SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
ACRONIS TRUE IMAGE 2017
NEW GENERATION
Independent, third-party lab reports overview from:
Topics: Performance, Usability, Ransomware Protection, Features
April 2017
2ACRONIS © 2017
Another Acronis Industry First!
“One of the most important features in the current
version is the Acronis Active Protection.
It is an advanced, active protection against data
loss to ransomware. It protects the backup files
upon a ransomware infection and is able to
prevent any data loss.
This feature makes True Image
unique among all backup software.”
3ACRONIS © 2017
Independent MRG Effitas tests focused on
security, speed, usability, and features
“We know that all endpoints can be infected,
regardless of the security solution employed.
That is why in these tests we first focused
on the backup protection level against
ransomware infection.”
“[Next up were] performance and usability because
Besides data protection, the backup
solution products should be fast and
usable.”
4ACRONIS © 2017
MRG Effitas Independent tests
“Among all the products we tested,
Only Acronis True Image 2017 New
Generation was able to protect the
backups from every Ransomware family
tested.
The other solutions have basically zero backup protection
when it comes to Ransomware…”
“Acronis won the most performance
tests (18 out of 24), and in the cases when it did not
win a test, it scored second.”
5ACRONIS © 2017
Fast: Optimized for modern SSD drives
6ACRONIS © 2017
Fast: The best cloud performance
“The connection speed
to its own cloud was
way faster than any
other competitor’s.”
“Acronis True Image earned the
‘best’ title as it finished first in 18 of
24 test cases and, when it didn’t
win, it finished second.
Acronis did the fastest at backup
on HDD and on SSD as well.”
7ACRONIS © 2017
Ransomware Protection
Three scenarios that must be addressed
“#1. Local backup file protection against ransomware
The number one best practice to protect against ransomware is to have backups. What most home users
forget that ransomware can encrypt the backup files if these files are not offline, read-only or in the cloud.”*
“#2. Cloud backup file and scheduled backup
protection against ransomware”*
“#3. Performance”
See elsewhere in this presentation about how Acronis wins!
Amongst solutions tested by MRG
Effitas, the following vulnerabilities were
uncovered:
• Malware accessing cloud credentials
• Man in the middle attacks against the
network data flow
• .EXE background services not sufficiently
protected
• The possibility for malware to decrypt
encrypted data.”
For Acronis?
“No vulnerability found.”
8ACRONIS © 2017
Protection from ransomware families
“Among all the products we
tested, only Acronis
True Image 2017
New Generation was
able to protect the
backups from every
Ransomware family
tested. The other solutions
have basically zero backup
protection when it comes to
Ransomware.”
9ACRONIS © 2017
Acronis protection for the win!
10ACRONIS © 2017
Protecting backup files themselves
“Based on the tests, only
Acronis’ backup file is
protected against
ransomware,
the other products archives are
only left untouched if the
ransomware is not configured
to encrypt that kind of file type.”
11ACRONIS © 2017
Feature Complete
“Acronis True Image has
been an established backup
tool for years and now with
the added new features–
especially the Acronis
Active Protection –
Acronis surely
takes the lead in
this contest.”
12ACRONIS © 2017
View the original report
Note: All text in quotation marks in this slideshare comes from the MRG Effitas report. You
can find the original, full report via our blog at http://go.acronis.com/MRGEffitasblog1
www.acronis.com
New Generation Data Protection
twitter.com/acronis blog.acronis.com facebook.com/acronis

Contenu connexe

Tendances

Security From The Ground Up
Security From The Ground UpSecurity From The Ground Up
Security From The Ground Up
buggeen
 

Tendances (20)

Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic Stack
 
Outpost24 webinar: Security Analytics: what's in a risk score
Outpost24 webinar: Security Analytics: what's in a risk scoreOutpost24 webinar: Security Analytics: what's in a risk score
Outpost24 webinar: Security Analytics: what's in a risk score
 
Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security
 
Outpost24 webinar - A day in the life of an information security professional
Outpost24 webinar - A day in the life of an information security professional Outpost24 webinar - A day in the life of an information security professional
Outpost24 webinar - A day in the life of an information security professional
 
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
Elastic Security: Proteção Empresarial construída sobre o Elastic StackElastic Security: Proteção Empresarial construída sobre o Elastic Stack
Elastic Security: Proteção Empresarial construída sobre o Elastic Stack
 
Outpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessmentsOutpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessments
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and Cisco
 
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018
 
Outpost24 webinar - Implications when migrating to a Zero Trust model
Outpost24 webinar -  Implications when migrating to a Zero Trust modelOutpost24 webinar -  Implications when migrating to a Zero Trust model
Outpost24 webinar - Implications when migrating to a Zero Trust model
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit security
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldDarren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
 
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
Herding Pets and Cattle: Extending Foundational Controls Into the CloudHerding Pets and Cattle: Extending Foundational Controls Into the Cloud
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
 
Your Server. Your Way.
Your Server. Your Way.Your Server. Your Way.
Your Server. Your Way.
 
