Acronis Cyber Protect Home Office

Acronis Cyber Protect Home Office (previously known as Acronis True Image) is a software package produced by Acronis International GmbH that aims to protect the system from ransomware and allows users to backup and restore files or entire systems from a backup archive, which was previously created using the software.[3][4] Since 2020, Acronis Cyber Protect Home Office includes malware and Zoom protection (though the ability to use such features depends on the subscription purchased).[5][6] The software is used by technicians to deploy operating systems to computers and by academics to help restore computers following analysis of how viruses infect computers.[7]

Acronis Cyber Protect Home Office
Original author(s)Acronis
Stable release
  • Build #39703 (Windows)
  • Build #39703 (Mac)
/ October 25, 2021 (2021-10-25)[1]
Operating system
PlatformIA-32 and x86-64
Available inEnglish, French, German, Japanese, Italian, Spanish, Russian, Korean, Chinese Traditional, Chinese Simplified, Indonesian, Portuguese, Dutch
TypeData protection and backup software
LicenseProprietary software
Websitewww.acronis.com

Features

Backup

Acronis can create two types of backup archives: (1) file backups (which consist of user-specified files and directories (but not the metadata of the disk or partition)) and (2) full system images (which consist of files, directories and disk metadata). The software can create full disk backup archives of several file systems including: NTFS (Windows); FAT32 (Windows 9x and removable media); Macintoish systems (HFS+ and APFS) and Linux systems (ext2, ext3, ext4; ReiserFS, and Linux Swap).[8][9] Acronis falls back to using sector-by-sector copy when a non-supported filesystem is backed up.[10] Acronis has an agent that can be installed within the operating system, which allows backups to be performed in the background while the computer is being used.

Local backup

Acronis can back up a computer, selected disks or selected files to a local location specified by the user. The software can perform full, differential and incremental backups. Full creates a new backup archive every time and backs up everything specified by the user. Differential backups only backup the changes made since the latest full backup and incremental only backs up the changes made since the last incremental backup. Incremental backups are a chain and loss of any one of the incremental backups renders the entire backup useless.[11] Prior to Acronis True Image 2020, incremental backups were stored individually in separate tib files which made them difficult to manage. Since 2020, Acronis stores backups in a single archive file with a tibx extension.[12]

Cloud backup (subscription users only)

Users can specify to store their backup archives in Acronis's data centers around the globe. Users who subscribe to the software for a year rather than buying a copy of the software receive cloud storage which can be used to store cloud-based backups. As of 2019, premium users receive 1 terabyte of cloud space.[13]

Recovery and restoration

Acronis Cyber Protect Home Office allows users to restore files from a full disk or a file-based archive using either a preinstallation media with Acronis on it or from within the user interface of the program. If protected system files are restored (e.g. restoring an entire system to an earlier state), the system restarts to perform the recovery operation.

Users may also mount a backup archive, which allows users to browse the contents of the archive in a manner similar to browsing any other disk drive.

Disk cloning

The software can clone the contents from one physical storage device (e.g. SSD, HDD or NVMe) to another drive.[14] The drive does not need to be formatted before data can be cloned to it and may be smaller in size than the source disk but the amount of space on the disk must be at least the size of the amount of data being cloned.[15] Cloning aims to preserve the disk metadata. For example, disk cloning is useful for installing a larger disk in a computer or replacing a hard disk drive with a solid state drive. Crucial recommends using a preinstallation media of Acronis to perform the clone to avoid possible cloning failures due to partitions being inaccessible.[14]

Some hard disk manufacturers including Western Digital, Intel and Seagate provide customized variants of Acronis True Image with their drives that allows the user to clone their existing disk to another disk, typically of the same manufacturer.[16][17][18]

Reverting changes

Acronis allows users to protect selected disk drives from unintended changes and revert them if the change is undesired. This can be used instead of virtual machines to create stable and secure environments that can be quickly reverted from within the software.[19][7]

Limitations

Possible incompatibility between versions

Prior to Acronis True Image 2020, the backup archives were stored using a proprietary format with a .tib file extension on Windows systems.[12] Due to this, compatibility is not guaranteed between products that are not within the same version.[20] Older versions of the software cannot read backup archives created using a newer version.

Unwanted advertisements

One limitation of the software is the inability to disable taskbar popups marketing upgrades and new products from the developer.[21] The notification will grab focus (i.e. will interrupt a full screen game or movie) and each advertisement must be disabled individually. The company currently offers no way to permanently turn off these advertisements.[22]

Backup management

Managing backup archives created using the Acronis Cyber Protect Home Office software can be challenging for expert users who want to use it in conjunction with other software to manage their backups.[11] For example, the software does not recognize when backups have been deleted using external software.

