Acronis #CyberFit Cloud Tech Fundamentals 2022-Comprimido (1) - 1-150
Acronis #CyberFit Cloud Tech Fundamentals 2022-Comprimido (1) - 1-150
Acronis #CyberFit Cloud Tech Fundamentals 2022-Comprimido (1) - 1-150
#CyberFit
#CyberFit Academy
Cyber Protect Cloud
Introductions
#CyberFit Academy
Course Summary
20 MCQ questions 60 Minutes working 70% Passing Grade Two Attempts given Open Book
time
#CyberFit Academy
Target Persona
#CyberFit Academy
Learning Objectives
#CyberFit Academy
Course Modules – Part 1
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
STEP
STEP Acronis #CyberFit Cloud Tech Associate Certifications
11 Consists of the following courses (specializations)
Optional:
#CyberFit Academy
Cyber Protect Cloud
Introduction to Acronis
Cyber Protection
#CyberFit Academy
Acronis is a Leader in Cyber Protection
Machine Intelligence (MI)-powered Cyber Protection, Cyber Cloud, Cyber Platform
Since 2008 Founded in 2003 in $275M+ ARR 1,700+ employees 1,800,000+ workloads
Corporate HQ in Singapore, currently 50%+ ARR growth 34+ locations protected
Schaffhausen, the International HQ 80%+ Cloud growth 150+ countries 1,000,000+ attacks
Switzerland 20,000+ SPs 33+ languages prevented
750,000+ customers DCs in 200+ countries 15,000+ Cloud
in the next 24 months partners providing
Dual Headquarters for Dual Protection
37 today, 45 in 2021
#CyberFit Academy
Solution: Integrated and Autonomous Cyber Protection
Acronis mission is to protect all data, applications and systems (workloads)
S A P A S
Safety Accessibility Privacy Authenticity Security
Nothing is lost: Access from Control over Proof that a copy Protection against
there is always a anywhere visibility is an exact replica bad actors
copy for recovery at any time and access of the original
#CyberFit Academy
The threat landscape is becoming more complex
#CyberFit Academy
What if you could rely on
just one integrated
solution?
#CyberFit Academy
What if you could rely on just one integrated solution?
• Easier upsells using integrated • One console, one license, one • Reduce risk with 100%
solutions agent coverage of client workloads
• Simplified renewals with • Integration drives deeper • Unique capabilities not
integrated reporting automation available from your current
• Greater ROI via pre-built • Consolidate vendor expenses security vendors
marketing campaigns • Leader in independent testing
(VB100, AV-Test, AV-Comparatives)
#CyberFit Academy
Legacy Backup & AV solutions Acronis Cyber Protect Cloud
#CyberFit Academy
Acronis Cyber Protect Cloud
#CyberFit Academy
Acronis Data Centers
34+6
DATA CENTERS
Strong presence in Asia-Pacific,
Singapore, Japan, Australia
#CyberFit Academy Acronis Data Centers Google Data Centers Azure Data Centers
Acronis Data Centers
AMERICAS EUROPE APAC
Vancouver, CA London, UK Nagano, JP
Ashburn, US Thessaloniki, GR Chennai, IN
St. Louis, US Warsaw, PL Thimphu, BT
Dallas, US Lisbon, PT Seoul, KR
Phoenix, US Strasbourg, FR Singapore, SG
Sao Paulo, BR Billund, DK Sydney, AU
Cologne, DE Auckland, NZ
Prague, CZ Taipei, TW
Frankfurt, DE
Lupfig, CH
Echen, LI
Tel Aviv, IL
34+6 Valencia, ES
DATA CENTERS
Strong presence in Asia-Pacific,
Singapore, Japan, Australia
#CyberFit Academy Acronis Data Centers Google Data Centers Azure Data Centers
Acronis Cyber Protection Operation Centers
Schaffhausen, SW
Scottsdale, AZ, US
Singapore
#CyberFit Academy
Cyber Protect Cloud
Product Overview
#CyberFit Academy
Best-in-breed backup combined
with integrated security and management
#CyberFit Academy
Built for Service Providers
Comprehensive white-labelling
Straightforward pay-as-you-go
pricing
#CyberFit Academy
Next Generation Cyber Security
#CyberFit Academy
Reliable Backup & Recovery
Protects more than 25 workloads and incorporates the backup
industry’s most advanced anti-ransomware technology,
safeguarding data and systems in any environment – physical or
virtualized, on-premises or in the cloud.
