Acronis backup для windows server 2019

Protect Your Windows Server With Acronis Cyber Backup

Acronis Cyber Backup is an easy to use, efficient and secure backup solution that protects your entire Windows Server environment. With just a few simple steps, you can back up data to the storage location of your choice and recover individual files, applications, or a complete system in mere seconds.

Comprehensive Windows Server Backup Solution

Defend your data on any Windows server — virtual, physical and cloud – with a backup solution that lets you store backups wherever it’s right for you: NAS, SAN, tapes, disks, Acronis Cloud, or any private or public cloud, such as Azure, AWS or Google.

Flexible, Granular Recovery for Your Windows Server

Save time and money backing up once and restoring only what you need. You can recover complete systems, separate disks, volumes, specific Microsoft application data (e.g. Microsoft Exchange mailboxes) or only mission-critical files and folders – all from a single backup.

Unmatched Scalability with Centralized Management

Streamline data protection tasks even as your business grows. System admins will be able to protect every bit of data using an intuitive, scalable solution that lets them manage small to large and diverse Windows server environments efficiently, using just one web-based console.

Application-Aware Backup Delivers Full Data Integrity

Perform reliable backups while ensuring application consistency. Acronis Cyber Backup utilizes Shadow Copy technology (also known as Volume Snapshot Service, Volume Shadow Copy Service or VSS) to capture the state of the application while manual or scheduled backup processes run.

Get Acronis Cyber Backup

More platforms to protect

More Features for Efficient Windows Server Backup

Reduce costs and time spent learning and implementing the solution. A simple, modern, web-based interface makes setting up and managing your backups easy.

Recieve all the backup status information however you like – advanced reporting and status-monitoring capabilities include customizable widgets, reports, notifications and critical event alerts.

Stop spending time and money on reinstallations and setups. You can enable system recovery to various physical or virtual platforms — or even to new, dissimilar hardware — with just a few clicks.

Safeguard your data from unauthorized modification, encryption and attacks from ransomware like Petya, WannaCry or Osiris with Acronis’ AI-based ransomware technology.

Protect your data with Acronis Cyber Backup by utilizing multi-level encryption that includes per-archive AES-256 encryption and high-grade disk-level encryption in Acronis data centers.

Shield your data from tampering with an extra layer of protection. Powered by mathematical proof, Acronis Notary’s blockchain-based technology ensures data integrity.

Protect all modern and most legacy systems – from 2003, to the popular Windows Server 2012, and current Windows Server 2019.

Читайте также:  Windows rdp время сессии

Avoid performing time-consuming full recoveries by running any physical or virtual Windows system directly from backup as VMware or Hyper-V Virtual Machine (VM).

Manage remote offices, branch offices and departments easily with the ability to oversee, delegate, and establish separate tenants for multiple administrators.

Award Winning Backup Solution

With Acronis, we have significantly improved our Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). We find Acronis is the best solution to protect our data and support our disaster recovery plan.

The speed with which we can now backup and restore business data was a big selling point for us. Acronis Backup gives us confidence because we know our data backups are complete.

Looking for Help?

When you create your first backup plan, simply select the machines that you want to back up and the software displays a new backup plan template. Here, you can select what to back up, where to back up to, the backup schedule that you want, how long to keep the backup, whether you want the backup encrypted, and whether you want to convert the backup to a VM. For more information on this topic, refer to the Acronis Knowledge Base.

You can recover files by using Acronis’ web interface or File Explorer. With the web interface, simply select the machine that contains the data you want to recover and the recovery point. You can then browse to the required folder or use search to obtain the list of the required files and folders that you want to recover. You can use one or more wildcard characters (* and ?). Once you click Recover, you can select the target machine and choose to overwrite an existing file if it is older, or not to overwrite an existing file. For more information on how to recover files using the web interface, refer to the Acronis Knowledge Base.

You can use File Explorer to browse the backup, select the files/folders you need and copy them to any folder on the file system. If the backup is encrypted, you will need to enter the encryption password. For more information on how to extract files from a local backup, refer to the Acronis Knowledge Base.

Yes, there is. Acronis Cyber Backup 12.5 includes Active Protection, which monitors processes running on your Windows servers. When a third-party process tries to encrypt files, Active Protection generates an alert and performs additional actions, if those are specified by the configuration.

In addition to protecting files, Active Protection prevents unauthorized changes to Acronis Cyber Backup 12.5 processes, registry records, executable and configuration files, and Master Boot Records of the protected machines.

To identify malicious processes, Active Protection uses behavioral heuristics. Active Protection compares the chain of actions performed by a process with the chains of events recorded in the database of malicious behavior patterns. This approach enables Active Protection to detect new malware by its typical behavior. For more information on Acronis Active Protection, refer to the Acronis Knowledge Base.

If you have any difficulties, you can find all relevant product materials in our FAQs, Knowledge Base, and video tutorials. You are also welcome to post questions on our discussion boards.

Читайте также:  Как полностью удалить android studio windows 10

Customers with active product maintenance or subscriptions can access 24/7 technical support. Follow the instructions on the Technical Support Site to get prompt support by phone, chat or email.

