Offline

Acronis True Image this year's decision received a new name, since September 2021 the best solution in the world for personal cyber defense is called Acronis Cyber Protect Home Office This new name corresponds to what the specialists have created and for whom - comprehensive cyber protection for parents working at home, an IT specialist, a remote student, a freelancer who works remotely, and other users of the home office.

Acronis Cyber Protect - A comprehensive cyber protection solution that combines data protection and cybersecurity functions. It provides an innovative combination of the following features:
- Proactive protection : vulnerability assessment and correction management; predictive analysis of the state of the hard drive based on machine learning technologies; removal of malware from backups; preventing repeated infections.
- Active protection : continuous data protection (CDP), protection against ransomware and malware; self-defense.
- Answer protection : backup and restore the full image / level of files; instant recovery of virtual machines; creation of backups for forensic examinations.
- Backup and recovery. Backup and recovery of physical machines, virtual machines and applications.
- Emergency recovery. Protect the local environment when emergencies occur by running accurate copies of machines in the cloud and switching workload to cloud servers.
- Malware Protection and Web Protection. Protect machines from all the latest threats from malware, prevent the downloading of malicious files, and block access to suspicious web resources.
- Automatic machine detection. Automatic registration of a large number of machines and installation of a security agent and additional components.
- Vulnerability assessment. Scan operating systems and programs for vulnerabilities.
- Correct management. Confirm the fixes automatically or manually, plan to install the fixes or run them on demand, set the flexible restart options and service windows, and use the phased deployment.
- Monitoring the performance of the disk. Tracking the status of hard drives and preventing their unexpected failure.
- Remote management and support. Connect to the machines and drive them remotely.
- Continuous Data Protection (CDP). Exclude even scanty data loss in the main applications.
- Reliable fix installation. Automatically back up the machines before installing any corrections on them in order to be able to roll back immediately (if necessary).
- Better protection using fewer resources. Unload the system and provide more advanced scanning and vulnerability assessment in the central data warehouse, including the cloud.
- Backup copies for forensics. Include electronic evidence in the backups that will simplify and expedite investigations.
Data Protection Card. Track file protection status through classification, reporting, and unstructured data analytics. - Safe recovery. Integrate malware and fix updates into the recovery process.
- Intellectual defense plan. Automatically configure the installation of fixes, scanning, and backups based on alerts from the Cyber Protection Operations Center.
- Global and local white lists. Create backup-based white lists to improve heuristic and avoid false detection.