Windows Windows SQL Share Active Microsoft Google Linux SAP Scale
Azure Exchange Hyper-V Computing
Server PC Server Point Directory 365 Workspace Server HANA
#CyberFit Academy
Enterprise Protection & Management
Infrastructure and Remote agent Defenses against Patch management Backup and
devices auto- installation malware / integrated with Disaster Recovery
discovery ransomware backup
Backup and Forensic information
Vulnerability Disaster Recovery Hard drive Malware quarantine in backups
assessment health control
Unified protection
Data protection map policies management Dashboards and Rescue with Remote desktop
reports bootable media
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Cyber Protection Capabilities
#CyberFit Academy
Deep integration enables new capabilities
One agent
One policy
One UX/UI
One license
One vendor
#CyberFit Academy
One Protection Plan
Efficiently enable, disable and configure services
and policies on a per-client or group level
(core and advanced packs):
• Backup
• Anti-malware protection
• Disaster Recovery
• URL filtering
• Vulnerability assessments
• Patch management
• Data discovery (via data protection map)
• Microsoft Defender Antivirus and Microsoft
Security Essentials management
#CyberFit Academy
Devices auto-discovery and remote agent installation
Simplify the process of installing
multiple agents at once – both in
the cloud and on-premises
• Network-based discovery
• Active Directory-based discovery
• Import a list of computers from the file
• Auto-apply a protection plan
• Batch remote agent installations
with a discovery wizard
#CyberFit Academy
Innovative data protection scenarios
Next-gen continuous data Safe endpoint recovery: Data protection map:
protection: Avoid even the Integrate anti-malware Monitor the protection
smallest data loss in key updates and patches into status of files with
applications the recovery process classification, reporting,
and unstructured data
analytics
Better protection with less Fail-safe patching: Global and local allowlists:
resources: Enable more Automatically back up Created from backups to
aggressive scans and vulnerability endpoints before installing any support more aggressive
assessments by offloading data to patches, enabling immediate heuristics, preventing false
central storage, including the rollback detections
cloud
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Included Features - Security
#CyberFit Academy
Acronis #CyberFit Score
Simplify MSP operations and service upselling
Assess the level of protection
of any machine:
• Is backup enabled?
• Is anti-malware installed?
• Is the firewall in place?
• Are HDDs encrypted?
• Is a VPN in use?
#CyberFit Academy
Vulnerability Assessment
Discover an issue before an issue happens
Continuous, daily update of Acronis’ vulnerability and
patch management database
• Support for:
• Microsoft:
a) Workstations – Windows 7 and later
b) Server – Windows Server 2008R2 and later
c) Microsoft Office (2010 and more) and related
components
d) .NET Framework and server applications
• Adobe, Oracle Java
• Browsers and other software
Why?
Mitigates potential threats, prevents attacks.
#CyberFit Academy
Next Generation Cyber Security
#CyberFit Academy
Acronis Active Protection
Backup industry’s most advanced anti-ransomware
technology
Acronis provided
excellent performance, is
easy to use and has a rich
Persistently guards files Relentlessly defends feature set. On top of that
including local backups backups from alteration it is
from unauthorized by hardening the Acronis the only solution in the
modification and/or agent application from test to provide dedicated
encryption attacks protection from
ransomware attacks. This
earned Acronis the first
Instantly restores files Actively future-proofs ever approved backup &
to the most recently your data protection data security certificate of
backed up version because AV-TEST.
should ransomware it is based on a behavioral
manage to get through heuristic approach
the defense and white-listing David Walkiewicz
Director Test Research,
av-test.org
#CyberFit Academy
Acronis static AI analyzer
Next-gen static analysis to catch threats before they execute
Why?
Detect malware triggered without execution
#CyberFit Academy
Signature-based detection
Faster and more efficient detection
Cloud-based (in Acronis Cyber Protect Cloud as well):
• Based on AI- and behavior-based detections for faster detection
#CyberFit Academy
Behavior-based detection
Powerful behavioral heuristics to catch sophisticated threats
Analyze suspicious kernel-level events and all events
coming from Windows OS to detect malicious attacks with
detection-evasive behavior
• Effectively dealing with fileless, memory-
and script-based attacks (part of APT invasion)
• Dynamic detection rules – catch polymorphic and obfuscated
malware
• New malware techniques using symlinks for encrypting files, such
as RIPlace, evade detection by most competitive technologies
• Effective detection of unknown, new,
and developing threats
Why?
