Muhammad Khaled, Supervisor MEA/Senior Solutions Engineer ME at Acronis discusses how Acronis addresses the most pressing cybersecurity concerns while maintaining the highest standards of data privacy and security.

0 452

Can you explain Acronis’ approach to data protection and backup solutions?

Since 2003, we have been dedicated to perfecting backup solutions. Our recent innovation addresses the need to proactively protect against cyber threats instead of reacting after an attack. We have bridged the worlds of data protection and cybersecurity to create a unified solution known as cyber protection. Acronis proudly presents this seamless collaboration of backup and cybersecurity, ensuring comprehensive defence for the data.

How does Acronis address cybersecurity concerns alongside data protection?

In our continuous efforts to fortify data backup with cybersecurity, we introduced a pivotal feature called Active Protection. This innovative technology goes beyond mere detection and response – in the event of a ransomware attack; it not only identifies and halts the malicious process but also restores encrypted files, even without pre-existing backups. This sets our product apart by offering an unparalleled level of security. Additionally, we’ve bolstered our proactive measures with real-time URL filtering to intercept malicious downloads, as well as deploying preventive measures to thwart threats like privilege escalation. Our multi-layered approach ensures the utmost security for our customers’ systems.

What distinguishes Acronis from other data protection and cybersecurity providers?
Acronis’ standout feature, Active Protection, distinguishes it from other backup solutions by its proactive defence against ransomware attacks. Unlike conventional solutions that recommend formatting and restoring post-attack, Acronis detects and halts ransomware in real-time, automatically restoring encrypted files without any manual intervention. Moreover, it offers a unique integration of backup and security, allowing the scanning of backup files for malware. Additionally, it seamlessly integrates backup with patch management, ensuring automated backup before updates, all accessible via a single, user-friendly console.

Can you provide examples of industries or sectors that benefit most from Acronis solutions?
Acronis products offer versatile solutions catering to diverse sectors, spanning government, enterprise, and the oil and gas industry. Our robust, air-gapped backups ensure the security of critical systems such as SCADA and ICS. Simultaneously, we provide small to medium-sized businesses with the flexibility of comprehensive cloud services, eliminating the need for on-premises hardware or software. Our all-inclusive cloud offerings cover management, storage, and disaster recovery, representing zero upfront investment for our valued customers.

How does Acronis ensure the security and privacy of user data in its solutions?

The security of customer data is our utmost priority, and we employ multiple layers of protection to guarantee its safety in the cloud. First, we have introduced role-based access control, offering various access levels like company admin, read-only admin, and more. Furthermore, our two-factor authentication ensures that even if malicious actors obtain the username and password, they will not gain access. We have implemented IP-based login restrictions to prevent unauthorised entry from different IPs. All data is encrypted, and we never store any password, ensuring that even Acronis cannot restore the backup without the client giving us the password. Our multi-tenant system isolates customers within their private tenants, making it a secure and independent component of our multi-tiered solution.

What support and recovery options does Acronis offer in case of data loss or security incidents?

Our multi-layered defence strategy ensures data safety. In addition to relying on backups as a final resort, we have bolstered security with email protection to block malicious links, real-time endpoint detection, and exploit prevention. Active Protection defends against ransomware, while the self-protection feature secures the fully loaded backups. Even in dire situations, if attackers compromise production and backups, our cloud-based disaster recovery with immutable storage allows for swift system restoration using virtual machines. The data remains protected throughout.

Are there any specific compliance standards or certifications that Acronis adheres to?

Our data centers adhere to global standards and certifications, including GDPR, SOC 1, SOC 2, and ISO 20001. These credentials offer our customers the assurance that their data is secure with Acronis, fostering trust and confidence in our cloud storage services.

What recent innovations or developments have come from Acronis in the data protection and cybersecurity space?

Acronis’ security approach has evolved significantly with the introduction of advanced EDR (Endpoint Detection and Response). Beyond traditional detection and blocking, our advanced EDR empowers users with comprehensive insights. It provides data on affected workloads, running processes, encrypted files, and potential data exfiltration. Furthermore, it can detect any malicious attempts to modify the registry for persistent attacks. What sets us apart is the synergy between advanced detection and response. When an attack is thwarted, we offer restoration from backups, patch management to prevent future attacks, and even disaster recovery solutions to revive compromised systems. Our integrated approach, combining EDR, disaster recovery, patch management, and remote system management, creates a robust security strategy, all underpinned by Advanced Security Plus EDR. This multi-layered security approach assures our customers that their data remains safeguarded across every possible threat scenario.

Leave A Reply

Your email address will not be published.

Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.