Unlock better margins and higher value with a platform built for MSPs
Acronis XDR is natively integrated into the consolidated Acronis Cyber Protect Cloud platform — that allows you to launch, manage and scale all your cybersecurity, data protection and endpoint management services via a single console and agent.
|
| Features | Acronis Cyber Protect Cloud |
EDR | XDR |
| Behaviour-based detection | 🔷 |
🔷 |
🔷 |
| Vulnerability assessments | 🔷 |
🔷 |
🔷 |
| Device Control | 🔷 |
🔷 |
🔷 |
| File- and system-level backup | 🔷 |
🔷 |
🔷 |
| Inventory collection (with RMM) | 🔷 |
🔷 |
🔷 |
| Patch managament (with RMM) | 🔷 | 🔷 |
🔷 |
| #CyberFit Score (security posture evaluation) | 🔷 |
🔷 |
🔷 |
| Remote Connection (with RMM) | 🔷 | 🔷 |
🔷 |
| Remediation including full reimaging | 🔷 | 🔷 |
🔷 |
| Business Continuity (with Disaster Recovery) | 🔷 | 🔷 | 🔷 |
| URL Filtering | - | 🔷 | 🔷 |
| Exploit Prevention | - | 🔷 | 🔷 |
| Real-time threat intelligence feed | - | 🔷 | 🔷 |
| Threat hunting - Early access | - | 🔷 | 🔷 |
| Automated, tunable allowlisting bsaed on profiling | - | 🔷 | 🔷 |
| Forensic data collection | - | 🔷 | 🔷 |
| Event monitoring | - | 🔷 | 🔷 |
| Automated even correlation | - | 🔷 | 🔷 |
| GenAI assistant (Acronis Copilot - Early Access) | - | 🔷 | 🔷 |
| Prioritization of suspicious acitivities | - | 🔷 | 🔷 |
| AI-generated incident summaries | - | 🔷 | 🔷 |
|
Automated MITRE ATT&CK attack chain visualization and interpretation |
- |
🔷 | 🔷 |
| Single-click response to incidents | - | 🔷 | - |
| Full Threat containment including endpoint quarantine | - | 🔷 | 🔷 |
| Automated response playbooks | - | 🔷 | 🔷 |
| Intelligent search for IoCs including emerging threats | - | 🔷 | 🔷 |
| Attack-specific rollback | - | 🔷 | 🔷 |
| Anti-ransomware protection with automatic rollback | - | 🔷 | 🔷 |
| integration with Microsoft 365 apps (Sharepoint, OneDrive, Teams, Outlook, Entra ID) | - | - | 🔷 |
| Integration with Email Security (email telemetry) | - | - | 🔷 |
| Integration with Collaboration Security (Microsoft 365 apps telemetry) | - | - | 🔷 |
| Delete malicious email attachment or URLs | - | - | 🔷 |
| Search for malicious attachments across mailboxes | - | - | 🔷 |
| Block malicious email address | - | - | 🔷 |
| Terminate all user sessions | - | - | 🔷 |
| Force user account password reset on next login | - | - | 🔷 |
| Suspend user account | - | - | 🔷 |
| MDR service | - | 🔷 | 🔷 |
| Public API for EDR | - | 🔷 | 🔷 |