Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices...

74
1 Dual headquarters in Switzerland and Singapore Confidential © Acronis 2020 Dual headquarters in Switzerland and Singapore Acronis Cyber Protect Modernize Your Cybersecurity and Backup with Integrated Cyber Protection

Transcript of Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices...

Page 1: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

1Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Dual headquarters

in Switzerland and Singapore

Acronis Cyber ProtectModernize Your Cybersecurity and Backup with Integrated

Cyber Protection

Page 2: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

2Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

The Threat Landscape is Evolving

Cyber Attacks are Growing

Digital data is growing rapidly

Data is growing 33 times faster than IT staff

Attacks are rising globally

The cost of an attack is $200,000 on average

Foundational security tools are no

longer enough

Basic security tools miss 57% of attacks

and HW will be flat

The Multi-tool Approach Has Major Challeges

Complex

77% of SMBs struggle from lack of resources to handle

the growing attacks

Expensive

70% of businesses have invested in more than 5 tools

over the last year, but the ROI is decreasing

Ineffective

Tools end up underutilized, 60% of SMBs go out of

business within 6 months after an attack

Staying Protected is Complex

Page 3: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

3Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

New Threats Require a New Approach

AI-powered integration of data protection and cybersecurity

PreventionProactive Protection

▪ Vulnerability assessment and

patch management to avoid

downtime and maintenance

▪ Malware removal from backups

▪ Prevention of reoccurring

infections (patch on recovery)

Active Protection

▪ Continuous data protection (CDP)

to avoid any data loss

▪ Defenses against ransomware

and other malware that cause

costly downtime

▪ Self-defense mechanisms for the

agent and backup storage

Reactive Protection

▪ Integrated disaster recovery

▪ Instant recovery: no data loss,

near zero RTO and RPO

▪ Metadata storage for forensic

investigation of incidents

▪ Synergy with other security

products installed on a device

Page 4: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

4Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Anti-Malware and

Anti-Virus

Full stack, next-generation AI-based

protection against malware, URL

filtering, automated backup scanning

Backup and

Recovery

Fast and reliable recovery of your

apps, systems and data on any

device, from any incident

Cyber Security and

Endpoint Protection

Endpoint protection management:

remote desktop, vulnerability

assessment and patching, drive health

Acronis Cyber Protect integrates backup, disaster recovery, AI-based malware

and ransomware protection, remote desktop, and security tools in a single solution

Acronis Cyber Protect

Proactive Protection Active Protection Reactive Protection

Page 5: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

5Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Proactive Protection FeaturesThese advanced security features set us apart by delivering proactive, defense-in-depth protection against any threat

Feature Acronis

Cyber

Protect

15

VMware

Carbon

Black

Cloud

Crowd

Strike

Falcon

Premium

FireEye

Endpoint

Security

BlackBerry

Cylance

PROTECT

Malwarebytes

Endpoint

Protection

McAfee

Endpoint

Security

Sophos

Intercept X

Advanced

with EDR

Symantec

Endpoint

Protection

Automatic antivirus definition

updates✓ ✓ Х Х Х Х ✓ ✓ ✓

Installation of latest security

patches✓ Х Х

Limited

On malware

detection

Х Х Х Х Х

Continuous data protection

(CDP)✓ Х Х Х Х Х Х Х

Х

Add on

Vulnerability assessment ✓ ✓ Х Х Х Х Х ХХ

Add on

Security posture evaluation✓ Х Х Х Х Х ✓ Х Х

Fail-safe patching ✓ Х Х Х Х Х Х Х Х

Data protection maps ✓ Х Х Х Х Х Х Х Х

Forensics ✓ ✓ ✓ ✓Х

Add onХ ✓ ✓ Х

Drive health monitor ✓ Х Х Х Х Х Х Х Х

Adjust protection based on

threat intelligence✓ Х Х Х Х Х Х Х Х

Unique feature

Unique feature

Unique feature

Unique feature

Page 6: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

6Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Active Protection FeaturesWe’ve built onto the standard, active protection, employed by most solutions, to effectively prevent system

downtime

Feature Acronis

Cyber

Protect

15

VMware

Carbon

Black

Cloud

Crowd

Strike

Falcon

Premium

FireEye

Endpoint

Security

BlackBerry

Cylance

PROTECT

Malwarebytes

Endpoint

Protection

McAfee

Endpoint

Security

Sophos

Intercept X

Advanced

with EDR

Symantec

Endpoint

Protection

Real-time protection. ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓

Behavioral analysis and

dynamic detection rules✓ ✓ ✓ ✓ Х ✓ ✓ ✓ ✓

Pre-execution ML/AI-based

analysis✓ Х ✓ ✓ ✓ Х ✓ ✓ ✓

Exploit prevention ✓ ✓ ✓ ✓Limited

Memory-only✓ ✓ ✓ ✓

Zero-day protection ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓

Disk and MBR protection ✓ ✓ Х ✓ ✓ Х ✓ ✓ ✓

FirewallХ

Planned (Q3)Х

Х

Add onХ Х Х ✓

Х

Add on✓

Web protection (URL

filtering)✓ Х Х

Х

Add onХ ✓ ✓ ✓ Х

Network shares and mapped

devices protection✓ ✓ Х

Х

Add on✓ Х ✓ ✓

Limited

Local-user scan

EDRХ

Planned (Q4)✓ ✓ ✓

Х

Add on✓ ✓ ✓ ✓

Page 7: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

7Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Reactive Protection FeaturesThe unique integration of backup and antimalware, introduces new cyber protection capabilities to recover from

