Available for:
No Comments
Report about Update or Broken Link

Acronis Cyber Protect 16.0.1 Build 38093

Acronis Cyber Protect 16.0.1 Build 38093
Download
Buy Now
Description
Changelog
Specifications

Acronis Cyber Protect software ensures for Business users to avoid downtime, data loss and security breaches at a lower cost. It is the only solution that natively integrates cyber security, data protection and management to protect endpoints, systems and data. Integration and automation provide unmatched protection – increasing productivity while decreasing TCO.

BUY NOW Acronis Cyber Protect

  • Next-generation cybersecurity. Advanced AI-based behavioral detection engine for zero-day attack prevention
  • Reliable backup and recovery. Full-image and file-level backup, disaster recovery and metadata collection for security forensics
  • Integrated protection management. URL filtering, vulnerability assessments, patch management, and remote management are integrated and automated

Eliminate complexity

The traditional stack of endpoint protection products lacks integration and requires much more time for management – maintaining licenses, installing updates and patches, verifying compatibility after updates, and managing multiple policies using a variety of different user interfaces. Acronis Cyber Protect offers one agent, one management interface, and one license – removing the complexity and risks associated with non-integrated solutions.

Minimize Incidents

With Acronis Cyber Protect, an AI-based threat detection engine leverages backup data to improve detection rates and avoid false-positives. The integration of advanced antimalware and backup allows the recovery of corrupt data automatically. Backups are protected against attacks on the agent and backup files, ensuring the data is clean.

Increase productivity

A complex, non-integrated stack of endpoint solutions requires more time to learn and support, and does not benefit from integration and automation. Unifying multiple protection technologies into one solution not only increases its reliability, it also decreases the time needed to learn, deploy, and maintain the solution. Acronis Cyber Protect enables you to streamline management, cut unnecessary administrative time, and lower TCO.

Turn challenges into opportunities

With one, integrated solution, you can eliminate any gaps in your IT infrastructure and endpoint protection, decrease incident volume, and minimize incident response times

  • Stay ahead of modern threats. Spend more time focused on your overall security posture, rather than on managing the complexity of your protection
  • Gain proactive cyber protection. Avoid downtime, prevent loss of employee productivity, and spend less time on costly recoveries after successful attacks
  • Eliminate unnecessary expenses. Improve your team’s productivity and avoid the additional cost of maintaining multiple tools

Integration and automation

No matter how great each individual solution might be, a patchwork of system and endpoint protection tools will create gaps in your defenses. This Acronis software is a unified approach that eliminates those gaps.

  • One agent. Increases performance and avoids endpoint/agent conflicts
  • One license. Simplifies software license management
  • One vendor. Ensures seamless, fully integrated protection
  • One backend. Reduces infrastructure needs
  • One console. Enables faster employee onboarding and maintenance
  • One experience. Simplifies the education of IT resources

Capabilities designed for modern protection

  • Antimalware and antivirus. Proactively protect your data, applications, and systems from advanced cyberattacks. With Acronis Cyber Protect, you gain real-time protection with AI-based static and behavioral heuristic antivirus, antimalware, antiransomware, and anticryptojacking technologies.
  • Fail-safe patching. Eliminate the risk of bad patches rendering a system unusable. Before implementing the latest patches, the program automatically performs an image backup. That enables you to easily restore and roll back to a working state if there is an issue with a patch.
  • Forensic backup. Simplify future analysis by collecting digital evidence – like memory dumps and process information – from disk-level backups. With Forensic Mode, you’ll manage compliance requirements and run faster internal investigations.
  • Safe Recovery. Avoid malware reinfection by automatically patching the machine and then scanning your system and backup images using the latest antimalware definitions.
  • Continuous data protection. Safeguard new data. Acronis’ agent monitors every change made in the listed applications and continuously backs them up so recent changes aren’t lost if the machine needs to be reimaged.
  • Global threat monitoring and smart alerts. Benefit from the global network of Acronis Cyber Protection Operation Centers (CPOC) by receiving real-time alerts on malware, vulnerabilities, natural disasters, and other global events that may affect data protection.
  • Data compliance reporting and data protection map. Ensure compliance reporting by getting detailed information about stored data and use automatic data classification to track the protection status of important files.
  • Global and local whitelists from backups. Scan backups with advanced antimalware technologies (AI, behavioral heuristics, etc.) and whitelist your organization’s unique applications to avoid future false positives.

