Acronis Cyber Backup

Acronis Cyber Backup is the world's easiest and fastest backup solution for all your data, whether it is located on-premises, in remote systems, in private and public clouds, or on mobile devices.

Languages supported: Czech, German, English, French, Italian, Japanese, Polish, Portuguese, Russian, Spanish, Chinese (Simplified)

8.6/10 (Expert Score) ★★★★★
Product is rated as #28 in category Data Replication Software
Ease of use
8.6
Support
8.3
Ease of Setup
0.0

Images

Check Software Images

Acronis Cyber Backup sets a high bar for new-generation data protection with innovative security features. It protects all company data sources on 20+ platform regardless of the size or location of the data. It proactively prevents ransomware attacks with unique AI-based technologies that avert system unavailability caused by 99.99 percent of ransomware attacks. Acronis Cyber Backup ensures business continuity by immediately and reliably restoring any piece of data. It offers a single, intuitive, web-based management console that’s available in 25 languages, provides full infrastructure-utilization insights, and allows remote management of all backups from any browser on any device, including tablets and smartphones.

Acronis Cyber Backup is now available as an edition of the new Acronis Cyber Protect solution. Acronis Cyber Protect includes all of the features included in Acronis Cyber Backup and more: integrating cybersecurity and management capabilities, streamlining protection efforts, and optimizing operational efficiency.

Acronis Cyber Backup
Acronis Cyber Backup

Show more categories

Customer Reviews

Acronis Cyber Backup Reviews

РРіРѕСЂСЊ .

Advanced user of Acronis Cyber Backup
★★★★★
Convinience of Acronis True Image in Business infrastructure

What do you like best?

Cross platforming 64-bit software with advanced support of the outdated OS. Free updates & upgrades during the subscription plan. In comparison with the much older versions of this product (11.7 & older), it is now possible to create separate independent plans for performing backup operations, including backup replication, validation, conversion to virtual machines, and cleanup of old backups.

Expansion of the possibilities for validating backups in new versions made it possible to add the option to launch virtual machines from the archive, which is quite convenient. We now have the ability to run a VM on any selected hypervisor, regardless of the platform on which the image was created.

It is possible to create organizational units with the distribution of control between system administrators and managers.

The ability to automate management scripts is available - when creating a bootable disk using Acronis Media Builder, there is an option to specify scripts to automatically perform backup and restore after boot.

What do you dislike?

Subscription plan, and that fact that this software is proprietary, which could be a "cons" for opensource-oriented computer system administrators & database supervisors.

Recommendations to others considering the product:

For the new users, I would recommend checking the official site:https://www.acronis.com/en-us/ for the information of the currently available products. The company is widening its portfolio and there are a lot of different types & versions, so everyone can look upon them to find something which fit you well. If you cannot choose or have some doubts - you can get information from the support team or register to some online webinars to get in touch with details.

As well, there is the possibility to evaluate the product, with help of registering to the trial version.

What problems are you solving with the product? What benefits have you realized?

With help of that software, it was quite easy to perform the migration to our new ESXI server. It is possible to create main backups during business hours, and perform replication during off-peak hours, for example, at night, on holidays or weekends. At the same time, this replication can be performed by a separate independent agent, which can be, for example, located in the DMZ, and at the same time, which will not directly participate in the processes of creating system backups.

Review source: G2.com

Leave a reply

Your total score

B2B Software Guide