ጷ Cyber Cloud CYBER PROTECTION - AcronisWith rising downtime costs, growing data privacy concerns,...

4
FIVE VECTORS OF CYBER PROTECTION ጷ Cyber Cloud CYBER PROTECTION BUILT FOR SERVICE PROVIDERS KEEPING DATA SAFE REQUIRES MORE THAN JUST BACKUP With rising downtime costs, growing data privacy concerns, crippling non-compliance penalties, and modern security- related threats including ransomware and unapproved data modification, we’ve entered a new era. To fight modern threats, the new generation of data protection should converge with cyber security. We call this convergence cyber protection and it is based on five fundamental pillars — data safety, accessibility, privacy, authenticity, and security. Safety Ensuring that a reliable copy of a business’ data is always available Accessibility Making it easy for a business’ data to be available from anywhere, at any time Privacy Controlling visibility and access to company data Authenticity Providing an easy way to prove that a copy is an exact replica of the original Security Protecting data against threats and malicious agents STOP MODERN THREATS WITH MODERN TECHNOLOGIES AnyData Engine Technologies backed by 100+ patents to capture, recover, control and access data in any environment Hybrid Cloud Architecture Full control and flexibility for data management, data privacy, and business control for partners Artificial intelligence (AI) Behavioral security, auto- configuration, data classification, and AI-assisted management Blockchain Digital notary, electronic signatures, data authenticity and consistency validation, and more Software-Defined Infrastructure Scale out cost-efficient high- performance multi-purpose SDI — compute, storage and network SIGN UP FOR A 30-DAY TRIAL OF ACRONIS CYBER CLOUD AT WWW.ACRONIS.COM Hybrid Cloud Architecture

Transcript of ጷ Cyber Cloud CYBER PROTECTION - AcronisWith rising downtime costs, growing data privacy concerns,...

Page 1: ጷ Cyber Cloud CYBER PROTECTION - AcronisWith rising downtime costs, growing data privacy concerns, crippling non-compliance penalties, and modern security- ... Acronis Cyber Cloud

FIVE VECTORS OF CYBER PROTECTION

ጷ Cyber Cloud

CYBER PROTECTION BUILT FOR SERVICE PROVIDERSKEEPING DATA SAFE REQUIRES MORE THAN JUST BACKUP With rising downtime costs, growing data privacy concerns, crippling non-compliance penalties, and modern security-related threats including ransomware and unapproved data modification, we’ve entered a new era.

To fight modern threats, the new generation of data protection should converge with cyber security. We call this convergence cyber protection and it is based on five fundamental pillars — data safety, accessibility, privacy, authenticity, and security.

Safety Ensuring that a reliable copy of a business’ data is always available

Accessibility Making it easy for a business’ data to be available from anywhere, at any time

Privacy Controlling visibility and access to company data

Authenticity Providing an easy way to prove that a copy is an exact replica of the original

Security Protecting data against threats and malicious agents

STOP MODERN THREATS WITH MODERN TECHNOLOGIES

AnyData Engine Technologies backed by 100+ patents to capture, recover, control and access data in any environment

Hybrid Cloud Architecture Full control and flexibility for data management, data privacy, and business control for partners

Artificial intelligence (AI) Behavioral security, auto-configuration, data classification, and AI-assisted management

Blockchain Digital notary, electronic signatures, data authenticity and consistency validation, and more

Software-Defined Infrastructure Scale out cost-efficient high-performance multi-purpose SDI — compute, storage and network

SIGN UP FOR A 30-DAY TRIAL

OF ACRONIS CYBER CLOUD AT

WWW.ACRONIS.COM

ጷHybrid Cloud Architecture

Page 2: ጷ Cyber Cloud CYBER PROTECTION - AcronisWith rising downtime costs, growing data privacy concerns, crippling non-compliance penalties, and modern security- ... Acronis Cyber Cloud

www.acronis.com

ACRONIS CYBER CLOUD | CYBER PROTECTION BUILT FOR SERVICE PROVIDERS

Copyright © 2002-2019 Acronis International GmbH.

RMM & PSA TOOLS

PLATFORM COMPONENTS

Accounts Management

Audit Branding

Features Management

Identity Management

RESTful API

Reseller Management

Usage Reporting

Integrations

Acronis Cyber Backup Cloud

Acronis Cyber Disaster Recovery Cloud

Acronis Cyber Files Cloud

Acronis Cyber Notary Cloud

Acronis Cyber Infrastructure

Future Services

Man

agem

ent C

onso

le

DATA PROTECTION SERVICES

ጷ Cyber Cloud• Backup

• Disaster Recovery

• Anti-Ransomware Protection

• File Sync & Share

• Files Notarization

• E-Signature

• Software-Defined Infrastructure

CUSTOMER OFFERINGS

Graphics: Acronis Cyber Cloud components and included services, offerings and integrations

25languages supported

12cloud

data centers

72 cloud

distributors

10К+

service providers

PARNTER WITH ACRONIS, A GLOBAL LEADER IN CYBER PROTECTION

Acronis Cyber Cloud is a platform that enables service providers to deliver cyber protection in an easy, efficient and secure way. With one SaaS solution, you and your customers gain access to hybrid cloud backup, disaster recovery, AI-based ransomware protection, file sync and share, and blockchain-based file notarization and e-signature services, all managed from a single console.