breaches

Feature Acronis

Cyber

Protect

15

VMware

Carbon

Black

Cloud

Crowd

Strike

Falcon

Premium

FireEye

Endpoint

Security

BlackBerry

Cylance

PROTECT

Malwarebytes

Endpoint

Protection

McAfee

Endpoint

Security

Sophos

Intercept X

Advanced

with EDR

Symantec

Endpoint

Protection

Malware removal ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓

Backup and recovery ✓ Х Х Х Х Х Х Х Х

Ransomware auto-rollback ✓ Х Х Х Х Х Х ✓ Х

Malware scan of backups ✓ Х ХХ

Add onХ Х Х Х Х

Rescue with bootable media

(restore image of crashed

machine/one without OS)

✓ Х Х Х Х Х Х Х Х

Safe recovery (antivirus

updates and security

patches into the recovery

process)

✓ Х Х Х Х Х Х Х Х

Unique feature

Page 8: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

8Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Extensive Management FeaturesEnables efficient management of your protected endpoints and saves time, efforts, and money

Feature Acronis

Cyber

Protect

15

VMware

Carbon

Black

Cloud

Crowd

Strike

Falcon

Premium

FireEye

Endpoint

Security

BlackBerry

Cylance

PROTECT

Malwarebytes

Endpoint

Protection

McAfee

Endpoint

Security

Sophos

Intercept X

Advanced

with EDR

Symantec

Endpoint

Protection

Unified platform for multiple

services: backup,

cybersecurity, file sync and

share, etc.

✓ Х Х Х Х Х Х Х Х

Auto-discovery of machines ✓ ✓ ✓ Х Х ✓ Х Х ✓

Remote agent installation ✓ ✓ Х Х Х ✓ Х Х ✓

Remote wipe ✓ Х Х Х Х Х ХХ

Add on for mobileLimited

Remote desktop ✓ Х Х Х Х Х Х Х Х

Compliance reporting ✓ ✓ Х Х Х Х ✓ Х Х

Exclusion management ✓ ✓ ✓ Х ✓ ✓ ✓ ✓ Х

Automatic whitelisting ✓ Х Х Х ХLimited

Group Policy objectsХ Х Х

Unique feature

Page 9: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

9Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Acronis Cyber Protect Benefits

Page 10: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

10Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Eliminate Complexity Challenges

Simplify your protection efforts with a

single protection tool for all cyber

protection aspects:

▪ One license

▪ One agent

▪ One management console

▪ One vendor support line

▪ One shared information about a protected

system

Easily manage all protection aspects via a

single pane of glass

Eliminate performance and compatibility

issues

Save time and hassle associated with

managing multiple vendors

Quickly and easily identify and fix issues

Page 11: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

11Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Deliver Better Protection Against Today’s Threats

Eliminate gaps in your defenses with a single,

integrated solution, addressing all three

layers of protection:

▪ Proactive: Vulnerability assessments and patch

management, removal of malware from backups, hard

drive health checks, and patching on recovery to

prevent reoccurring infections

▪ Active: Continuous data protection, real-time defenses

against viruses, ransomware, and cryptojacking, and

self-defense capabilities that guard the agent and

backup storage

▪ Reactive: Integrated disaster recovery, metadata

storage for the forensic investigation of incidents, and

the ability to co-exist with other security solutions

Proactively avoid costly downtime

Respond to incidents quickly and efficiently

Keep your systems up and running

Block ransomware attacks before they

happen

Allow employees to work safely

Inspire customer confidence and trust

Page 12: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

12Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Maximize Efficiency

Eliminate unnecessary costs and deliver

better protection with the resources that you

already have:

▪ Streamlined management

▪ No need for new hardware

▪ No additional IT staff

▪ No training required

▪ No need to spend time and money for

managing multiple vendors

Cut unnecessary administrative time

Manage all cyber protections aspects with

ease

Improve productivity

Avoid new expenses

Reduce TCO

Page 13: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

13Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Integration Reveals New Cyber Protection Capabilities

Page 14: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

14Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Respond

Patch management integrated with backup

Malware quarantine

Rescue with bootable media

Identify

Infrastructure and

devices auto-discovery

Vulnerability assessment

Data protection map

Detect

Dashboards and reports

Defenses against

malware / ransomware

Hard drive

health control

Protect

Remote agent

installation

Backup and Disaster Recovery

Unified protection

policies management

Recover

Backup and Disaster Recovery

Forensic information in backups

Remote desktop

Acronis Cyber Protect: Key Features

Function areas are grouped according to the NIST Cybersecurity Framework

Page 15: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

15Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

The Power of Integration

One integrated solution:

▪ Eliminates complexity

▪ Delivers new security capabilities

▪ Keeps costs down

One agent

One backend

One management console

One user interface

One vendor support line

One license

One shared information about protected system

Page 16: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

16Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Innovative Data Protection Scenarios

