Cloud Protect

Prevent Downtime & Data Loss.

All in One Solution – Cloud Backup, Cloud Secure, Cloud Storage & Cloud File Share in Single Management Platform.

Cloud Protect Service Overview by Datacomm

Line

Datacomm Cloud Protect Service combine backup & next-generation antivirus, anti-malware provides integration, automation and simplification for customer to improve productivity and decrease operating costs in managing their cloud infrastructure.

Cloud Protect Best Backup Icon

The world’s best backup and recovery support by Acronis

Full-image and file-level backup and recovery to safeguard workloads on more than 20 platforms

Cloud Protect Enhance with Essential Icon

The world’s best backup and recovery support by Acronis

Full-image and file-level backup and recovery to safeguard workloads on more than 20 platforms

Cloud Protect All in One Icon

All-in-One – Reduce Complexity and Operational Cost

Integrates data protection, cybersecurity, and endpoint management into a single solution with centralized management

Sub Products

line white
Protect your data, effortless, efficient and cost effective. Extend backup capabilities to SAP HANA, Oracle DB, MariaDB, MySQL, and application clusters. Within a single dashboard You can also gain visibility into data-protection statuses across your desktops and servers infrastructure.
  • Continuous data protection
  • Data protection map
  • Off-host data processing
Detail Cloud Backup
Enhance your cloud servers and VMs security with integrated cloud protect that includes full-stack anti-malware. Increase your detection rate and responsiveness to the latest cyberthreats. Extend cyber protection to web browsing, backed-up data, the recovery process, and exploit prevention. Enable investigations by capturing forensic data in backups.
  • Full stack anti-malware
  • URL filtering
  • Exploit prevention
Detail Cloud Server Secure
Get a full control over data location, management and privacy with a fileshare  service, including a transaction ledger to enable notarization and eSignature capabilities, across all platforms.
  • File notarization
  • Embedded eSignatures
  • Independent file verification
Detail File Share
Universal, cost-efficient, easy-to-use, and scalable software-defined storage that leverages industry-standard hardware and combines block, file, and object storage workloads. Fully support and manage, data redundancy prevents data loss from hardware failure.

Detail Cloud Storage

Block any email threat, including spam, phishing, business email compromise (BEC), advanced persistent threats (APTs), and zero-days in seconds before it reaches end-users. Leverage Perception Point’s next-generation technology for lightning-fast detection and easy deployment, configuration, and management.

  • Anti-phishing and anti-spoofing engines
  • Anti-evasion technologies
  • Next-generation dynamic detection against zero-days

Detail Cloud Email Security

Enhance your backup service with essential cyber protection at no cost

Line

Gain a unique competitive advantage and increase your profitability with essential cyber protection functionalities that cover all workloads. Acronis will not charge you if you don’t consume backup or file sync and share storage.

View All Feature →

Cybersecurity
Stay ahead of modern cyberthreats with award-winning anti-ransomware enhanced with anti-malware capabilities that complement your clients’ antivirus. Prevent data leaks via local channels.

Backup and recovery
Minimize data loss across your clients’ infrastructure and workloads with the best backup and recovery technology, available in consumption-based or per-workload licensing models.

Management
Centralize your protection management and provision endpoints in minutes. Remotely assist clients and assess system vulnerabilities and security gaps. 

Disaster recovery (DR)
Allow clients on DR-enabled tenants to establish secure connection to the corporate network with their personal devices, or test failover in an isolated network environment.

File sync and share
Increase productivity by enabling your clients to create and securely share corporate content from anywhere, at any time, and on any device. Only get charged for the storage you use.

Notary
Ensure the integrity of data, while achieving regulatory transparency and decreasing security risks with a blockchain-based service for file notarization, eSigning, and file verification.

Provide anti-malware protection at no cost

line white

Our award-winning cybersecurity technology, Acronis Active Protection, is now better and included in Acronis Cyber Protect Cloud free of charge.

  • Enhanced with anti-malware protection
  • AI-based static and behavioral analysis
  • Award-winning anti-ransomware technology
  • Best-of-breed protection against zero-day ransomware
  • Unmatched self-defense against ransomware
  • Leader in defending against cryptojacking

Deliver the best backup and recovery on the market

Line
  • Protection for more than 20 workload types: physical, virtual, cloud, and mobile
  • Pricing based on storage consumption or per workload
  • Extensive backup sources: file, disk, mobile, system-state, application, NAS and network shares, ESXi configurations
  • Multiple backup storage options: Acronis Cloud, public and private cloud, local network storage
  • Recovery capabilities that can instantly run backup files as a VM or recover to dissimilar hardware
  • Secure by design: anti-ransomware protection and encryption

Supported systems

line white

Operating systems and environments

  • Windows
    Windows 7 and later
    Windows 2008 R2 and later
  • Linux
    Linux with kernel from 2.6.9 to 5.1 and glibc 2.3.4 or later
  • MacOS
    OS X Mavericks 10.9, OS X Yosemite 10.10, OS X El Capitan 10.1, macOS Sierra 10.12, macOS High Sierra 10.13, macOS Mojave 10.14, macOS Catalina 10.15
  • Mobile
    Android 4.1 or later
    iOS 8 or later

Microsoft applications

Microsoft SQL Server 2019, 2017, 2016, 2014, 2012, 2008 R2, 2008, 2005

Microsoft Exchange Server 2019, 2016, 2013, 2010, 2007 Microsoft SharePoint 2013

Microsoft SharePoint Server 2010 SP1, Microsoft SharePoint Foundation 2010 SP1, Microsoft Office SharePoint Server 2007 SP2, Microsoft Windows SharePoint Services 3.0 SP2

Infrastructure as a Service

VMware vCloud Director

Hypervisors

VMware vSphere 7.0, 6.7, 6.5, 6.0, 5.5, 5.1, 5.0, 4.1

Microsoft Hyper-V Server 2019, 2016, 2012/2012 R2, 2008/2008 R2

Microsoft Windows Server 2022, 2019, 2016, 2012/2012 R2,2008/2008 R2 with Hyper-V

Microsoft Windows 10, 8/8.1 (x64) with Hyper-V

Citrix XenServer 7.6-4.1.5

RHEV 3.6-2.2, RHV 4.1, 4.0

Oracle VM Server 3.4, 3.3, 3.0, Oracle VM VirtualBox 4.x

Nutanix AHV 20180425.x-20160925.x

Linux KVM 5.3 – 8

Proxmox virtual environment 5.3 – 8

Virtuozzo 6.0.10, 6.0.11, 6.0.12, 7.0.13, 7.0.14

Virtuozzo Infrastructure Platform 3.5

Additional Material

Line

What is CyberAttack ? Understanding CyberAttack and how Cloud Protect Solution provide comprehensive solution.

How to protect Malware with Cloud Backup?
Innovative Solution to enhance

Preventing Fileless CyberAttacks

MultiLayer CyberSecurity Approach with Cloud Protect

Understanding the vulnerability assessments & patch management to strengthen CyberSecurity

More Information?

Contact Us!