
for small and medium-sized businedded and
remote offices
Workload type
- Workstation
- Windows Essentials
- Server/VM
- Virtual Host
for organizations with complex
IT enviroments
Workload type
- Workstation
- Server/VM
- Virtual Host
for organizations with complex
IT enviroments
Workload type
- Workstation
- Server/VM
- Virtual Host
- Microsofr 365
- Google Workspace
ACRONIS CYBER PROTECT EDITIONS COMPARISON – SUMMARY
Standard | Advanced | Backup Advanced | |
Standard backup features | ![]() | ![]() | ![]() |
Advanced backup features | ![]() | ![]() | |
Basic auto-discovery and remote agent installation | ![]() | ![]() | ![]() |
Vulnerability assessments | ![]() | ![]() | ![]() |
Essential antimalware and security management features | ![]() | ![]() | |
Advanced antimalware and security management features | ![]() |

Simple Administration
- Consolidate security and data protection
- Eliminate performance or compatibility concerns
- Swiftly pinpoint and remediate any protection issues
- Automate routine tasks
- Effortlessly scale protection

Enhanced Efficiency
- Boost productivity by automating backup, security and endpoint management tasks
- Centrally manage all cybersecurity and backup, simplifying administration
- Reduce costs by consolidating backup, DR and security vendors

Advanced Security
- Detect and stop threats before they cause downtime
- Utilize informed response and investigation
- Deploy comprehensive security to ensure peace of mind
- Defeat ransomware with immutability and backup scanning

Robust features for high data availability
Data protection | Acronis Cyber Protect Standard | Acronis Cyber Protect Advanced | Acronis Cyber Protect Backup Advanced |
File-level backup | ![]() | ![]() | ![]() |
Image-based backup | ![]() | ![]() | ![]() |
Local backup | ![]() | ![]() | ![]() |
Mobile backup | ![]() | ![]() | ![]() |
NAS/shares backup | ![]() | ![]() | ![]() |
Incremental/differential backups | ![]() | ![]() | ![]() |
Backup Window (traffic throttling) | ![]() | ![]() | ![]() |
Multi-destination backup (backup replication) | ![]() | ![]() | ![]() |
Archive compression | ![]() | ![]() | ![]() |
Backup validation (checksums) | ![]() | ![]() | ![]() |
Retention rules | ![]() | ![]() | ![]() |
Blockchain backup notarization | – | ![]() | ![]() |
Bare Metal Recovery (BMR) | ![]() | ![]() | ![]() |
BMR to dissimilar hardware (Universal Restore), P2V, V2P, P2P, V2V | ![]() | ![]() | ![]() |
XenServer, KVM, RHV, Oracle VM server | – | ![]() | ![]() |
Immutable Storage | ![]() | ![]() | ![]() |
One Click Recovery | – | ![]() | ![]() |
Synology NAS backup | – | ![]() | ![]() |
Cybersecurity | Acronis Cyber Protect Standard | Acronis Cyber Protect Advanced | Acronis Cyber Protect Backup Advanced |
Ransomware and cryptojacking protection | ![]() | ![]() | ![]() |
Antivirus and antimalware protection | ![]() | ![]() | – |
Exploit prevention | ![]() | ![]() | – |
URL filtering | ![]() | ![]() | – |
URL filtering with categorization | ![]() | ![]() | – |
Windows Defender Antivirus management | ![]() | ![]() | – |
Microsoft Security Essentials management | ![]() | ![]() | – |
Threat Feed | ![]() | ![]() | – |
Remote device wipe | ![]() | ![]() | – |
HDD health monitoring | ![]() | ![]() | – |
Data protection map | ![]() | ![]() | – |
Continuous data protection | – | ![]() | – |
Forensic backup | – | ![]() | – |
Safe recovery of the backups | – | ![]() | – |
Corporate allowlist | – | ![]() | – |
Vulnerability assessments for Windows | ![]() | ![]() | ![]() |
Vulnerability assessments for third-party Windows applications | ![]() | ![]() | ![]() |
Vulnerability assessments for macOS | ![]() | ![]() | ![]() |
Vulnerability assessments for Linux | ![]() | ![]() | ![]() |
Patch Management | – | ![]() | – |
Fail-safe patching: backup endpoint before installing patches | – | ![]() | – |
Remote Desktop | ![]() | ![]() | – |
Event monitoring | – | ![]() | – |
Automated event correlation | – | ![]() | – |
Prioritization of suspicious activities | – | ![]() | – |
Automated MITRE ATT&CK® attack chain visualization and interpretation | – | ![]() | – |
Single-click response to incidents | – | ![]() | – |
Full threat containment including endpoint quarantine and isolation | – | ![]() | – |
Intelligent search for IoCs including emerging threats | – | ![]() | – |
Attack-specific rollback | – | ![]() | – |
Endpoint protection management | Acronis Cyber Protect Standard | Acronis Cyber Protect Advanced | Acronis Cyber Protect Backup Advanced |
Group management | – | ![]() | ![]() |
Shared protection plans | – | ![]() | ![]() |
Centralized plans management | – | ![]() | ![]() |
Dashboard configuration | – | ![]() | ![]() |
Reports | – | ![]() | ![]() |
Email notifications | ![]() | ![]() | ![]() |
Acronis Cyber Protect: Cloud vs on-premises deployment
Cloud | On-premises | |
Local Hardware requirements | No, Management Server hosted in Acronis Data Center | Physical or virtual server required for backup management and storage |
Management server access | Anywhere remote access from PC or Tablet | PC or Tablet access from corporate network |
Product updates | Monthly | Less frequently |
Endpoint Detection and Response | Yes | No |
Data Loss Prevention | Yes | No |
Disaster Recovery add-on | Yes | No |
Microsoft 365 Cloud-to-Cloud Backup | Yes | Backup of MS365 mailboxes only, no C2C option |
Google Workspace Cloud-to-Cloud Backup | Yes | No |
Free Cloud Storage | Yes | Yes |
Immutable Storage | Yes | Yes |
Tape Destination | No | Yes |
Mobile Device Backup | Yes | No |
Supported Platforms
Standard | Advanced | Backup Advanced | |
Windows Workstation | ![]() | ![]() | ![]() |
Windows Server | ![]() | ![]() | ![]() |
Mac | ![]() | ![]() | ![]() |
iOS (Cloud only feature) | ![]() | ![]() | ![]() |
Android (Cloud only feature) | ![]() | ![]() | ![]() |
Public cloud VM agent-based backup (Azure, Google Cloud, AWS) | ![]() | ![]() | ![]() |
VMware vSphere VM agentless and agent- based backup | ![]() | ![]() | ![]() |
Hyper-V VM agentless and agent-based backup | ![]() | ![]() | ![]() |
Red Hat Virtualization VM agent-based backup | ![]() | ![]() | |
KVM agent-based backup | ![]() | ![]() | |
Citrix Hypervisor agent-based backup | ![]() | ![]() | |
Nutanix AHV agent-based backup | ![]() | ![]() | |
Oracle VM agent-based backup | ![]() | ![]() | |
Virtuozzo agentless backup | ![]() | ![]() |
All prices excluding VAT, an increasing number of licenses reduces their cost per unit