Home
Cybersecurity stack
Acronis Cyber protection & Backup - Laptop & Workstation
Advanced Cyber & Backup Protection bundle for a Laptop or a Workstation
Acronis - Terms and Conditions
GDPR Compliance Privacy Statement EULA Consumer EULA Corporate Acronis Software License agreement
Supported operating systems and environments Supported Cyber Protect features by operating system
|
Advanced Bundle 1 | Enterprise Bundle 5 | Enterprise Bundle 10 | Enterprise Bundle 15 |
Оnboarding Hours free of charge |
1 | 3 | 6 | 9 |
Hours monthly Support & Monitoring services |
- | 2 | 5 | 9 |
Cyber Protect Advanced license |
1 | 5 | 10 | 15 |
Included per device Cloud storage at Acronis Data Center |
75 GB | 75 GB per licence 375 GB for all licenses |
75 GB per licence 750 GB for all licenses |
75 GB per licence 1125 GB for all licenses |
Mobile Device license |
1 | 5 | 10 | 15 |
Cloud Storage at Acronis Data Center |
200 GB | 1 TB | 2 TB | 3 TB |
Cyber Files Cloud at Acronis Data Center |
50 GB | 250 GB | 500 GB | 750 GB |
- Service Provisioning - You will get immediate access to the Cloud Console of Acronis. Once you purchase the Cyber Protection & Backup service, an Account Manager from AdvisionIT will contact you during business hours and schedule the provisioning of the service. Usually, an online onboarding meeting is being planned with our team to get to know you and your IT environment.
- 30 days free of charge - Your credit card is going to be debited in 30 days after the trial period is over.
Acronis Cyber Protect
The only all-in-one Cyber Protection Solution for environments of any size.
- 5 Challenges of Protection - Complexity, Cost, Security, Privacy.
- 5 Vectors of Protection - Safety, Accessibility, Privacy, Authenticity, Security.
- 5 Stages of Protection - Prevention, Detection, Response, Recovery, Forensics.
- 5 Benefits of Cyber Protection - Easy of use, Low TCO, Security, Control, Reliability.
- 1 Product for Cyber Protection - one Agent, one Policy, one UI, one License, one Vendor.
Security Challenges
Commoditization of threats, huge surface of attack.
- Security is a MUST - Every single company is concerned with security.
- Security is Complex - Special training for all IT Professionals and users is required for security of ever more complex infrastructure.
- Growing Attack Surface - New & more applications, systems, processes, data and new people onboarded every day.
- Insider Threat - Malicious or accidental actions of, service provider employees, company users and IT staff.
- Threat Automation - Discovery of vulnerabilities, ransomware, phishing campaign, data theft - all automated with AI.