets Initiative registered
Transputec is committed to managing its CO2 emissions and is focused on working with its clients and suppliers to address Scope 3 emissions

ISO 14001:2013 certified
Science Based Targets Initiative registered
Transputec is committed to managing its CO2 emissions and is focused on working with its clients and suppliers to address Scope 3 emissions For more information please visit https://www.transputec.com/about-us/sustainability/

Equal opportunity

Transputec is and always has been a non-discriminatory organisation, employing a global workforce without bias or prejudice and are supportive of gender diversity Transputec is part of the Minority Supplier Development UK (MSDUK) Ethnic Minority Business (EMB) network. As MSDUK EMB suppliers we are part of a broad network of innovative, high growth minority owned businesses, providing an important role in the UK and international IT services supply chain.. for more information please see of website.
https://www.transputec.com/about-us/social-responsibility/

Wellbeing

Transputec has an open approach to health and wellbeing, encouraging communication and understanding through wellbeing events delivered generally on an annual basis as well as community out reach and our international outreach programme
https://www.transputec.com/about-us/our-charity-partners/

Pricing

Price
£1 to £26 a gigabyte a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30 day trial: During the trial, you can fully utilize all features of Acronis Cyber Protect. After the trial period, you’ll have the option to choose between the standard and advanced versions, as well as between the Cyber Backup and Cyber Protect editions

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at G-cloud@transputec.com. Tell them what format you need. It will help if you say what assistive technology you use.