
for small and medium-sized businedded and
remote offices
Workload type
- Workstation
- Windows Essentials
- Server/VM
- Virtual Host
for organizations with complex
IT enviroments
Workload type
- Workstation
- Server/VM
- Virtual Host
for organizations with complex
IT enviroments
Workload type
- Workstation
- Server/VM
- Virtual Host
- Microsofr 365
- Google Workspace
ACRONIS CYBER PROTECT EDITIONS COMPARISON – SUMMARY
| Standard | Advanced | Backup Advanced | |
| Standard backup features | |||
| Advanced backup features | |||
| Basic auto-discovery and remote agent installation | |||
| Vulnerability assessments | |||
| Essential antimalware and security management features | |||
| Advanced antimalware and security management features |

Simple Administration
- Consolidate security and data protection
- Eliminate performance or compatibility concerns
- Swiftly pinpoint and remediate any protection issues
- Automate routine tasks
- Effortlessly scale protection

Enhanced Efficiency
- Boost productivity by automating backup, security and endpoint management tasks
- Centrally manage all cybersecurity and backup, simplifying administration
- Reduce costs by consolidating backup, DR and security vendors

Advanced Security
- Detect and stop threats before they cause downtime
- Utilize informed response and investigation
- Deploy comprehensive security to ensure peace of mind
- Defeat ransomware with immutability and backup scanning

Robust features for high data availability
| Data protection | Acronis Cyber Protect Standard | Acronis Cyber Protect Advanced | Acronis Cyber Protect Backup Advanced |
| File-level backup | |||
| Image-based backup | |||
| Local backup | |||
| Mobile backup | |||
| NAS/shares backup | |||
| Incremental/differential backups | |||
| Backup Window (traffic throttling) | |||
| Multi-destination backup (backup replication) | |||
| Archive compression | |||
| Backup validation (checksums) | |||
| Retention rules | |||
| Blockchain backup notarization | – | ||
| Bare Metal Recovery (BMR) | |||
| BMR to dissimilar hardware (Universal Restore), P2V, V2P, P2P, V2V | |||
| XenServer, KVM, RHV, Oracle VM server | – | ||
| Immutable Storage | |||
| One Click Recovery | – | ||
| Synology NAS backup | – |
| Cybersecurity | Acronis Cyber Protect Standard | Acronis Cyber Protect Advanced | Acronis Cyber Protect Backup Advanced |
| Ransomware and cryptojacking protection | |||
| Antivirus and antimalware protection | – | ||
| Exploit prevention | – | ||
| URL filtering | – | ||
| URL filtering with categorization | – | ||
| Windows Defender Antivirus management | – | ||
| Microsoft Security Essentials management | – | ||
| Threat Feed | – | ||
| Remote device wipe | – | ||
| HDD health monitoring | – | ||
| Data protection map | – | ||
| Continuous data protection | – | – | |
| Forensic backup | – | – | |
| Safe recovery of the backups | – | – | |
| Corporate allowlist | – | – | |
| Vulnerability assessments for Windows | |||
| Vulnerability assessments for third-party Windows applications | |||
| Vulnerability assessments for macOS | |||
| Vulnerability assessments for Linux | |||
| Patch Management | – | – | |
| Fail-safe patching: backup endpoint before installing patches | – | – | |
| Remote Desktop | – | ||
| Event monitoring | – | – | |
| Automated event correlation | – | – | |
| Prioritization of suspicious activities | – | – | |
| Automated MITRE ATT&CK® attack chain visualization and interpretation | – | – | |
| Single-click response to incidents | – | – | |
| Full threat containment including endpoint quarantine and isolation | – | – | |
| Intelligent search for IoCs including emerging threats | – | – | |
| Attack-specific rollback | – | – |
| Endpoint protection management | Acronis Cyber Protect Standard | Acronis Cyber Protect Advanced | Acronis Cyber Protect Backup Advanced |
| Group management | – | ||
| Shared protection plans | – | ||
| Centralized plans management | – | ||
| Dashboard configuration | – | ||
| Reports | – | ||
| Email notifications |
Acronis Cyber Protect: Cloud vs on-premises deployment
Cloud | On-premises | |
| Local Hardware requirements | No, Management Server hosted in Acronis Data Center | Physical or virtual server required for backup management and storage |
| Management server access | Anywhere remote access from PC or Tablet | PC or Tablet access from corporate network |
| Product updates | Monthly | Less frequently |
| Endpoint Detection and Response | Yes | No |
| Data Loss Prevention | Yes | No |
| Disaster Recovery add-on | Yes | No |
| Microsoft 365 Cloud-to-Cloud Backup | Yes | Backup of MS365 mailboxes only, no C2C option |
| Google Workspace Cloud-to-Cloud Backup | Yes | No |
| Free Cloud Storage | Yes | Yes |
| Immutable Storage | Yes | Yes |
| Tape Destination | No | Yes |
| Mobile Device Backup | Yes | No |
Supported Platforms
| Standard | Advanced | Backup Advanced | |
| Windows Workstation | |||
| Windows Server | |||
| Mac | |||
| iOS (Cloud only feature) | |||
| Android (Cloud only feature) | |||
| Public cloud VM agent-based backup (Azure, Google Cloud, AWS) | |||
| VMware vSphere VM agentless and agent- based backup | |||
| Hyper-V VM agentless and agent-based backup | |||
| Red Hat Virtualization VM agent-based backup | |||
| KVM agent-based backup | |||
| Citrix Hypervisor agent-based backup | |||
| Nutanix AHV agent-based backup | |||
| Oracle VM agent-based backup | |||
| Virtuozzo agentless backup |
All prices excluding VAT, an increasing number of licenses reduces their cost per unit
