Acronis Cyber Protect Home Office

Last updated
Acronis Cyber Protect Home Office
Original author(s) Acronis
Stable release
  • Build #39703 (Windows)
  • Build #39703 (Mac)
/ October 25, 2021;2 years ago (2021-10-25) [1]
Operating system
Platform IA-32 and x86-64
Available inEnglish, French, German, Japanese, Italian, Spanish, Russian, Korean, Chinese Traditional, Chinese Simplified, Indonesian, Portuguese, Dutch
Type Data protection and backup software
License Proprietary software
Website www.acronis.com

Acronis Cyber Protect Home Office (previously known as Acronis True Image) is a software package produced by Acronis International GmbH that aims to protect the system from ransomware and allows users to backup and restore files or entire systems from a backup archive, which was previously created using the software. [3] [4] Since 2020, Acronis Cyber Protect Home Office includes malware and Zoom protection (though the ability to use such features depends on the subscription purchased). [5] [6] The software is used by technicians to deploy operating systems to computers and by academics to help restore computers following analysis of how viruses infect computers. [7]

Contents

Features

Backup

Acronis can create two types of backup archives: (1) file backups (which consist of user-specified files and directories (but not the metadata of the disk or partition)) and (2) full system images (which consist of files, directories and disk metadata). The software can create full disk backup archives of several file systems including: NTFS (Windows); FAT32 (Windows 9x and removable media); Macintosh systems (HFS+ and APFS) and Linux systems (ext2, ext3, ext4; ReiserFS, and Linux Swap). [8] [9] Acronis falls back to using sector-by-sector copy when a non-supported filesystem is backed up. [10] Acronis has an agent that can be installed within the operating system, which allows backups to be performed in the background while the computer is being used.

Local backup

Acronis can back up a computer, selected disks or selected files to a local location specified by the user. The software can perform full, differential and incremental backups. Full creates a new backup archive every time and backs up everything specified by the user. Differential backups only backup the changes made since the latest full backup and incremental only backs up the changes made since the last incremental backup. Incremental backups are a chain and loss of any one of the incremental backups renders the entire backup useless. [11] Prior to Acronis True Image 2020, incremental backups were stored individually in separate tib files which made them difficult to manage. Since 2020, Acronis stores backups in a single archive file with a tibx extension. [12]

Cloud backup (subscription users only)

Users can specify to store their backup archives in Acronis's data centers around the globe. Users who subscribe to the software for a year rather than buying a copy of the software receive cloud storage which can be used to store cloud-based backups. As of 2019, premium users receive 1 terabyte of cloud space. [13]

Recovery and restoration

Acronis Cyber Protect Home Office allows users to restore files from a full disk or a file-based archive using either a preinstallation media with Acronis on it or from within the user interface of the program. If protected system files are restored (e.g. restoring an entire system to an earlier state), the system restarts to perform the recovery operation.

Users may also mount a backup archive, which allows users to browse the contents of the archive in a manner similar to browsing any other disk drive.

Disk cloning

The software can clone the contents from one physical storage device (e.g. SSD, HDD or NVMe) to another drive. [14] The drive does not need to be formatted before data can be cloned to it and may be smaller in size than the source disk but the amount of space on the disk must be at least the size of the amount of data being cloned. [15] Cloning aims to preserve the disk metadata. For example, disk cloning is useful for installing a larger disk in a computer or replacing a hard disk drive with a solid state drive. Crucial recommends using a preinstallation media of Acronis to perform the clone to avoid possible cloning failures due to partitions being inaccessible. [14]

Some hard disk manufacturers including Western Digital, Intel and Seagate provide customized variants of Acronis True Image with their drives that allows the user to clone their existing disk to another disk, typically of the same manufacturer. [16] [17] [18]

Reverting changes

Acronis allows users to protect selected disk drives from unintended changes and revert them if the change is undesired. This can be used instead of virtual machines to create stable and secure environments that can be quickly reverted from within the software. [19] [7]

Limitations

Possible incompatibility between versions

Prior to Acronis True Image 2020, the backup archives were stored using a proprietary format with a .tib file extension on Windows systems. [12] Due to this, compatibility is not guaranteed between products that are not within the same version. [20] Older versions of the software cannot read backup archives created using a newer version.