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
 
Elastic Security: Your one-stop OODA loop shop
Elastic Security: Your one-stop OODA loop shopElastic Security: Your one-stop OODA loop shop
Elastic Security: Your one-stop OODA loop shop
 
Conferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic SecurityConferencia principal: Evolución y visión de Elastic Security
Conferencia principal: Evolución y visión de Elastic Security
 
Storage Made Easy Cloud Control Gateway Overview
Storage Made Easy Cloud Control Gateway OverviewStorage Made Easy Cloud Control Gateway Overview
Storage Made Easy Cloud Control Gateway Overview
 
Security From The Ground Up
Security From The Ground UpSecurity From The Ground Up
Security From The Ground Up
 

Similaire à Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas

B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
Pelos TCHIKAYA
 

Similaire à Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas (20)

Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
XcellBackup -  Cloud Data Protection Services - Powered by Acronis Backup CloudXcellBackup -  Cloud Data Protection Services - Powered by Acronis Backup Cloud
XcellBackup - Cloud Data Protection Services - Powered by Acronis Backup Cloud
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-security
 
How to protect my cloud workload from Ransomware?
How to protect my cloud workload from Ransomware?How to protect my cloud workload from Ransomware?
How to protect my cloud workload from Ransomware?
 
Mac review 2012_en
Mac review 2012_enMac review 2012_en
Mac review 2012_en
 
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
 
Attacking antivirus
Attacking antivirusAttacking antivirus
Attacking antivirus
 
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
CWIN17 Toulouse / Automated security for the real time enterprise-trend micro...
 
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...
Webinar NETGEAR - Acronis Backup 12.5 e ReadyNAS per l'Ufficio e la piccola A...
 
Is Security Optional20100608
Is Security Optional20100608Is Security Optional20100608
Is Security Optional20100608
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
 
Hackfest Cracking Crypto Rev 2
Hackfest Cracking Crypto Rev 2Hackfest Cracking Crypto Rev 2
Hackfest Cracking Crypto Rev 2
 
How to install Kaspersky Antivirus.ppt
How to install Kaspersky Antivirus.pptHow to install Kaspersky Antivirus.ppt
How to install Kaspersky Antivirus.ppt
 
Limitless xdr meetup
Limitless xdr meetupLimitless xdr meetup
Limitless xdr meetup
 
Ransomware
RansomwareRansomware
Ransomware
 
How Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile DevicesHow Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile Devices
 
IBM X-Force Research
IBM X-Force ResearchIBM X-Force Research
IBM X-Force Research
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas

  • 1. ACRONIS TRUE IMAGE 2017 NEW GENERATION Independent, third-party lab reports overview from: Topics: Performance, Usability, Ransomware Protection, Features April 2017
  • 2. 2ACRONIS © 2017 Another Acronis Industry First! “One of the most important features in the current version is the Acronis Active Protection. It is an advanced, active protection against data loss to ransomware. It protects the backup files upon a ransomware infection and is able to prevent any data loss. This feature makes True Image unique among all backup software.”
  • 3. 3ACRONIS © 2017 Independent MRG Effitas tests focused on security, speed, usability, and features “We know that all endpoints can be infected, regardless of the security solution employed. That is why in these tests we first focused on the backup protection level against ransomware infection.” “[Next up were] performance and usability because Besides data protection, the backup solution products should be fast and usable.”
  • 4. 4ACRONIS © 2017 MRG Effitas Independent tests “Among all the products we tested, Only Acronis True Image 2017 New Generation was able to protect the backups from every Ransomware family tested. The other solutions have basically zero backup protection when it comes to Ransomware…” “Acronis won the most performance tests (18 out of 24), and in the cases when it did not win a test, it scored second.”
  • 5. 5ACRONIS © 2017 Fast: Optimized for modern SSD drives
  • 6. 6ACRONIS © 2017 Fast: The best cloud performance “The connection speed to its own cloud was way faster than any other competitor’s.” “Acronis True Image earned the ‘best’ title as it finished first in 18 of 24 test cases and, when it didn’t win, it finished second. Acronis did the fastest at backup on HDD and on SSD as well.”
  • 7. 7ACRONIS © 2017 Ransomware Protection Three scenarios that must be addressed “#1. Local backup file protection against ransomware The number one best practice to protect against ransomware is to have backups. What most home users forget that ransomware can encrypt the backup files if these files are not offline, read-only or in the cloud.”* “#2. Cloud backup file and scheduled backup protection against ransomware”* “#3. Performance” See elsewhere in this presentation about how Acronis wins! Amongst solutions tested by MRG Effitas, the following vulnerabilities were uncovered: • Malware accessing cloud credentials • Man in the middle attacks against the network data flow • .EXE background services not sufficiently protected • The possibility for malware to decrypt encrypted data.” For Acronis? “No vulnerability found.”
  • 8. 8ACRONIS © 2017 Protection from ransomware families “Among all the products we tested, only Acronis True Image 2017 New Generation was able to protect the backups from every Ransomware family tested. The other solutions have basically zero backup protection when it comes to Ransomware.”
  • 9. 9ACRONIS © 2017 Acronis protection for the win!
  • 10. 10ACRONIS © 2017 Protecting backup files themselves “Based on the tests, only Acronis’ backup file is protected against ransomware, the other products archives are only left untouched if the ransomware is not configured to encrypt that kind of file type.”
  • 11. 11ACRONIS © 2017 Feature Complete “Acronis True Image has been an established backup tool for years and now with the added new features– especially the Acronis Active Protection – Acronis surely takes the lead in this contest.”
  • 12. 12ACRONIS © 2017 View the original report Note: All text in quotation marks in this slideshare comes from the MRG Effitas report. You can find the original, full report via our blog at http://go.acronis.com/MRGEffitasblog1
  • 13. www.acronis.com New Generation Data Protection twitter.com/acronis blog.acronis.com facebook.com/acronis