Continuous Data Protection

Avoid even the smallest data

loss in key applications

Better Protection with Fewer

Resources: Offload and enable

more aggressive scans and

vulnerability assessments in central

storage, including cloud

Safe Endpoint Recovery:

Integrate anti-malware

updates and patches into the

recovery process

Smart Protection Plan: Auto-

adjust patching, scanning and

backup to current CPOC alarms

Fail-safe Patching:

Automatically backup endpoints

before installing any patches to

roll-back immediately

Data Protection Map:

Monitor the protection

status of files with

classification, reporting and

unstructured data analytics

Forensic Backup: Image-

based backup with valuable,

additional data added to

backups

Global and Local Whitelists

from backups support more

aggressive heuristics by

preventing false detections

Page 17: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

17Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

1. Continuous Data Protection

Define the list of critical apps for every device that users

are working with most often. Acronis’ agent monitors

every change made in the listed applications.

In case of a malware infection, you can restore the data

from the last backup and apply the latest collected

changes so no data is lost.

IT controls what is continuously backed up – Office

documents, financial forms, logs, graphic files, etc.

Gain safe and instant remediation without data loss and close to zero RPOs

Why?

▪ Ensure all your essential work-in-progress is safe as

data is protected even between the backups

Page 18: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

18Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

2. Include Backup Information for Forensic Investigation

By activating a special “Forensic Mode” in the

product, memory dumps and full HDD images on

a sector level can be collected.

Back up vital data as well as information

that’s useful for future analysis

Why?

▪ Investigate ‘insider’ attacks against corporate

data (IP theft, information leakage, etc.)

▪ Simplify and speed up the investigation

process

▪ Improve internal security

Page 19: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

19Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

3. Data Compliance Reporting and Data Protection Map

Use automatic data classification to track the

protection status of important files. IT will be alerted

as to whether the files were backed up or not.

Why?

▪ Make sure all important data is backed up

▪ Quickly uncover failed backups and highlight

threats

▪ Get actionable insights to execute risk mitigation

steps

▪ Satisfy compliance requirements by proving

data is backup regularly

Page 20: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

20Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

4. Fail-safe Patching

A bad system patch can render a system

unusable. Patch management rollbacks have

limitations and can be slow. Create an image

backup of selected machines before installing a

system or application patch.

Back up endpoints before patching to enable

quick rollback to a working state

Why?

▪ Save time by accelerating the patching process

▪ Eliminate patching difficulties and delays

▪ Reduce breach rates caused by improper

patching

▪ Support faster and more reliable operations

Page 21: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

21Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

5. Safe Recovery

The OS image or applications in the backup can have

vulnerabilities.

Patching the machine and applying the latest anti-malware

definitions allows users to restore the OS image with the

latest patches, reducing the chance of a reoccurring

infection.

▪ Updates the anti-malware

database

▪ Installs the latest security

patches

Integration of AV updates and patch management into the recovery process

Why?

▪ Ensure the system you are recovering into

production is malware free

▪ Reduce the chance of reinfection

▪ Automate and speed up the recovery process

Page 22: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

22Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

6. Malware Scan in Centralized Locations

Scanning full disk backups at a centralized location helps

find potential vulnerabilities and malware infections –

ensuring users restore a malware-free backup.

▪ Increases potential rootkit and bootkit detections

▪ Reduces loads of client endpoints

Anti-malware scanning of backups provide additional security

Why?

▪ Increase security by restoring only

clean data

▪ Avoid performance degradation by

avoiding endpoint overload

Page 23: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

23Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

7. Smart Protection Plan

Acronis CPOCs* monitor the cybersecurity

landscape and release alerts. Acronis products

automatically adjust protection plans based on

these security alerts. This approach can result in

more frequent backups, deeper AV scans,

specific patch installs, etc.

Protection plans will be restored when the

situation is back to normal.

Ensure your protection is up to date

*Acronis Cyber Protection Operation Centers

Why?▪ Mitigate risks from upcoming and existing

threats

▪ Reduce reaction times through

automation

Page 24: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

24Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

8. Global and Local Whitelists from Backups Prevent False Detections

Improved detection rates may lead to more false positive alerts.

Traditional, global whitelisting does not support custom applications.

Acronis Cyber Protect scans backups with anti-malware technologies

(AI, behavioral heuristics, etc.) to whitelist organizationally unique apps

and avoid future “false positives”.

▪ Improves detection rate via improved heuristics

▪ Supports manual whitelisting

Build global and local whitelists to prevent false detections

while making more aggressive, accurate heuristics

Why?▪ Reduce false positives and ensure legitimate data is

always accessible

▪ Save time by eliminating time-consuming manual

whitelisting of unique apps

Page 25: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

25Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Top Use-Cases for Acronis Cyber Protect▪ Remote work protection. Protect remote workers with

multiple remote work protection capabilities – remote

wipe, protection for remote work tools, remote

connection, and others.

▪ Simplified administration. Discover all devices that

require protection and remotely install just one agent –

instead of many – for anti-malware, backup, remote

desktop, patch, etc.