What’s new in Acronis Cyber Protect 16:

Centralized dashboard

Monitor all instances of Acronis Management Server in your environment by using a consolidated view of three dimensions:

  • Device List
  • Alerts
  • Activities

On the centralized dashboard, Administrator users can:

  • Adjust the view to show data for one or more Acronis Management Servers.
  • Download data from widgets, in the CSV or XLS format.
  • Drill down to specific devices on the Acronis Management server.

The solution requires a Microsoft SQL Database server as the backend database.

Immutable storage

Achieve strict regulatory compliance and data security by ensuring that backed-up data cannot be altered or deleted. Immutable storage provides the following benefits:

  • Protection against data tampering: Immutable backup protects against unauthorized changes, deletions, or ransomware attacks.
  • Compliance assurance: By providing Write Once Read Many (WORM) capabilities, the immutable backup solution helps your organization comply with regulatory requirements.
  • Enhanced data security: Immutable backup adds an extra layer of security, for protection against both internal and external threats.
  • Time-defined data retention: Administrator users can configure separate retention periods for backups and for the immutable storage.
  • Proof against user errors: During the retention period, Administrator users can recover data from backups that were deleted by accident.

The solution is available for storage based on Acronis Cyber Infrastructure and on Acronis Cloud.

Supported on Acronis Backup Gateway version 2.12.28 or later.

Automated modular agent deployment and uninstallation

Now, you can choose to install the Acronis Cyber Protection Agent without the components responsible for antimalware protection. Thus, users who do not want to use antimalware protection or URL filtering can use Acronis Cyber Protect with a decreased number of services running on their machine.

If you change your mind later, there is no need to manually install or uninstall antimalware components on multiple machines. It is done automatically after enabling or disabling the Antimalware protection or URL filtering in the protection plan.

One-click recovery

Recovery of an entire workload no longer requires a highly skilled IT workforce. Users with Administrator role can automate the recovery process to make it more friendly for regular users. This approach eliminates IT bottlenecks, and saves time and money by reducing downtime in the event of a cyber attack.

  • Supported backup locations: Acronis Secure Zone, local folder, network folder, and cloud storage
  • Supported for disk-level backups
  • Supported on Windows and Linux
  • Enhanced security: Administrator users can configure a recovery password

Agent for Synology

The new Agent for Synology is provided as a package for Synology Package Center and delivers native protection for data stored on Synology NAS devices. With Agent for Synology, data hosted on NAS shares is backed up by accessing it locally from the storage, instead of reading it over the network (via SMB), thus providing better performance.

By using the Agent for Synology, Administrator users can:

  • Back up and recover data hosted on Synology NAS devices
  • Preserve ACL and NAS-specific shares permissions during recovery
  • Use Agent for Synology for off-host data processing operations, such as backup replication

Installation notes

  • Supported versions of DiskStation Manager (DSM) 6.x and 7.x
  • ARM CPU-based Synology NAS devices are not supported

Tape LTO-9 format support

This version of Acronis Cyber Protect adds support for the latest tape media format, LTO-9, so users can now back up data to, and recover data from, tape by using the LTO-9 format, including disk/volume and files/folders-level.

Note: The LTO-9 format requires tape media recalibration. Therefore, all non-calibrated tapes with disabled autocalibration will appear as Unknown until they are manually calibrated.

Added support for macOS on ARM CPU

All current backup and antimalware functionalities for macOS are now supported on ARM CPUs.

Added support for Microsoft SQL Server 2022 as database for the Acronis Management Server

Microsoft SQL Server 2022 can be used as a database for the Acronis Management Server component.

Recovery of workloads protected by BitLocker

This version of Acronis Cyber Protect adds a streamlined, uncomplicated process for the recovery of BitLocker-protected workloads.

You must suspend or disable BitLocker before updating the Cyber Protection Agent. After the update, enable BitLocker again. If you fail to disable BitLocker before the agent update, the BitLocker recovery key is required after the restart of the protected workload.

Disable local folder browsing

This capability strengthens the security of protected workloads via the least privilege principle. Administrator users can disable local file browsing on the protected workloads by modifying the parameters in a configuration file.

BUY NOW Acronis Cyber Protect – from $85.00 per year

BUY NOW Acronis Cyber Protect

Workload types

  • Workstation
  • Server
  • Virtual Host
  • Windows Server Essentials
  • Microsoft 365
  • G Suite

BUY NOW selected Acronis Product

Leave a Reply

0 Comments on Acronis Cyber Protect 16.0.1 Build 38093

Sign In

Welcome! Log into your account

Forgot your password?

Create an account

Sign Up

Welcome! Register for an account

A password will be e-mailed to you.

Password Recovery

Recover your password

A password will be e-mailed to you.