Unwanted advertisements

One limitation of the software is the inability to disable taskbar popups marketing upgrades and new products from the developer. [21] The notification will grab focus (i.e. will interrupt a full screen game or movie) and each advertisement must be disabled individually. The company currently offers no way to permanently turn off these advertisements. [22]

Backup management

Managing backup archives created using the Acronis Cyber Protect Home Office software can be challenging for expert users who want to use it in conjunction with other software to manage their backups. [11] For example, the software does not recognize when backups have been deleted using external software.

Uses

Use in academia

Acronis Cyber Protect Home Office is used by cybersecurity researchers to conduct analysis of computer viruses because it is faster than using alternative techniques such as virtualization. [7]

Use by technicians

Acronis Cyber Protect Home Office is used by computer technicians to deploy a common system image to a group of computers. [19] [5] For example, the preinstallation media of Acronis allows the user to create full disk backup archives of a given system without needing to install the agent on the system being cloned.

History

Acronis began in 2001 as a division of SWsoft [23] and in 2003 became a separate company and continued to release the Acronis True Image software. The True Image name was applied to all platforms from Home to Corporate until 2010, when Acronis business backup software was renamed, with True Image being the home version. In 2020, security features were integrated into the product and Acronis argued that a name change was necessary to reflect these changes. [3]

Acronis True Image (2003–2021)

Prior to Acronis True Image 9, their business-focused product Acronis Backup or Acronis Cyber Protect shared the same name as their home product with the minor exception that the business versions were called Acronis True Image Server. Later server backup software was renamed "Acronis Backup".

Versions

The table summarizes the key changes between versions of Acronis.

VersionYearNotes
6.02002Supports creation of disk images on recordable DVD media and external USB drives.
7.02003Includes a wizard-driven interface. Supports disk cloning that directly duplicates the contents of a hard drive to another.
8.02004Supports backing up to a network location and restoring individual files from a disk image.
9.02005The last version to support Windows 98 and Windows ME. Secure Zone allows backing up to a hidden drive partition. Startup Recovery Manager helps restore during boot time without a separate boot disk.
10.02006Backs up and restores directly from network shares and FTP servers. Can save archives of Microsoft Outlook and Outlook Express as well as Windows Address Book.
11.02007File Shredder helps permanently destroy files. Try&Decide helps set up a sandbox in which untrusted programs can safely run without the risk of permanently changing or damaging the system.
12/20092009One-click Backup backs up a computer using default settings, without asking any question other than backup destination.
13/20102010Supports Virtual Hard Disk (VHD) and Windows 7. Nonstop Backup provides continuous data protection. Online Backup backs up data to an off-site location on the Internet. Version 13 home available as free WD Edition (see partnerships below)
14/20112010Supports USB 3.0, integration with Windows 7 and predefined backup schemes.
15/20122011Supports File synchronization, Network-attached storage, Nonstop Backup over network and integrated online backup. [24]
16/20132012Adds mobile access and Windows 8 support (except UEFI Secure Boot). [25] Version 16 Home available as free WD Edition AND Seagate DiskWizard (see partnerships below)
17/20142013Bug fixes, minor changes. UEFI Secure Boot support was added in this version.
18/20152014Radically changed the UI and removed many features including backup file conversion from the .tib format to .vhd and vice versa, user backup file management (deletion of specified existing backups when destination has insufficient space for new backup), user-driven consolidation of incremental backups, import and export of backup settings, and the ability to sort backups by date. [26] Version 18 Home available as free WD Edition (see partnerships below)
19/20162015Added support for Windows 10. Removed support for Windows Vista.
20/20172016Added active ransomware countermeasures, blockchain-based notary services, and electronic signing (premium version only).
21/20182017Added cloning of active disks and continuous backups.
22/20192018
23/20202019Changed suffix of backup files to .tibx. This likely changed the internal file format as well.
24/20212020Added integrated advanced anti-malware features including real-time protection, vulnerability assessment, anti-virus scans, web filtering, and videoconference app protection.

Similar products

Acronis also produce a series of similar backup solutions for businesses including:

See also

Related Research Articles

A disk image is a snapshot of a storage device's structure and data typically stored in one or more computer files on another storage device.