▪ Zero-day malware and ransomware protection. Get

industry-leading, AI-based Acronis Active Protection has

just been extended with a static analyzer and behavioral

analysis.

▪ Compliance and forensic investigations. The right

solution for high compliance requirements – Acronis

equips you with image-based backup and forensic data

like free space and memory dump.

▪ Post malware-attack recovery. Lower risk of

reinfection and ensure fewer operations with anti-

malware scans of backups in centralized locations and

safe and quick recovery – patch updates ensure

backups are covered too.

▪ Protection for all key files. See what data is covered

at a glance via Acronis’ comprehensive Data Protection

Map.

▪ Real-time protection of important documents. Count

on continuous data protection to immediately save all

changes to critical files, even between backups.

▪ Auto-response to emerging threats. Adjust the scope

and the schedule of backups or anti-malware scans,

based on real-time alerts from Acronis Cyber Protection

Operation Centers.

▪ Minimal planned and unplanned downtime. Benefit

from simplified maintenance routines and proactive

protection, including: hard drive health checks, on-time

patches and regular vulnerability assessments, plus

real-time improved Acronis Active Protection.

Page 26: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

26Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Key Features Overview

Page 27: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

27Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Complete

protection

Hybrid cloud

architecture

Instant

recovery

Blockchain

notarization

Proactive

ransomware

protection1

4

2

5

3

Includes All Acronis Cyber Backup Advantages

Unmatched

simplicity6

Extended!

Why? Faster recovery, better RTOs

Page 28: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

28Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Significantly Extended Anti-Malware Capabilities

AcronisActive Protection

Anti-ransomware, anti-cryptojacking, AI- and ML-enabled

Acronis static AI analyzer

On-access and on-demand detection

Acronis anti-malware engine

Any malware(cloud and local detection)

Acronis behavioral engine

On-access detection

Acronis

Cyber Backup

Acronis Cyber Protect

Native integration with Windows Security Center

Why? Actively prevent downtime and data loss, not just recover the information after an attack

Page 29: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

29Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Anti-Malware Protection

Full-stack anti-malware protection for

Windows and macOS

▪ Real-time protection against malware

▪ Cryptomining process detection

▪ Ransomware detection

▪ On-demand scanning

▪ Self-protection: Protect Acronis components (e.g. registry,

service stopping, Acronis file protecting)

▪ Network folder protection: Protect the data in shared

folders on your machine against ransomware

▪ Server-side protection: Protect the data in shared folders

within your network against ransomware

▪ Files quarantine

▪ Exclusions management: Specify processes that will not

be considered malware; exclude folders where file

changes will not be monitored; select files and folders

where scheduled scanning will not be executed

Why?▪ Block malware before it affects your data

▪ Ensure business continuity

▪ Enable employees to work uninterrupted

Page 30: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

30Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Vulnerability AssessmentDiscover an issue before an issue

happens

▪ Continuous, daily update of Acronis’ vulnerability

and patch management database

▪ Support for:

• Microsoft:

a) Workstations – Windows 7 and later

b) Server – Windows Server 2008R2 and later

c) Microsoft Office (2010 and more) and related

components

d) .NET Framework and server applications

• Adobe, Oracle Java

• Browsers and other software

Why?▪ Identify vulnerabilities before attackers find them

▪ Identify the level of risk on your systems

▪ Mitigate potential threats

▪ Optimize security investments

Page 31: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

31Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Patch ManagementFix an issue before it happens

Large common vulnerabilities and

exposures database, 250-300 new CVEs

weekly

▪ Auto-approval of patches

▪ Deployment on a schedule

▪ Manual deployment

▪ Flexible reboot and maintenance window options

▪ Staged deployment

▪ All Windows updates including MS Office, and

Win10 apps

▪ Support for patch management of Microsoft and

third-party software on Windows

Why?▪ Automate your protection

▪ Reduce potential risks

▪ Prevent attacks (e.g Equifax, WannaCry)

Page 32: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

32Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

URL Filtering Controls Access to Malicious URLs

Control access to internet websites by

permitting or denying access to specific

websites based on information contained in

an URL list

▪ HTTP/HTTPS interceptor

▪ Black/whitelists for URLs

▪ Payload analysis for malicious URLs

Acronis URL Filtering List:

▪ Acronis own signatures

▪ AI-based detection (currently in Beta)

▪ Licensed signatures and intelligence from partners

like https://apwg.org/, etc

Why?▪ Prevent attacks through

malicious/hacked websites

▪ Gain better compliance

▪ Increase employee productivity

Page 33: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

33Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Windows Defender Antivirus or Microsoft Security Essentials Management

▪ Enforce settings across multiple machines

▪ Collect all Windows Defender Antivirus and Microsoft

Security Essentials detection events and display them in

the management console

Why?▪ Streamline management

▪ Save time and effort

Page 34: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

34Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Flexible Monitoring and Reporting

▪ Hardware health monitoring (HDD,

SSD)

▪ Active alert control

▪ Missing updates control

▪ Customizable dashboard widgets

Why?▪ Easily manage your data

▪ Quickly identify any issues

▪ Obtain actionable information

▪ Get quick access to management actions

Page 35: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

35Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Remote Desktop

Remotely operate any endpoint as if you are near the device

▪ Assist remote users and avoid a gigantic waste of time

▪ Reach systems that are sitting in a private network without changing

firewall settings or establishing additional VPN tunnels. It uses outgoing

connections (443 port)