Prevent sophisticated attacks with detection-evasive behavior
#CyberFit Academy
Section Summary
• Acronis Cyber Fit Score – provides and easy way to find out if the
customer is up to certain level of service in terms of cyber
protection
• Vulnerability Assessment – discover issue before the issue
happens with daily updates and information of the latest version of
supported workstations, servers, browsers, applications and
components. Mitigates potential threats and prevents attacks.
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Included Features - Management
#CyberFit Academy
Centralized backup plans management
Improve efficiency by managing backup plans from one tab
#CyberFit Academy
Remote Desktop & Remote Assistance
Remotely operate any endpoint as if near the device
• Securely connect to
remote machines even
behind a firewall on a
private network without
changing firewall
settings or establishing
additional VPN tunnels
• Allows engineers to view
user’s screen and
provide support with
specific tasks or fix
issues
Why?
Fewer tools, plus less effort to connect, and faster reaction times, reduced costs
#CyberFit Academy
Hardware inventory collection
• Discover all hardware assets on all protected endpoints of the
organization (e.g. CPU, GPU, motherboard, RAM, network
adapters, etc.)
• Get up-to-date information about hardware assets:
• Regular scans can be scheduled to run automatically
• On-demand scans can be manually triggered by engineers
• Get detailed hardware information about hardware assets
such as model, manufacturer, serial number, etc.
• Browse all hardware assets, or search and filter by multiple
criteria: processor model, processor cores, disk total size,
memory capacity
• Generate hardware inventory reports
Why?
Fewer tools, plus less effort to connect, and faster reaction times, reduced costs
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Pay-as-you-go Features - Backup
#CyberFit Academy
Full-image and file-level backups
Back up individual files or safeguard an entire
business with a few clicks
• File-level backup: Use this option to protect specific
data, reduce the backup size, and save storage space
• Full-image backup: Easily back up the entire system as
a single file, ensuring bare metal restores
• In the event of data disaster, you can easily restore all
information to new hardware
Why?
Ensure business continuity with flexible backup options and
avoid downtime and data loss
#CyberFit Academy
Flexible storage options
Meet data sovereignty or cost requirements
Other solutions
Cloud storage shoehorned us into a
situation where we had to
Acronis Cyber
Cloud Storage tell our customers they
couldn’t do certain things.
With Acronis we have
Three turnkey cloud Other public clouds Your own or third-party complete flexibility, and
storage options (via gateway)
cloud storage this allows us to offer the
best user experience.
#CyberFit Academy
Customizable Backup Settings
Set up a backup retention policy and Back up disks/volumes (with Perform backups according to the
apply it to a specific device or a number all information required for the desired schedule and frequency –
of machines. You can store backups operating system to boot), individual monthly, weekly, daily, hourly, or even
indefinitely, limit the number of files or folders, system state (for every 10 minutes. You can also limit the
backups per machine, or specify how Microsoft Windows systems), or ESXi number of simultaneously running
long to keep backup files. configuration. backups.
#CyberFit Academy
Provide Protection for 25+ Workload Types from
Infrastructure to SaaS apps
Windows Windows SQL Share Active Microsoft Google Linux SAP Scale
Azure Exchange Hyper-V Computing
Server PC Server Point Directory 365 Workspace Server HANA
Streamline delivery
Amazon VMware Oracle x86 Oracle Red Hat
EC2
Mac iPhone iPad Android
vSphere VM Server Database Virtualization of cyber protection
using just one
solution
#CyberFit Academy
Complete Microsoft 365 Protection
New Unlimited Acronis cloud storage for personal Microsoft 365 mailboxes
#CyberFit Academy
Google Workspace Backup
#CyberFit Academy
Best-In-Industry RTOs with Acronis Instant Restore
Acronis Instant Restore is patented technology that allows you to recover systems in seconds by
starting any Windows or Linux system (physical or virtual) directly from the backup storage on your
existing Microsoft Hyper-V or VMware vSphere ESXi host – without moving data.
How it works
• Attach virtual NFS Storage
•
•
Register VM
Apply Universal Restore
Benefits
Acronis Cyber • Start / Stop VM
Virtual
Protect Cloud • RTO in seconds
Machine
Create NFS
Virtual Share VMware ESXi / • Recover any virtual,
• Access virtual NFS Storage Microsoft Hyper-V physical or cloud server,
Acronis • Open VM Files
Virtual NFS Windows or Linux
Server
• Reduced network
Backup Image
Get Only (Works with backup locations on local consumption
Requested Data storage, network shares or cloud)
#CyberFit Academy
Acronis Universal Restore
Restore Windows and Linux systems to dissimilar
hardware
• Quick and easy system recovery to dissimilar hardware,
including bare-metal physical, virtual, or cloud
environments
• After recovering a disk-image as-is, Acronis Universal
Restore analyzes the new hardware platform and tunes
the Windows or Linux settings to match the new
requirements
Why?
