Default protection plans |
Remote Workers | Yes | No | No |
Office Workers (third-party antivirus) | Yes | No | No |
Office Workers (Cyber Protect antivirus) | Yes | No | No |
Cyber Protect Essentials (only for Cyber Protect Essentials edition) | Yes | No | No |
Forensic backup |
Collecting memory dump | Yes | No | No |
Snapshot of running processes | Yes | No | No |
Notarization of local image forensic backup | Yes | No | No |
Notarization of cloud image forensic backup | Yes | No | No |
Continuous data protection (CDP) |
CDP for files and folders | Yes | No | No |
CDP for changed files via application tracking | Yes | No | No |
Autodiscovery and remote installation |
Network-based discovery | Yes | No | No |
Active Directory-based discovery | Yes | No | No |
Template-based discovery (importing machines from a file) | Yes | No | No |
Manual adding of devices | Yes | No | No |
Active Protection |
Process Injects detection | Yes | No | No |
Automatic recovery of affected files from the local cache | Yes | Yes | Yes |
Self-defense for Acronis backup files | Yes | No | No |
Self-defense for Acronis software | Yes | No | Yes (Only Active Protection and antimalware components) |
Trusted/blocked process management | Yes | No | Yes |
Processes/folders exclusions | Yes | Yes | Yes |
Ransomware detection based on a process behavior (AI-based) | Yes | Yes | Yes |
Cryptomining process detection based on process behavior | Yes | No | No |
External drives protection (HDD, flash drives, SD cards) | Yes | No | Yes |
Network folder protection | Yes | Yes | Yes |
Server-side protection | Yes | No | No |
Zoom, Cisco Webex, Citrix Workspace, and Microsoft Teams protection | Yes | No | No |
Antivirus and Antimalware protection |
Fully-integrated Active Protection functionality | Yes | No | No |
Real-time antimalware protection | Yes, when Advanced antimalware is enabled | Yes, when Advanced antimalware is enabled | Yes, when Advanced antimalware is enabled |
Advanced real-time antimalware protection with local signature-based detection | Yes | Yes | Yes |
Static analysis for portable executable files | Yes | No | Yes* |
On-demand antimalware scanning | Yes | Yes** | Yes |
Network folder protection | Yes | Yes | No |
Server-side protection | Yes | No | No |
Scan of archive files | Yes | No | Yes |
Scan of removable drives | Yes | No | Yes |
Scan of only new and changed files | Yes | No | Yes |
File/folder exclusions | Yes | Yes | Yes*** |
Processes exclusions | Yes | No | Yes |
Behavioral analysis engine | Yes | No | Yes |
Exploit prevention | Yes | No | No |
Quarantine | Yes | Yes | Yes |
Quarantine auto clean-up | Yes | No | Yes |
URL filtering (http/https) | Yes | No | No |
Corporate-wide whitelist | Yes | No | Yes |
Microsoft Defender Antivirus management | Yes | No | No |
Microsoft Security Essentials management | Yes | No | No |
Registering and managing Antivirus and Antimalware protection via Windows Security Center | Yes | No | No |
Vulnerability assessment |
Vulnerability assessment of operating system and its native applications | Yes | Yes**** | Yes |
Vulnerability assessment for 3rd-party applications | Yes | No | Yes |
Patch management |
Patch auto-approval | Yes | No | No |
Patch auto-installation | Yes | No | No |
Patch testing | Yes | No | No |
Manual patch installation | Yes | No | No |
Patch scheduling | Yes | No | No |
Fail-safe patching: backup of machine before installing patches as part of protection plan | Yes | No | No |
Cancelation of a machine reboot if a backup is running | Yes | No | No |
Data protection map |
Adjustable definition of important files | Yes | No | No |
Scanning machines to find unprotected files | Yes | No | No |
Unprotected locations overview | Yes | No | No |
Ability to start the protection action from the Data protection map widget (Protect all files action) | Yes | No | No |
Disk health |
AI-based HDD and SSD health control | Yes | No | No |
Smart protection plans based on Acronis Cyber Protection Operations Center (CPOC) alerts |
Threat feed | Yes | No | No |
Remediation wizard | Yes | No | No |
Backup scanning |
Antimalware scan of image backups as part of backup plan | Yes | No | No |
Scanning of image backups for malware in cloud | Yes | No | No |
Malware scan of encrypted backups | Yes | No | No |
Safe recovery |
Antimalware scanning with Antivirus and Antimalware protection during the recovery process | Yes | No | No |
Safe recovery for encrypted backups | Yes | No | No |
Remote desktop connection |
Connection via NEAR | Yes | Yes | Yes |
Connection via RDP | Yes | No | No |
Connection via Screen sharing | No | No | Yes |
Connection via web client | Yes | No | No |
Connection via Quick Assist | Yes | Yes | Yes |
Remote assistance | Yes | Yes | Yes |
File transfer | Yes | Yes | Yes |
Screenshot transmission | Yes | Yes | Yes |
#CyberFit Score |
#CyberFit Score status | Yes | No | No |
#CyberFit Score standalone tool | Yes | No | No |
#CyberFit Score recommendations | Yes | No | No |
Data loss prevention |
Device control | Yes | No | Yes ARM CPU architecture is not supported |
Management options |
Upsell scenarios to promote Cyber Protect editions | Yes | Yes | Yes |
Web-based centralized and remote management console | Yes | Yes | Yes |
Protection options |
Remote wipe (Windows 10 only) | Yes | No | No |
Cyber Protect Monitor |
Cyber Protect Monitor app | Yes | No | Yes |
Protection status for Zoom | Yes | No | No |
Protection status for Cisco Webex | Yes | No | No |
Protection status for Citrix Workspace | Yes | No | No |
Protection status for Microsoft Teams | Yes | No | No |
Software inventory |
Software inventory scanning | Yes | No | Yes |
Software inventory monitoring | Yes | No | Yes |
Hardware inventory |
Hardware inventory scanning | Yes | No | Yes |
Hardware inventory monitoring | Yes | No | Yes |