Why?▪ Save time

▪ Easily manage and access data

▪ Solve issues quickly and easily

Page 36: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

36Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

One Protection Plan

Covers all cyber

protection aspects:▪ Backup

▪ Anti-malware protection

▪ URL filtering

▪ Vulnerability assessment

▪ Patch management

▪ Data discovery (via data protection map)

▪ Windows Defender Antivirus and

Microsoft Security Essentials

management

Why?▪ Streamline cyber protection management

▪ Get actionable, unified view

▪ Save time and effort

Page 37: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

37Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Devices Auto-Discovery and Remote Agent InstallationSimplify the process of installing multiple agents at once – in the cloud and on-premises

▪ Network-based discovery

▪ Active Directory-based discovery

▪ Import a list of computers from the file

▪ Auto-apply a protection plan

▪ Batch remote agent installationwith a discovery wizard

Why?▪ Simplify installation

processes

▪ Save time and resources

Page 38: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

38Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Drive Health Monitoring

Know about a disk issue before

it happens

▪ Uses a combination of machine learning,

S.M.A.R.T. reports, drive size, drive vendor,

etc. to predict HDD/SSD failures

▪ The machine-learning model allows 98.5%

predictions accuracy (and we keep improving

it)

▪ Once a drive alert is raised, you can take

action, for example backup critical files from

the failing drive

Why?▪ Easily detect potential failures

▪ Avoid unpredictable data loss

▪ Proactively improve uptime

▪ Reduce risk of unexpected downtime

Page 39: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

39Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Remote Work and Anti-Epidemic Features

Page 40: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

40Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Remote Work and Anti-Epidemic Features

▪ Easy Remote Desktop access from

Windows or Mac

▪ Mission critical telecommute apps priority

patching

▪ URL filtering that protects from COVID-19

scams

▪ Easy remote Windows-based machine

wipe

▪ Remote desktop connectivity

▪ Additional CPOC alerts related to public

health

▪ Keep germs away via voice controlled

Cyber Console

Page 41: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

41Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Acronis Remote Device Wipe

Remote wipe

Administrators can wipe Windows machine remotely from the

Acronis Cyber Protect console. Administrators rights on the

endpoint machine are required.

The "Wipe data" action restores a machine to its factory default

settings. All data, applications, and settings will be removed. For

example, if the machine gets lost or stolen.

Why?▪ Prevent unauthorized access

▪ Get greater control over sensitive data

▪ Reduce risk data of loss

Page 42: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

42Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Ensure Safety of Remote Work Tools

Collaboration tools

Zoom

Webex

Microsoft Teams

VPNs

OpenVPN

Cisco Anyconnect

SonicWall GVPN

Fortigate VPN

Cisco Meraki

Cisco VPN

Sophos SSL VPN

Client

Fortigate VPN

Draytek

NordVPN

Prioritized patch management and anti-malware protection

Why?▪ Eliminate potential cybersecurity

weaknesses

▪ Enable employees to work

securely

▪ Increase productivity

▪ Reduce risk

Page 43: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

43Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

CPOC Alerts on COVID-19-related Malware

Don’t let malware hide behind coronavirus news

Page 44: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

44Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Block COVID-19 Fake News Sites with URL Filtering

Fact checking by Acronis analysts and communities

Page 45: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

45Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Protection Plans for Office and Remote Workers

▪ More frequent backups, anti-malware,

and vulnerability assessments

▪ Stricter actions (Block vs Ask)

▪ Restrict backup destinations to

corporate locations only (block USB,

local shares)

▪ Enable Battery power as backup

condition

Simplify security management for remote environments

Why?▪ Simplify security management

▪ Reduce security risks

▪ Make sure your team is protected

Page 46: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

46Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Acronis #CyberFit Score

Page 47: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

47Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Make Sure Your Devices are #CyberFit

Your #CyberFit protection score

(similar to your FICO score)

incorporates the following assessments:

▪ Anti-malware software is installed

▪ Backup solution is available

▪ Firewall is available and enabled

▪ VPN is enabled and running

▪ Full disk encryption is enabled

▪ NTLM is restricted for outgoing traffic

Why?▪ Keep track of your protection status

▪ Optimize your protection

▪ Ensure business continuity

Page 48: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

48Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

#CyberFit Score widget on the default dashboard

The #CyberFit Score by device widget

becomes default on the dashboard.

Page 49: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

49Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Acronis Cyber Protection Operation Centers

Page 50: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

50Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Scottsdale, AZ, US

Schaffhausen, Switzerland

Singapore

Acronis Cyber Protection Operation CentersStay alert with global threats monitoring 365/7/24

Up-to-date protection

Provides threat and vulnerability

awareness, proactive detection, and the

ability for Acronis to enhance products

Top-level compliance

GDPR Art. 33, NIS Directive Art. 16 (4),

Telecom Framework Directive Art. 13a,

eIDAS regulation Art. 19

Support and threat investigation

Advanced security experts help to speed

up remediation and provide additional

security services

Page 51: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

51Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Acronis Cyber Protect Editions and Licensing

Page 52: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

52Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Editions Overview – diff backup + new line with headers

Editions Acronis Cyber

Backup Standard

Acronis Cyber

Backup Advanced

Acronis Cyber

Protect Essentials

Acronis Cyber

Protect Standard

Acronis Cyber

Protect Advanced

Overview Designed for

backing up data in

on-premises or

cloud Windows,

Linux, VMware,

Hyper-V or mixed

heterogeneous

small and medium

environments.