Protect Your Windows Server With Acronis Cyber Backup

Acronis Cyber Backup is an easy to use, efficient and secure backup solution that protects your entire Windows Server environment. With just a few simple steps, you can back up data to the storage location of your choice and recover individual files, applications, or a complete system in mere seconds.

Comprehensive Windows Server Backup Solution

Defend your data on any Windows server — virtual, physical and cloud – with a backup solution that lets you store backups wherever it’s right for you: NAS, SAN, tapes, disks, Acronis Cloud, or any private or public cloud, such as Azure, AWS or Google.

Flexible, Granular Recovery for Your Windows Server

Save time and money backing up once and restoring only what you need. You can recover complete systems, separate disks, volumes, specific Microsoft application data (e.g. Microsoft Exchange mailboxes) or only mission-critical files and folders – all from a single backup.

Unmatched Scalability with Centralized Management

Streamline data protection tasks even as your business grows. System admins will be able to protect every bit of data using an intuitive, scalable solution that lets them manage small to large and diverse Windows server environments efficiently, using just one web-based console.

Application-Aware Backup Delivers Full Data Integrity

Perform reliable backups while ensuring application consistency. Acronis Cyber Backup utilizes Shadow Copy technology (also known as Volume Snapshot Service, Volume Shadow Copy Service or VSS) to capture the state of the application while manual or scheduled backup processes run.

Get Acronis Cyber Backup

More platforms to protect

More Features for Efficient Windows Server Backup

Reduce costs and time spent learning and implementing the solution. A simple, modern, web-based interface makes setting up and managing your backups easy.

Recieve all the backup status information however you like – advanced reporting and status-monitoring capabilities include customizable widgets, reports, notifications and critical event alerts.

Stop spending time and money on reinstallations and setups. You can enable system recovery to various physical or virtual platforms — or even to new, dissimilar hardware — with just a few clicks.

Safeguard your data from unauthorized modification, encryption and attacks from ransomware like Petya, WannaCry or Osiris with Acronis’ AI-based ransomware technology.

Protect your data with Acronis Cyber Backup by utilizing multi-level encryption that includes per-archive AES-256 encryption and high-grade disk-level encryption in Acronis data centers.

Shield your data from tampering with an extra layer of protection. Powered by mathematical proof, Acronis Notary’s blockchain-based technology ensures data integrity.

Protect all modern and most legacy systems – from 2003, to the popular Windows Server 2012, and current Windows Server 2019.

Avoid performing time-consuming full recoveries by running any physical or virtual Windows system directly from backup as VMware or Hyper-V Virtual Machine (VM).

Manage remote offices, branch offices and departments easily with the ability to oversee, delegate, and establish separate tenants for multiple administrators.

Читайте также:  Что такое ловушки windows

Award Winning Backup Solution

With Acronis, we have significantly improved our Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). We find Acronis is the best solution to protect our data and support our disaster recovery plan.

The speed with which we can now backup and restore business data was a big selling point for us. Acronis Backup gives us confidence because we know our data backups are complete.

Looking for Help?

When you create your first backup plan, simply select the machines that you want to back up and the software displays a new backup plan template. Here, you can select what to back up, where to back up to, the backup schedule that you want, how long to keep the backup, whether you want the backup encrypted, and whether you want to convert the backup to a VM. For more information on this topic, refer to the Acronis Knowledge Base.

You can recover files by using Acronis’ web interface or File Explorer. With the web interface, simply select the machine that contains the data you want to recover and the recovery point. You can then browse to the required folder or use search to obtain the list of the required files and folders that you want to recover. You can use one or more wildcard characters (* and ?). Once you click Recover, you can select the target machine and choose to overwrite an existing file if it is older, or not to overwrite an existing file. For more information on how to recover files using the web interface, refer to the Acronis Knowledge Base.

You can use File Explorer to browse the backup, select the files/folders you need and copy them to any folder on the file system. If the backup is encrypted, you will need to enter the encryption password. For more information on how to extract files from a local backup, refer to the Acronis Knowledge Base.

Yes, there is. Acronis Cyber Backup 12.5 includes Active Protection, which monitors processes running on your Windows servers. When a third-party process tries to encrypt files, Active Protection generates an alert and performs additional actions, if those are specified by the configuration.

In addition to protecting files, Active Protection prevents unauthorized changes to Acronis Cyber Backup 12.5 processes, registry records, executable and configuration files, and Master Boot Records of the protected machines.

To identify malicious processes, Active Protection uses behavioral heuristics. Active Protection compares the chain of actions performed by a process with the chains of events recorded in the database of malicious behavior patterns. This approach enables Active Protection to detect new malware by its typical behavior. For more information on Acronis Active Protection, refer to the Acronis Knowledge Base.

If you have any difficulties, you can find all relevant product materials in our FAQs, Knowledge Base, and video tutorials. You are also welcome to post questions on our discussion boards.

Customers with active product maintenance or subscriptions can access 24/7 technical support. Follow the instructions on the Technical Support Site to get prompt support by phone, chat or email.

Оцените статью