Uses

Use in academia

Acronis Cyber Protect Home Office is used by cybersecurity researchers to conduct analysis of computer viruses because it is faster than using alternative techniques such as virtualization.[7]

Use by technicians

Acronis Cyber Protect Home Office is used by computer technicians to deploy a common system image to a group of computers.[19][23] For example, the preinstallation media of Acronis allows the user to create full disk backup archives of a given system without needing to install the agent on the system being cloned.

History

Acronis began in 2001 as a division of SWsoft[24] and in 2003 became a separate company and continued to release the Acronis True Image software. The True Image name was applied to all platforms from Home to Corporate until 2010, when Acronis business backup software was renamed, with True Image being the home version. In 2020, security features were integrated into the product and Acronis argued that a name change was necessary to reflect these changes.[3]

Acronis True Image (2003–2021)

Prior to Acronis True Image 9, their business-focused product Acronis Backup or Acronis Cyber Protect shared the same name as their home product with the minor exception that the business versions were called Acronis True Image Server. Later server backup software was renamed "Acronis Backup".

Versions

The table summarizes the key changes between versions of Acronis.

VersionYearNotes
6.02002Supports creation of disk images on recordable DVD media and external USB drives.
7.02003Includes a wizard-driven interface. Supports disk cloning that directly duplicates the contents of a hard drive to another.
8.02004Supports backing up to a network location and restoring individual files from a disk image.
9.02005The last version to support Windows 98 and Windows ME. Secure Zone allows backing up to a hidden drive partition. Startup Recovery Manager helps restore during boot time without a separate boot disk.
10.02006Backs up and restores directly from network shares and FTP servers. Can save archives of Microsoft Outlook and Outlook Express as well as Windows Address Book.
11.02007File Shredder helps permanently destroy files. Try&Decide helps set up a sandbox in which untrusted programs can safely run without the risk of permanently changing or damaging the system.
12/20092009One-click Backup backs up a computer using default settings, without asking any question other than backup destination.
13/20102010Supports Virtual Hard Disk (VHD) and Windows 7. Nonstop Backup provides continuous data protection. Online Backup backs up data to an off-site location on the Internet. Version 13 home available as free WD Edition (see partnerships below)
14/20112010Supports USB 3.0, integration with Windows 7 and predefined backup schemes.
15/20122011Supports File synchronization, Network-attached storage, Nonstop Backup over network and integrated online backup.[25]
16/20132012Adds mobile access and Windows 8 support (except UEFI Secure Boot).[26] Version 16 Home available as free WD Edition AND Seagate DiskWizard (see partnerships below)
17/20142013Bug fixes, minor changes. UEFI Secure Boot support was added in this version.
18/20152014Radically changed the UI and removed many features including backup file conversion from the .tib format to .vhd and vice versa, user backup file management (deletion of specified existing backups when destination has insufficient space for new backup), user-driven consolidation of incremental backups, import and export of backup settings, and the ability to sort backups by date.[27] Version 18 Home available as free WD Edition (see partnerships below)
19/20162015Added support for Windows 10. Removed support for Windows Vista.
20/20172016Added active ransomware countermeasures, blockchain-based notary services, and electronic signing (premium version only).
21/20182017Added cloning of active disks and continuous backups.
22/20192018
23/20202019Changed suffix of backup files to .tibx. This likely changed the internal file format as well.
24/20212020Added integrated advanced anti-malware features including real-time protection, vulnerability assessment, anti-virus scans, web filtering, and videoconference app protection.

Similar products

Acronis also produce a series of similar backup solutions for businesses including:

  • Acronis Cyber Protect (previously called Acronis Backup and Acronis True Image Server)
  • Acronis Cyber Cloud