Designed for lager

environments,

includes advanced

backup features,

such as:

• Group

management

• Shared protection

plans

• Off-host data

processing

• Tape support

• Deduplication

• Customizable

reporting

Includes basic file-

level backup

capabilities and

essential cyber

protection features,

such as:

• Anti-virus and

anti-malware

protection

• Vulnerability

assessment

• Patch

management

• URL filtering

Includes the Acronis

Cyber Backup

Standard and the

Acronis Cyber Protect

Essentials features,

plus additional

cybersecurity

functionality, such as:

• Data protection

map

• URL filtering with

categorization

• Continuous data

protection

• HDD health

Includes advanced

backup and cyber

protection capabilities

for larger

infrastructures, such as

• Support for

additional workloads

• Shared protection

plans

• Backup notarization

• Safe recovery of

backups

• Backup scan for

malware

• Dashboard

configuration

• #CyberFit Score

Page 53: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

53Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Acronis Cyber Protect

Acronis Cyber

Backup Standard

Acronis Cyber

Backup Advanced

Acronis Cyber

Protect Essentials

Acronis Cyber

Protect Standard

Acronis Cyber

Protect Advanced

Acronis Cyber Backup Standard features Limited

Acronis Cyber Backup Advanced features

• Vulnerability assessment NEW

• Basic auto-discovery and remote agent installation NEW

Advanced anti-malware and security management features

• Patch management

• Anti-virus and anti-malware protection

• URL filtering

• Continuous data protection

• Anti-malware scanning of backups

• Safe recovery

• Smart protection plans

• Windows Defender Antivirus and Microsoft Security Essentials

management

• Drive health monitoring

• Remote desktop

• Forensic data backup

• Data protection map• Remote device wipe

• Patch management

• Anti-virus and anti-

malware

• URL filtering

• Remote desktop

• Remote device wipe

• Windows Defender

Antivirus and

Microsoft Security

Essentials

management

Editions Comparison

Page 54: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

54Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Available Licenses

▪ ⏳

Acronis Cyber

Backup Standard

Acronis Cyber

Backup Advanced

Acronis Cyber Protect

Essentials

Acronis Cyber

Protect Standard

Acronis Cyber

Protect Advanced

Workload type Subscription Perpetual Subscription Perpetual Subscription Subscription Subscription

Workstation ✓ ✓ ✓ ✓ ✓ ✓ ✓

Windows Server

Essentials✓ ✓ ✓

Server ✓ ✓ ✓ ✓ ✓ ✓ ✓

Virtual Host ✓ ✓ ✓ ✓ ✓ ✓

Universal license ✓ ✓ ✓

Office 365 ✓ ✓

G Suite ✓ ✓

✓ - Subscription License is available both in on-prem and Cloud deployment

✓ - Perpetual License is available in on-prem only

– License is not available

Page 55: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

55Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Free Cloud Storage per workload

Offering itemFree Cloud

storage, GB

Cyber Protect Essentials - Workstations 5

Cyber Protect Essentials - Servers 5

Cyber Protect Standard - Workstations 50

Cyber Protect Standard - Windows Server Essentials 150

Cyber Protect Standard - Servers 250

Cyber Protect Standard - Virtual hosts 250

Cyber Protect Advanced - Workstations 50

Cyber Protect Advanced - Servers 250

Cyber Protect Advanced - Virtual hosts 250

Cyber Protect Advanced - Universal 250

Cyber Backup Standard - Workstations 50

Cyber Backup Standard - Windows Server Essentials 150

Cyber Backup Standard - Servers 250

Cyber Backup Standard - Virtual hosts 250

Cyber Backup Advanced - Workstations 50

Cyber Backup Advanced - Servers 250

Cyber Backup Advanced - Virtual hosts 250

Cyber Backup Advanced - Universal 250

• Free cloud storage enabled automatically for any purchased

workload license.

• Quota per offering item is defined in licensing configuration

file, so update of the value will require datacenter update.