Ensure quick, easy system migration with a few clicks, reduce RTOs
and minimize expensive downtime
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Pay-as-you-go Features – Files, Sync and Share
#CyberFit Academy
File, Sync and Share
An easy, efficient and secure file sync and share solution designed for service providers
iOS
Easy – Easy to sell, easy to deploy, and
easy for end customers to use
Android Service
Provider’s
Storage
Efficient – Turnkey solution for end-
Web
customer’s business across all platforms
(phones, tablets, Macs, Windows)
File, Sync Acronis
Mac
and Share Cloud
Secure – 100% control over data
PC location, management and privacy
Why?
Easy to sell and implement, File, Sync and Share expands your product portfolio and helps you quickly
attract new customers, realize incremental revenues and reduce customer churn.
#CyberFit Academy
File, Sync and Share for End Customers
Safely share files with co-workers or external contacts
Supports collaboration Maintains a history
using web, desktop, mobile of all transactions
#CyberFit Academy
File, Sync and Share for Service Providers
Sell more storage and services
#CyberFit Academy
File, Sync and Share – What’s Cool
User Safety Platforms
▪ Sync and access from any ▪ Browse and restore previous ▪ Full BYOD support
device (web, desktop, mobile versions of files ▪ Desktop and Laptop: PC, Mac
devices) ▪ Store files in a known, secure ▪ Mobile: iOS, Android
▪ Edit or comment in Office files location with anywhere access ▪ Web browser support
directly via the mobile app ▪ Restore deleted files
▪ Share files with co-workers or ▪ Gain in-transit and on-device
external contacts encryption
▪ Full support for MS Office
mobile app
• Easy to sell and deploy • Turnkey solution for • Customers and service • A decade in
service providers providers control where development
• Easy to use with second- files are stored
generation refined user • Advanced mobile, • Trusted by top Fortune
experience desktop and web clients • Compliance with data 500 companies globally
sovereignty laws
• Simple, unified pricing • Rich file-sharing and • 100Ks of users
with Acronis Backup collaboration features • Strong protection
• 9 data centers world-
Cloud for easy options for mobile
• Built-in PDF and wide
incremental revenue content
Microsoft Office editing
• Leverages Acronis
• Integration with
Storage with Acronis
Microsoft mobile
CloudRAID
applications
5
▪ Easy to install, configure, manage and use
▪ Integrated and optimized to work with Acronis products
And… Better than all others! ▪ Consistent user experience across all Acronis products
▪ Provisioning and performance automation
#CyberFit Academy
Section Summary
• File, Sync and Share -provides office and mobile users with safe
file access, sync, and share in an easy-to-use, complete, and
secure hosted cloud solution
• Easy to sell and implement, expands your product portfolio and
helps you quickly attract new customers, realize incremental
revenues and reduce customer churn.
• Safely share files with co-workers or external contacts
• It is efficient, secure, proven and provides consistent user
experience across all Acronis products and allows you to sell more
storage and services
#CyberFit Academy
Cyber Protect Cloud
Pay-as-you-go Features – Notary
#CyberFit Academy
Gain the Notary Advantage
• Ensure the integrity of business-critical data
Eliminates the need for third parties to guarantee the
immutability of data
• Achieve greater regulatory transparency
Reduces the cost and time needed to conduct an audit
• Reduce risks to data security
Adds an extra layer of protection, powered by a
mathematical proof
• Accelerate and automate the signature process
Execute every step of the document workflow, eliminate
manual tasks, and connect with the tools and systems
you’re already using
#CyberFit Academy
How Your Business Can Benefit From Data Notarization?
Construction
Why? Ensure the integrity of business critical data, achieve greater regulatory
transparency and reduce security risks
#CyberFit Academy
Notary
Ethereum blockchain Smooth integration via API
Comprehensive white-labeling
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced Packs – Overview
#CyberFit Academy
Add Advanced packs: Email Security, Security, Management,
Backup, Disaster Recovery, File Sync and Share
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Security
Improve security by detecting more threats, save on simplified security management, and
deliver better remediation with integrated cyber protection
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Management
Improve clients’ protection by keeping systems up-to-date
while decreasing the management burden and TCO
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Backup
Protect your clients’ data confidently with best-in-breed backup
enhanced with cyber protection
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Disaster Recovery
Protect clients with the flip of a switch
#CyberFit Academy
Cyber Protect Cloud
Advanced Packs – Backup
#CyberFit Academy
Backup enhanced with cyber protection
#CyberFit Academy
Continuous Data Protection
Gain safe and instant remediation without data
loss and close to zero RPOs
Define the list of critical apps for every device users are
working with most often. Acronis’ agent monitors every
change made in listed applications.
