ACRONIS CLOUD BACKUP SYSTEM INTEGRATOR Piergiorgio Venuti

A Hybrid Cloud Backup Solution for System Integrator and reseller

ACRONIS CLOUD BACKUP SYSTEM INTEGRATOR Thousands of system integrator — from small to large — succeed by selling an award- winning backup-as-a-service solution that supports more than 20 platforms. Acronis Cloud Backup protects any virtual, physical, and cloud environment, and lets you quickly realise incremental revenues with zero upfront costs and a pay-as-you-go business model.

PROTECT ANY WORKLOAD, BACKUP TO ANY STORAGE

You, as a system integrator, need to support an increasing number of use cases to retain customers and expand your Total Addressable Market (TAM). Acronis Cloud Backup provides you with tools and options to protect any device in any location by backing up to any storage and recovering to any platform.

Acronis Workload

 

 

 

ACRONIS CLOUD BACKUP SYSTEM INTEGRATOR

EXACT FIT FOR YOUR BUSINESS

Control Your Deployment

 • Secure Online Desktop-Hosted (Turnkey solution)

 • Hybrid Cloud

 

 

Control Your Licensing

 

 • Supports both pay-as-you-go and pre-paid models

 • Supports hard and soft quotas

 • Offers per-GB or per-seat/per-device licenses

 

Control Your Packaging

• White label the backup service
• Control the availability of specific features Set quotas for specific accounts and groups

 

Control Your Technology Model

• Includes a set of pre-built integrations to connect Acronis Backup Cloud to your billing, management, and provisioning solutions
• Furthermore Acronis Cloud Backup offers cloud automation using RESTful management API

 

KEY FEATURES

Protection for 20+ platforms

 • On-Premise, remote, cloud

 • Windows®, Linux®, Mac®

 • VMware vSphere®, Microsoft

 • Hyper-V®, Citrix XenServer®, Linux KVM, Red Hat® Enterprise Virtualization, and Oracle VM Server

 • Amazon EC2®, Azure®

 • Office 365®

 • Exchange, SQL®, SharePoint®

 • Active Directory®

 • iPhone®, iPad®, Android®

 

World’s Fastest Recovery

  • Acronis Universal Restore

  • Granular recovery

  • Bare-metal recovery

  • Acronis Instant RestoreTM

  • Virtual host recovery

  • Acronis vmFlashbackTM

  • Automated recovery

  • Any-to-any migration (P2V, V2V, V2P, P2P, P2C, C2C, etc.)

 

Flexible Storage Options

 • Local Disks

 • NAS, SAN

 • Acronis Cloud Storage

 • Off-host operations 

 • 14+ data centers

 • Third-party hosted, including Azure,

 • Amazon® S3, IBM Bluemix®

 

Security Features

 • Multi-tenant cloud

 • 2048-bit SSL channel encryption

 • AES-256 data encryption in transit and at rest

 • Tier-IV designed, SSAE-16 certified

 • data centers provided by Acronis

 • Network based login restrictions

 

ACRONIS CLOUD BACKUP SYSTEM INTEGRATOR

NEW Acronis Active ProtectionTM

Protects your customers’ data and systems from ransomware attacks
by detecting, blocking, and reversing suspicious changes to data, backup files, and the backup agent.

 

NEW Acronis ASignTM

Eliminates miscommunications with users, suppliers, and customers by supporting the authenticity of your customers’ files with signatures enabled by blockchain.

 

Management and Customization

 • Multi-tenant service platform with multiple partner tiers

 • Multiple points of custom branding • Ability to enable/disable specific features for customers

 • Granular control over quotas for storage and devices

• Automated backup agent updates from the cloud for easy maintenance

 

Powerful Integrations

 • Integrates with Odin®, HostBill, Flexiant®, WHMCS®, ConnectWise®, Autotask®, LabTech®, and Microsoft Azure

 • Provides integrations settings configuration and status right in the cloud console

 • Simplifies integration efforts with RESTful management APIs

 • Integrates with APS Cloud Application Standard v2.0/1.2

 

Unified Cloud Console

 • Easy, centralized administration of all partner and customer accounts

 • A single console to manage all services from Acronis

 • Intuitive, touch-ready web console • Already in the Acronis Cloud – zero installation required

 

Dedicated Technical Support

 • Pre-sales and post-sales support for system integrator, provided by a designated team of specialists to help you in all stages of the customer lifecycle

 • Tier II technical support 24/7/365 free of charge, exclusively for certified Acronis partners Professional Services

 • Acronis Professional Services to help ensure the success of your Acronis implementations

 • Professional assistance with more complex service deployments, including private-cloud backup and software-defined storage implementations Training and Certifications

 • Acronis Training & Certification courses tailored to teach your team how to sell and implement hybrid cloud data protection strategies

 • Classroom and online training sessions led by professional instructors who guides you through the exercises, use cases, and online examination

USEFUL LINKS:
 ♦ Home
 ♦ BaaS
 

[btnsx id=”5599″] [btnsx id=”2931″]

Finally see all Cloud Products.