• Free space = Free_GB_per_offering_item *

Number_of_offering_items_acquired

• Total space = Paid space + Free space

• Total space visible in web Console UI (locations)

• Amount of free space per workload is shown in Account

Page 56: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

56Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Acronis Cyber Protect 15 pricing level

Acronis Cyber Backup Standard

Acronis Cyber Backup Advanced

Acronis Cyber Protect Essentials

Acronis Cyber Protect Standard

Acronis Cyber Protect Advanced

Server

Perpetual

same 15% decrease

n/a n/a n/a

1 year

-30% from backup standard +15% to backup standard current backup advanced2 years

3 years

Workstation

Perpetual

same same

n/a n/a n/a

1 yearbetween backup standard

and True Image+15% to backup standard +20% to backup advanced2 years

3 years

Virtual Host

Perpetual

same same

n/a n/a n/a

1 year

n/a +15% to backup standard + 15% to backup advanced2 years

3 years

Server Essentials

Perpetual

same

n/a n/a

1 year

n/a +15% to backup standard2 years

3 years

Universal

Perpetual

n/a same

n/a n/a n/a

1 year

n/a n/a + 15% to backup advanced2 years

3 years

>> changes

Page 57: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

57Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Acronis Cyber Protect 15 pricing, USD

Acronis Cyber Backup Standard

Acronis Cyber Backup Advanced

Acronis Cyber Protect Essentials

Acronis Cyber Protect Standard

Acronis Cyber Protect Advanced

Acronis Cyber Protect Standard/Cyber Backup

Standard

Acronis Cyber Protect Advanced/Cyber Backup

Advanced

ServerPerpetual $999 $1 529

1 year $469 $709 $239 $539 $839 14.9% 18.3%

2 years $729 $1 119 $379 $839 $1 319 15.1% 17.9%

3 years $999 $1 529 $499 $1 149 $1 799 15.0% 17.7%

WorkstationPerpetual $89 $119

1 year $69 $99 $59 $79 $119 14.5% 20.2%

2 years $129 $179 $109 $149 $209 15.5% 16.8%

3 years $179 $249 $149 $209 $299 16.8% 20.1%

Virtual HostPerpetual $1 199 $1 999

1 year $559 $929 $639 $1 069 14.3% 15.1%

2 years $879 $1 469 $1 009 $1 689 14.8% 15.0%

3 years $1 199 $1 999 $1 379 $2 299 15.0% 15.0%

Server EssentialsPerpetual $499

1 year $229 $259 13.1%

2 years $369 $419 13.6%

3 years $499 $569 14.0%

UniversalPerpetual $2 199

1 year $1 149

2 years $1 799

3 years $2 529>> changes

Page 58: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

58Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Upgrade Options

Page 59: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

59Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Existing Licenses After GA

Existing customers have After GA

Acronis Cyber Backup 12.5 Standard (Perpetual)

Valid maintenance:

▪ request a license of Acronis Cyber Backup 15

Standard via account.acronis.com

Expired maintenance:

▪ buy Version Upgrade SKU

Acronis Cyber Backup 12.5 Advanced (Perpetual)

Valid maintenance:

▪ request a license of Acronis Cyber Backup 15

Advanced via account.acronis.com

Expired maintenance:

▪ buy Version Upgrade SKU

Acronis Cyber Backup Standard (Subscription)Subscription licenses remain unchanged (quota and

expiration date).

The customer can download the new build and use

the subscription with agents updated to version 15.Acronis Cyber Backup Advanced (Subscription)

Page 60: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

60Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Version Upgrades (Perpetual Licenses)

License for Upgrade

Old License (discontinued from the pricelist)

Used for Upgrade from or Downgrade to:

Acronis Cyber Backup 15 Standard Workstation License Acronis Cyber Backup 12.5 Standard Workstation License

Acronis Cyber Backup 15 Standard Windows Server Essentials

License

Acronis Cyber Backup 12.5 Standard Windows Server Essentials

License

Acronis Cyber Backup 15 Standard Server License Acronis Cyber Backup 12.5 Standard Server License

Acronis Cyber Backup 15 Standard Virtual Host License Acronis Cyber Backup 12.5 Standard Virtual Host License

Acronis Cyber Backup 15 Advanced Workstation License Acronis Cyber Backup 12.5 Advanced Workstation License

Acronis Cyber Backup 15 Advanced Server License Acronis Cyber Backup 12.5 Advanced Server License

Acronis Cyber Backup 15 Advanced Virtual Host License Acronis Cyber Backup 12.5 Advanced Virtual Host License

Acronis Cyber Backup 15 Advanced Universal License Acronis Cyber Backup 12.5 Advanced Universal License

Acronis Cyber Protect License - a brand new license, so version Upgrade is not applicable. Downgrade is not available.

Subscription licenses always provide the latest product version to download, so upgrade is not required. Downgrade is not available

Page 61: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

61Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Pre-Launch Upgrade Promo

▪ Buy or renew your Acronis Cyber Backup Subscription license and get Acronis Cyber Protect at no

additional cost when Acronis makes it available. This promotion is applicable only for the purchase or

renewal of the following Acronis Cyber Backup Standard and Advanced licenses:

• Workstation Subscription

• Virtual Host Subscription

• Server Subscription

• Windows Server Essentials Subscription

▪ Start date: Aug 1, 2020

▪ End date: Sep 30, 2020

Page 62: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

62Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Launch Upgrade Promo

Acronis Cyber Backup perpetual license holders who want to upgrade to Acronis Cyber Protect

Subscription licenses, can purchase at a 60% discounted price, which is equal to the price that they

would incur in a regular maintenance. Applicable for the following Acronis Cyber Backup Standard and

Advanced licenses:

▪ Workstation Subscription

▪ Virtual Host Subscription

▪ Server Subscription

▪ Windows Server Essentials Subscription

▪ Start date: Sep 9, 2020

▪ End date: March 31, 2021

Page 63: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

63Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Why Acronis Cyber Protect

Page 64: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

64Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Acronis Cyber Protect Benefits

Complete

protection

▪ Detect advanced

and 0-day threats

▪ No data tampering

▪ Patch vulnerabilities

▪ Detect misconfiguration

▪ Recover from backup

in case of data loss

incident

Lower

TCO

▪ Simplified unified

licensing

▪ Easier agent

management

▪ Less backend

infrastructure

▪ No trainings and

certification

▪ Do more with less IT staff

Unmatched

Simplicity

▪ One simple console

▪ Easy to deploy, to learn

and to operate

▪ Adds security and

management tools

▪ Eliminates complexity

Less

Overhead

▪ Higher performance

▪ Less system

resources spent

▪ Faster reaction

to security and data

loss incidents

▪ Streamlined operations

Higher

Reliability

▪ Faster and more

reliable remediation

▪ Prevention of attacks

and downtime

▪ Better service

availability

Page 65: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

65Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Innovative Cyber Protection

All-in-one

security

solution

An integrated

combination of the

most useful

protections:

anti-malware,

vulnerability

assessment,

backup, patch

management

Multilayered

approach

Total control

of data lifecycle

on protected

systems:

proactively avoid

incidents, active

protection and

reactive stage

Excellent

performance

A single agent

sharing low-level

interceptions for

both backup and

anti-malware

protection

Best tech

in the

industry

Proven expertise

in anti-malware

protection,

backup, and AI/ML

Simple tool

against

sophisticated

threats

Single pane of

glass, unified

reporting, touch-

friendly UI, one

protection plan

1 2 3 4 5

Page 66: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

66Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

What the Experts Say

.

We believe that Acronis Cyber Protect is among the most comprehensive attempts to provide

data protection and cyber security to date…Acronis shows potential to disrupt traditional IT

security vendors by delivering integrated components for backup/recovery and malware detection

and protection.

Phil Goodwin

Research Director – Cloud Data Management and Protection,

IDC

Page 68: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

68Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Excellent Cryptojacking Protection

ProductFalse Positive

Rate

Protection

Rating

Protection

Rating %Accuracy

Protection

Class

Acronis Backup 0% 68 94% 95% AAA

Solution A 0% 16 22% 28% not passed

Solution B 0% 70 97% 97% AAA

Solution C 0% 54 75% 77% A

Solution D 0% 68 94% 95% AAA

Solution E 0% 53 74% 77% A

Solution F 0% 56 78% 79% A

Solution G 0% 50 69% 72% A

Solution H 0% 59 82% 85% AA

Page 69: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

69Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

AV-Comparatives

participant

AV-Test participant

and test winner

Acronis Security Industry Recognition

VB100 participant

MVI member

Anti-Malware Testing

Standard Organization

member

Cloud Security

Alliance member

Anti-Phishing Working

Group member

Anti-Malware Test Lab

participant and test

winner

ICSA Labs participant

NioGuard Security

Lab participant and

test winner

VIRUSTOTAL member

MRG-Effitas

participant and test

winner

Page 70: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

70Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

About Acronis

Page 71: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

71Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Acronis is a Leader in Cyber ProtectionAI-Powered Cyber Protection, Cyber Cloud, Cyber Platform

Global

Reach

Swiss Scale & Rapid

Growth

Global

Presence

Singaporean

Founded in 2003 in

Singapore, currently

the International HQ

100% of Fortune 1000

50,000+ partners

500,000+ businesses

5,500,000+ prosumers

Since 2008 Corporate

HQ in Schaffhausen,

Switzerland

$300M+ billings

50% business growth

100%+ cloud

business growth

1,500+ employees

33 locations

Products available in

150+ countries and

40+ languages

Dual Headquarters for Dual Protection

Page 72: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

72Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Acronis Introduces New Category: Cyber ProtectionAcronis Protects all Data, Applications and Systems (Workloads)

ControlEase of Use Security ReliabilityTotal Cost

of Ownership

Reliable copy for

recovery

Proof that copy

is exact replica

of the original

Control over

visibility

and access

Access from

anywhere

at any time

Protection against

cyber-threats

Safety Accessibility Privacy Authenticity Security

S A P A S

Page 73: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

73Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

Acronis Cyber SingularitySimplified View of Acronis Product Portfolio

Acronis

Cyber

Infrastructure

Acronis

Cyber

Protection

Acronis

Cyber

Platform

Acronis

Cyber

Services

Acronis

Cyber

Cloud

For Customers For cyber benefits:

easy, efficient,

secure, controlled

and reliable

For DevelopersFor Partners For mindshare,

expertise and wider

reach

Page 74: Acronis Cyber Protect€¦ · Rescue with bootable media Identify Infrastructure and devices auto-discovery Vulnerability assessment Data protection map Detect Dashboards and reports

74Dual headquarters

in Switzerland and Singapore Confidential © Acronis 2020

www.acronis.org

Building new schools • Providing educational programs • Publishing books

CREATE, SPREAD

AND PROTECT

KNOWLEDGE WITH US!

Building a more knowledgeable future