Download PDF version Contact company

Acronis, the global pioneer in cyber protection announced the general availability of Acronis Advanced Security + Endpoint Detection & Response (EDR) for Acronis Cyber Protect Cloud.

Comprehensive security and data protection

With new capabilities such as AI-based attack analysis, Acronis EDR reduces complexity and simplifies workflows for a more streamlined operation, making it easier than ever for MSPs and the businesses they serve to deploy comprehensive security and data protection.

With more organisations turning to MSPs for their backup and security needs, and with a greater need for simplicity and efficiency, Acronis EDR aims to expand the adoption of advanced security capabilities, helping organisations of all sizes better protect themselves.

Rapid detection, response, and recovery with AI

EDR has become a mission-critical tool in incident response and the fight for data protection"

With the proliferation of endpoints and increasing frequency of cyber threats, EDR has become a mission-critical tool in incident response and the fight for data protection. But solutions that are difficult to deploy and maintain are an obstacle,” said Research Vice President of Security and Trust Michael Suby at IDC.

The best solutions deliver the advanced security of EDR and meet the needs of the IT professionals who use it. That means easy deployments and rapid detection, response, and recovery with AI and automation on board.

Out-of-the-box recovery options

Acronis EDR offers the broadest number of out-of-the-box recovery options that take advantage of the integration with Acronis Cyber Protect’s backup and recovery, endpoint management, and endpoint security capabilities.

Designed for Managed Service Providers (MSPs), it allows them to quickly and easily analyse and prioritise security incidents, minimise downtime, and maintain business continuity while keeping their clients safe and protected.

Robust EDR solution

Acronis EDR users can quickly evaluate a potential threat, and gain insight into how an attacker gained access"

Other EDR tools can be over-complicated and force MSPs into expensive, time-consuming processes to implement and understand. Acronis EDR delivers a robust EDR solution that is easy to deploy and use while following industry-established standards like the NIST cybersecurity framework and mapping to the MITRE ATT&CK® framework,” said Candid Wüest, VP of Research at Acronis.

By rapidly understanding attack analysis and impact, Acronis EDR users can quickly evaluate a potential threat, gain insight into how an attacker gained access, what damage was caused, and how the attack might spread.”

Features

Acronis EDR delivers:

  • Optimised Incident Analysis to quickly and easily analyse and prioritise security incidents and potential attacks without relying on costly security expertise or time-consuming processes.
  • Integrated Security with Backup & Recovery, for comprehensive protection critical to minimising downtime and maintaining business continuity in the event of an attack.
  • A Complete Cyber Protection Solution in a single agent, simple for MSPs to deploy, manage, and scale that eliminates the cost, complexity, and security gaps inherent in multiple-point solutions.

Investigate, remediate, and recover

"As a cybersecurity expert, I have witnessed firsthand the evolution of EDR and how it has revolutionised the way we approach security,” said Eric O'Neill, former FBI counterintelligence operative.

EDR allows security personnel to efficiently investigate, remediate, and recover from potential incidents while also reducing the attack surface and threat actor dwell time. The latest advances in EDR technology allow for rapid analysis of attack changes, shortened time to respond to incidents and better business continuity for all organisations.”

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?