See also

References

  1. "Product Updates". www.acronis.com. Retrieved 22 November 2021.
  2. Windows 11 Support in Acronis Products | Knowledge Base. https://kb.acronis.com/content/69259. Accessed 22 Nov. 2021.
  3. “Acronis True Image Is Now Acronis Cyber Protect Home Office.” Acronis, https://www.acronis.com/en-us/blog/posts/acronis-true-image-is-now-acronis-cyber-protect-home-office/. Accessed 22 Nov. 2021.
  4. Zhidkov, D. A., Kuligina, N. O., & Pavlycheva, T. N. (2020). METHODS AND PROBLEMS OF UPDATING THE MICROSOFT WINDOWS 7 OPERATING SYSTEM TO MICROSOFT WINDOWS 10 IN THE ENERGY ENTERPRISE. European Journal of Natural History, (6), 30-34.
  5. "Acronis Cyber Protect Home Office Review." Ben Moore and Neil J. Rubenking,PCMag, https://www.pcmag.com/reviews/acronis-cyber-protect-home-office. Accessed 22 Nov. 2021.
  6. Zoom Meetings Cybersecurity Risks - Secure Your Work-From-Home Employees. https://www.acronis.com/en-sg/articles/zoom/. Accessed 22 Nov. 2021.
  7. Warner, Gary, et al. "Investigative techniques of n-way vendor agreement and network analysis demonstrated with fake antivirus." (2014).
  8. How to Back Up a Hard Drive and Restore Your Computer. https://www.acronis.com/en-sg/articles/backup-hard-drive/. Accessed 22 Nov. 2021.
  9. Bate, Madeleine. "Acronis True Image Review 2021: Is the High Cost Worth It?" Website Planet, WebsitePlanet, 10 May 2021, https://www.websiteplanet.com/cloud-storage/acronis/.
  10. "Creating a Sector-By-Sector Backup with Acronis Products". Acronis Knowledge Base. Retrieved 15 June 2017.
  11. Stone, W. Ross. “Changing Backup Software [From the Screen of Stone].” IEEE Antennas and Propagation Magazine, vol. 57, no. 6, Dec. 2015, pp. 178–79. IEEE Xplore, https://doi.org/10.1109/MAP.2015.2480085.
  12. Acronis True Image 2020 and 2021: Tib and Tibx Backup Format Usage | Knowledge Base. https://kb.acronis.com/content/63441. Accessed 22 Nov. 2021.
  13. Kholopov, V. A., Kurnasov, E. V., Soklakov, F. V., Korolev, E. I., Untura, M. M., & Bolbakov, R. G. (2019). A METHOD FOR ENSURING THE SECURE TRANSFER AND STORAGE OF BACKUP USER DATA AND INFORMATION FROM INTERNET OF THINGS DEVICES.
  14. "Clone Almost Finishes but Then Fails at the End | Crucial.Com." Crucial, https://www.crucial.com/support/articles-faq-ssd/clone-almost-finishes-fails-at-end. Accessed 22 Nov. 2021.
  15. Holzman, Carey. "How To Upgrade A Hard Disk Drive." CRN, 23 May 2005, https://www.crn.com/features/channel-programs/163105249/how-to-upgrade-a-hard-disk-drive.htm.
  16. "WD Support". Support.wdc.com. 2012-02-05. Archived from the original on 2014-11-18. Retrieved 2014-11-24.
  17. "Download Intel® Data Migration Software". Intel. 27 May 2016. Archived from the original on 7 August 2019. Retrieved 16 June 2017.
  18. "Seagate DiscWizard". Acronis.com. Retrieved 2016-02-20.
  19. Alsagoff, S. N. (2010, June). Malware self protection mechanism issues in conducting malware behaviour analysis in a virtual environment as compared to a real environment. In 2010 International Symposium on Information Technology (Vol. 3, pp. 1326-1331). IEEE.
  20. Backup Archive Compatibility across Different Product Versions | Knowledge Base. https://kb.acronis.com/tib. Accessed 22 Nov. 2021.
  21. "How do I stop these constant "Purchase 2015 Upgrade" prompts?". forum.acronis.com. September 28, 2014. Retrieved November 28, 2019.
  22. "Acronis True Image: How To Disable Notifications in Notification Area". acronis.com. November 28, 2019. Retrieved November 28, 2019.
  23. "Acronis Cyber Protect Home Office Review." (2020) Jason Clarke, PCMag, https://www.pcmag.com/reviews/acronis-cyber-protect-home-office. Accessed 22 Nov. 2021.
  24. Philipson, Graeme (4 December 2014). "Acronis Head Signals Cloud Future". Cloud(Australia:iTWire). Archived from the original on 13 February 2015.
  25. "Release Notes for Acronis True Image Home 2012". Acronis, Inc. Retrieved 2011-10-28.
  26. Collins, Barry (2013-01-15). "Windows 8 Secure Boot snags Acronis True Image". Dennis Publishing. Retrieved 2013-01-16.
  27. "65498: Summary of Features Removed in ATI2015". acronis.com. 18 September 2014. Retrieved 7 February 2015.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.