See our presentation video

ACRONIS CLOUD BACKUP SYSTEM INTEGRATOR

Share


RSS

More Articles…

Categories …

Tags

RSS Unknown Feed

RSS Full Disclosure

  • SEC Consult SA-20250604-0 :: Local Privilege Escalation and Default Credentials in INDAMED - MEDICAL OFFICE (Medical practice management) Demo version June 10, 2025
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Jun 09SEC Consult Vulnerability Lab Security Advisory < 20250604-0 > ======================================================================= title: Local Privilege Escalation and Default Credentials product: INDAMED - MEDICAL OFFICE (Medical practice management) Demo version vulnerable version: Revision 18544 (II/2024) fixed version: Q2/2025 (Privilege Escalation, Default Password)...
  • Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain → Secure Enclave Key Theft, Wormable RCE, Crypto Theft June 10, 2025
    Posted by josephgoyd via Fulldisclosure on Jun 09Hello Full Disclosure, This is a strategic public disclosure of a zero-click iMessage exploit chain that was discovered live on iOS 18.2 and remained unpatched through iOS 18.4. It enabled Secure Enclave key theft, wormable remote code execution, and undetectable crypto wallet exfiltration. Despite responsible disclosure, the research […]
  • Defense in depth -- the Microsoft way (part 89): user group policies don't deserve tamper protection June 3, 2025
    Posted by Stefan Kanthak on Jun 03Hi @ll, user group policies are stored in DACL-protected registry keys [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies] respectively [HKEY_CURRENT_USER\Software\Policies] and below, where only the SYSTEM account and members of the "Administrators" user group are granted write access. At logon the user&apos;s registry hive "%USERPROFILE%\ntuser.dat" is loaded with exclusive (read, write and...
  • CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0 June 3, 2025
    Posted by Sanjay Singh on Jun 03Hello Full Disclosure list, I am sharing details of a newly assigned CVE affecting an open-source educational software project: ------------------------------------------------------------------------ CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0 ------------------------------------------------------------------------ Product: CloudClassroom PHP Project Vendor:...
  • ERPNext v15.53.1 Stored XSS in bio Field Allows Arbitrary Script Execution in Profile Page June 3, 2025
    Posted by Ron E on Jun 03An authenticated attacker can inject JavaScript into the bio field of their user profile. When the profile is viewed by another user, the injected script executes. *Proof of Concept:* POST /api/method/frappe.desk.page.user_profile.user_profile.update_profile_info HTTP/2 Host: --host-- profile_info={"bio":"\">"}
  • ERPNext v15.53.1 Stored XSS in user_image Field Allows Script Execution via Injected Image Path June 3, 2025
    Posted by Ron E on Jun 03An authenticated user can inject malicious JavaScript into the user_image field of the profile page using an XSS payload within the file path or HTML context. This field is rendered without sufficient sanitization, allowing stored script execution in the context of other authenticated users. *Proof of Concept:*POST /api/method/frappe.desk.page.user_profile.user_profile.update_profile_info HTTP/2 […]
  • Local information disclosure in apport and systemd-coredump June 3, 2025
    Posted by Qualys Security Advisory via Fulldisclosure on Jun 03Qualys Security Advisory Local information disclosure in apport and systemd-coredump (CVE-2025-5054 and CVE-2025-4598) ======================================================================== Contents ======================================================================== Summary Mitigation Local information disclosure in apport (CVE-2025-5054) - Background - Analysis - Proof of concept Local information disclosure in systemd-coredump...
  • Stored XSS via File Upload - adaptcmsv3.0.3 June 3, 2025
    Posted by Andrey Stoykov on Jun 03# Exploit Title: Stored XSS via File Upload - adaptcmsv3.0.3 # Date: 06/2025 # Exploit Author: Andrey Stoykov # Version: 3.0.3 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ Stored XSS via File Upload #1: Steps to Reproduce: 1. Login with low privilege user and visit "Profile" > "Edit […]
  • IDOR "Change Password" Functionality - adaptcmsv3.0.3 June 3, 2025
    Posted by Andrey Stoykov on Jun 03# Exploit Title: IDOR "Change Password" Functionality - adaptcmsv3.0.3 # Date: 06/2025 # Exploit Author: Andrey Stoykov # Version: 3.0.3 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ IDOR "Change Password" Functionality #1: Steps to Reproduce: 1. Login as user with low privilege and visit profile page 2. Select […]
  • Stored XSS "Send Message" Functionality - adaptcmsv3.0.3 June 3, 2025
    Posted by Andrey Stoykov on Jun 03# Exploit Title: Stored XSS "Send Message" Functionality - adaptcmsv3.0.3 # Date: 06/2025 # Exploit Author: Andrey Stoykov # Version: 3.0.3 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ Stored XSS "Send Message" Functionality #1: Steps to Reproduce: 1. Login as normal user and visit "Profile" > "Message" > […]

Customers

Newsletter

{subscription_form_1}