In case of a malware infection, restore data from the last
backup and apply the latest collected changes so no data
is lost.
• Ensures users won’t lose their work in-progress
• Control what is continuously backed up – Office
documents, financial forms, logs, graphic files, etc.
#CyberFit Academy
Cluster-aware backup of Microsoft SQL Server and
Microsoft Exchange Server
#CyberFit Academy
Application-aware SAP HANA backup
Physical server or VM
Acronis Agent
Log volume
for Linux
• You can then reliably recover SAP HANA servers to
bare metal, same or different hardware, migrate them
from a physical machine to a virtual machine and vice
versa – the SAP HANA data inside the backup will be Snapshots via SAP HANA
#CyberFit Academy
Data compliance reporting and Data Protection Map
#CyberFit Academy
Flexible Monitoring and Reporting
Why? Single pane of glass, faster operations, helps demonstrate MSP value and
simplify renewals
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced Packs – Disaster Recovery
#CyberFit Academy
Disaster Recovery with Cyber Protection
#CyberFit Academy
Who Needs Disaster
Recovery?
Companies that: Key industries:
• Rely on mission-critical
applications and data
• Are subject to regulated Financial Services Healthcare Legal
compliance requirements
• Are partners in stringent supply
chains
• Are located in disaster-prone areas
Transportation Business Services Manufacturing
• Lack technical resources
• Have heavy reliance on IT for
business functions
• Lack disaster recovery experience Construction
#CyberFit Academy
Make Disaster Recovery Painless
Easy extension of local networks to Test failover in isolated environments - Multiple points in time for
the cloud recovery site without business disruption recovery
#CyberFit Academy
Simplify Clients’ Disaster Recovery With a Turn-Key
SaaS Solution
ACRONIS DATA CENTER
Cloud recovery sites
All components out-of-
the-box
Hyper-V VMware
Administrato Windows Linux
server server
r VM VM VM VM VM VM
#CyberFit Academy
Disaster Recovery for Any Workload
Windows SQL Share Active Citrix Linux VMware Red Hat Linux
Exchange Hyper-V
Server Server Point Directory XenServer Server vSphere Virtualization KVM
#CyberFit Academy
Improve RTOs and Automate Disaster Recovery
with Runbooks
Why?
Ensures that all systems are recovered in the right order
#CyberFit Academy
Runbooks Improve RTOs and Automate Recovery
#CyberFit Academy
Automated failback for virtual machines
Achieve near-zero downtime
• Achieve best-in-class failback times and safeguard
your clients’ data by transferring it to the local site, while
the virtual machine in the cloud is still running. Receive
system progress updates and expected downtimes
estimates to effectively plan the failback process.
Why?
Achieve near-zero downtime, ensure business continuity,
and safeguard your clients’ data
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced Packs – Security
#CyberFit Academy
Cyber Protection with Advanced Security
#CyberFit Academy
Enhanced protection
Features added by Advanced Security: Expand your security services, earn more
• URL filtering and deliver better protection
#CyberFit Academy
Enhanced protection
Features in Acronis Cyber Protect Cloud: Cut remediation costs and ease the
• Backup and recovery process – simplify security investigations
with collected digital evidence
• Automatic ransomware rollback
• Instant Restore Protect the recovery process to prevent
• Restore to dissimilar hardware threat recurrence
#CyberFit Academy
Simplified management
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced Management Pack
#CyberFit Academy
Cyber Protection with Advanced Management
#CyberFit Academy
Comprehensive patch management
#CyberFit Academy
Increased service effectiveness
Features in Acronis Cyber Protect Cloud: Eliminate the risk from downtime due to
• Auto-discovery failed patches
and remote installation
Address vulnerabilities faster
#CyberFit Academy
Efficient maintenance planning
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced Pack- Email Security
#CyberFit Academy
Higher profitability
Unlock new revenue streams
#CyberFit Academy
Stronger protection
Protect your clients’ #1 threat vector from any attack
#CyberFit Academy
Stronger protection
Protect your clients’ #1 threat vector from any attack
#CyberFit Academy
Advanced Email Security: Stop any email-borne threat
Evasion techniques
#CyberFit Academy
Acronis Cyber Protect Cloud with
Advanced Email Security powered by
Improve client security by detecting any email-borne threat before it reaches end-users
#CyberFit Academy
Multi-layered protection
7 layers of protection against any email-borne threat
Threat Intelligence
Advanced
Email Security
Powered by
Perception Point
Anti- Static
phishing Detection
Why?