• Differentiate your offering with next-gen data protection

• Offer cutting-edge anti-ransomware technologies — at an affordable price

• Reduce churn with easy upsell and cross-sell opportunities

• Shorten your proof of concept and deployment stages with a ready-to-use cloud solution

• White-label your services to increase brand value

Grow your cyber protection business with a platform designed for service providers

ጷ Cyber Cloud

Page 3: ጷ Cyber Cloud CYBER PROTECTION - AcronisWith rising downtime costs, growing data privacy concerns, crippling non-compliance penalties, and modern security- ... Acronis Cyber Cloud

ACRONIS CYBER CLOUD | MULTIPLE SOLUTIONS IN ONE

CUSTOMERS’ SITES

Virtual Servers VMware vSphere, Microsoft Hyper-V, Linux KVM, Red Hat Virtualization

Applications With built-in replication like SQL Server AlwaysOn

Physical Servers Windows, Linux

Hot and Cold Storage

Production Failover Failover Testing Cloud Servers Backup

Failback

Recovery Servers

Secure VPN

ACRONIS CLOUD RECOVERY SITE

Graphics: Disaster recovery to Acronis cloud recovery site

• No hardware required — the VPN virtual appliance and lightweight agents are the only components required on the customer’s premises

• Launch your DRaaS business quickly, with no CAPEX — all solution components are out-of-the-box

• Ready-to-use Acronis-hosted recovery site (multiple data centers worldwide)

• Support for all popular workloads including Windows and Linux physical servers and VMs, major hypervisors, and Microsoft business applications

• Disaster recovery orchestration — automate key scenarios and address interdependencies between applications by ensuring systems are recovered in the right order

FLIP OF A SWITCH DISASTER RECOVERYጷ Cyber Disaster Recovery Cloud

Recovery from Local Storage

LOCAL STORAGE

Graphics: Hybrid cloud backup and recovery with Acronis

CLOUD

• Google Cloud Platform

• Microsoft Azure

• Acronis Cyber Cloud Storage

• Your own cloud storage

Recovery from CloudAES-256 data encryption

in transit and at rest

CUSTOMER WORKLOADS

Servers Virtual Workstations Cloud Apps Mobile Websites

ጷ Cyber Backup Cloud

PROFIT DELIVERING THE #1 HYBRID CLOUD BACKUP• Local and to-cloud backup choices

• Flexible cloud storage options with ready-to-use Google Cloud Storage, Microsoft Azure, Acronis Cyber Cloud Storage, or your own cloud storage

• AI-based ransomware protection that protects files, backups, and backup agents in real-time

• Web-based backup and recovery console

• Protection of data on 20+ platforms, including virtual, physical, and cloud-based servers, endpoints, mobile devices, Office 365 and G Suite

• Recovery to dissimilar hardware, including bare-metal, physical, virtual, or cloud environments

• Full image and file-level backups

• Instant VM recovery from backup storage

Backup to Cloud

Local disks, network storage

Acronis Cyber Infrastructure

Backup to Local Storage

Full Image Backup,

App Replication

Backup Replication to Cloud

Page 4: ጷ Cyber Cloud CYBER PROTECTION - AcronisWith rising downtime costs, growing data privacy concerns, crippling non-compliance penalties, and modern security- ... Acronis Cyber Cloud

ACRONIS CYBER CLOUD | MULTIPLE SOLUTIONS IN ONE

ጷ Cyber Files Cloud

Learn more at www.acronis.com

Copyright © 2002–2019 Acronis International GmbH. All rights reserved. Acronis and the Acronis logo are trademarks of Acronis International GmbH in the United States and/or other countries. All other trademarks or registered trademarks are the property of their respective owners. Technical changes and Differences from the illustrations are reserved; errors are excepted. The Gartner Peer Insights Customers’ Choice logo is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner Peer Insights Customers’ Choice distinctions are determined by the subjective opinions of individual end-user customers based on their own experiences, the number of published reviews on Gartner Peer Insights and overall ratings for a given vendor in the market, as further described here https://www.gartner.com/reviews-pages/peer-in-sights-customers-choice-methodology/, and are not intended in any way to represent the views of Gartner or its affiliates. 2019-11

Graphics: How notarization

with Acronis Cyber Notary Cloud works

Compact Events

Notarize in Blockchain

Generate Certificate

FIles

Acronis Cyber Notary Cloud

• File notarization — let users notarize files of any type and record it in the blockchain ledger

• E-signature — enable all required parties to electronically sign files

• Authenticity verification — get confirmation anytime, from any device, once a file is notarized

• API ensures easy integration with applications

• Notarize or e-sign files of any format and type, including documents, images, videos, and music

• Ethereum blockchain with distributed architecture prevents fraud and interference, and ensures verification is always available

ጷ Cyber Notary Cloud

OFFER BLOCKCHAIN-BASED DATA AUTHENTICITY SERVICES

• 100% control over data location — Acronis Cyber Cloud Storage, Acronis Cyber Infrastructure, service provider storage, SWIFT, Ceph, NAS, S3, Azure

• Enterprise-grade audit trail — for tracking user-actions and troubleshooting

• In-transit and on-device encryption, FIPS 140-2 certified encryption for iOS

• Turn-key solution for end-customer’s business across all platforms (phones, tablets, Macs, Windows)

• Mobile editing and commenting for MS Office files

• Full-text search capability

ENABLE FILE SYNC AND SHARE WITH UNCOMPROMISED SECURITY

Graphics: File access, sync and share for any device

and storage type

iOS, Android, and Web Apps, Windows and Mac Clients

Acronis Cyber Files

Cloud

Service Provider’s Storage

Acronis Cyber Cloud Storage

Local Storage