Block any email-borne threat before it reaches end-users
#CyberFit Academy
Unmatched detection speed
Get proactive and move from detection to prevention due near-zero delays
#CyberFit Academy
Enhance your Microsoft 365 native defenses
Excel where native Microsoft defenses fall short – prevent more threats and
leverage lightning-fast detection
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced Pack- File Sync and Share
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced File Sync and Share
Take full control over data location, management, and privacy with a superior file sync and share
service extended with fully remote notarization, verification, and online signing
#CyberFit Academy
Fully remote file notarization
Provide confidence that business data is authentic
#CyberFit Academy
File Notarization: Step by step
1. Select an existing file you need to notarize directly
from the file sync and share interface, or upload a
new one
2. Click on the Notarize file button
3. Wait until the file is notarized or check the status:
notarization in progress, notarization failed, current
version - notarized
4. Receive a certificate when notarization process is
finished
Best for:
▪ Interdepartmental communication request forms
▪ Media (video, image, recordings, etc.)
▪ Power of attorney
#CyberFit Academy
Embedded eSigning
Streamline and secure document workflows
Why?
Why? Eliminate manual tasks, reduce errors, and increase convenience for your clients
#CyberFit Academy
eSigning: Step by step
1. Select an existing file you need to eSign directly
from the file sync and share interface, or upload a
new one
2. Click on the Sign file button
3. Specify the signers by inserting their email
addresses
4. All participants authenticate themselves, then sign
the file online with embedded eSignatures
5. When all signatures are sent, the requestor
receives a certificate, proving the integrity of the
signatures
6. You can then get and email a link to an eSigned
document
#CyberFit Academy
Auditing and file verification
Enable trusted and independent file verification
Why?
Why? Automate the process with conclusive verification. No intermediary needed.
#CyberFit Academy
File verification:
Step by step
After a file is notarized, signed or both,
clients can verify it at any time. Two options
are possible:
1. File verification directly from the file sync
and share interface:
a. Select an existing file you need to
verify or upload a new one
b. Check the status of the document
2. File verification through the blockchain
ledger:
a. Copy the Transaction ID from the
notarization certificate
b. Paste it here:
https://ropsten.etherscan.io/
#CyberFit Academy
Drive transformation across industries
#CyberFit Academy
Section Summary
#CyberFit Academy
Add Advanced packs: Email Security, Security, Management,
Backup, Disaster Recovery, File Sync and Share
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Security
Improve security by detecting more threats, save on simplified security management, and
deliver better remediation with integrated cyber protection
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Management
Improve clients’ protection by keeping systems up-to-date
while decreasing the management burden and TCO
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Backup
Protect your clients’ data confidently with best-in-breed backup
enhanced with cyber protection
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Disaster Recovery
Protect clients with the flip of a switch
#CyberFit Academy
Understand Acronis Cyber Protect Cloud
Introducing Cloud Services
#CyberFit Academy
Section Modules - Part 2
#CyberFit Academy
Understand Cyber Protect Cloud
Software Components and
Types of Deployments
#CyberFit Academy
3-Tier Architecture
Acronis-Hosted
Hybrid
Management Management Portal SP-Hosted
Service Console
#CyberFit Academy
Cyber Protect Cloud Components
#CyberFit Academy
Cyber Protect Cloud Components
Ancillary
Components to enable additional
functionality
• Bootable media
• Cyber Protection monitor
• Command-line tool
• Acronis SharePoint Explorer
#CyberFit Academy
Cyber Files Components
For desktops
▪ Cyber Files Cloud PC client
▪ Cyber Files Cloud Mac client
▪ Web browser
#CyberFit Academy
Cyber Notary Components
#CyberFit Academy
Cyber Protect Cloud Deployment
Service
Cloud Management,
Provider
Storage & Compute Cloud Storage
PC PC
Network Network
Physical Physical
Servers
VMs Mac Storage Servers
VMs Mac Storage
#CyberFit Academy