In information technology, a backup, or data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event. The verb form, referring to the process of doing so, is "back up", whereas the noun and adjective form is "backup". Backups can be used to recover data after its loss from data deletion or corruption, or to recover data from an earlier time. Backups provide a simple form of disaster recovery; however not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server.

Disk cloning is the process of duplicating all data on a digital storage drive, such as a hard disk or solid state drive, using hardware or software techniques. Unlike file copying, disk cloning also duplicates the filesystems, partitions, drive meta data and slack space on the drive. Common reasons for cloning a drive include; data backup and recovery; duplicating a computer's configuration for mass deployment and for preserving data for digital forensics purposes. Drive cloning can be used in conjunction with drive imaging where the cloned data is saved to one or more files on another drive rather than copied directly to another drive.

<span class="mw-page-title-main">Ghost (disk utility)</span> Disk cloning and backup tool

GHOST, now Symantec™ GHOST Solution Suite (GSS) for enterprise, is a disk cloning and backup tool originally developed by Murray Haszard in 1995 for Binary Research. The technology was acquired in 1998 by Symantec.

Acronis International GmbH, simply referred to as Acronis, is a Swiss technology company with its corporate headquarters in Schaffhausen, Switzerland and global headquarters in Singapore. Acronis develops on-premises and cloud software which integrate backup, disaster recovery, cybersecurity, and endpoint management. Acronis has 15 offices worldwide. Its R&D centers, Acronis Labs, are based in Bulgaria, the United States, Italy, Serbia and Singapore. Acronis has 54 cloud data centers around the world, including the United States, France, Singapore, Japan, and Germany.

In computing, data recovery is a process of retrieving deleted, inaccessible, lost, corrupted, damaged, or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a usual way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).

Continuous data protection (CDP), also called continuous backup or real-time backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. In its true form it allows the user or administrator to restore data to any point in time. The technique was patented by British entrepreneur Pete Malcolm in 1989 as "a backup system in which a copy [editor's emphasis] of every change made to a storage medium is recorded as the change occurs [editor's emphasis]."

Veritas Backup Exec is a data protection software product designed for customers with mixed physical and virtual environments, and who are moving to public cloud services. Supported platforms include VMware and Hyper-V virtualization, Windows and Linux operating systems, Amazon S3, Microsoft Azure and Google Cloud Storage, among others. All management and configuration operations are performed with a single user interface. Backup Exec also provides integrated deduplication, replication, and disaster recovery capabilities and helps to manage multiple backup servers or multi-drive tape loaders.

<span class="mw-page-title-main">Recovery disc</span> Media intended to restore the operating system

The terms Recovery disc, Rescue Disk/Disc and Emergency Disk all refer to a capability to boot from an external device, possibly a thumb drive, that includes a self-running operating system: the ability to be a boot disk/Disc that runs independent of an internal hard drive that may be failing, or for some other reason is not the operating system to be run.

<span class="mw-page-title-main">Windows Home Server</span> Home server operating system by Microsoft released in 2007

Windows Home Server is a home server operating system from Microsoft. It was announced on 7 January 2007 at the Consumer Electronics Show by Bill Gates, released to manufacturing on 16 July 2007 and officially released on 4 November 2007.

NTBackup is the first built-in backup utility of the Windows NT family. It was introduced with Windows NT 3.51. NTBackup comprises a GUI (wizard-style) and a command-line utility to create, customize, and manage backups. It takes advantage of Shadow Copy and Task Scheduler. NTBackup stores backups in the BKF file format on external sources, e.g., floppy disks, hard drives, tape drives, and Zip drives. When used with tape drives, NTBackup uses the Microsoft Tape Format (MTF), which is also used by BackupAssist, Backup Exec, and Veeam Backup & Replication and is compatible with BKF.

Acronis Secure Zone is a hard disk partition type created and used by Acronis True Image as a backup storage target.

<span class="mw-page-title-main">Backup and Restore</span> Primary backup component of Windows Vista and Windows 7

Backup and Restore is the primary backup component of Windows Vista and Windows 7. It can create file and folder backups, as well as system images backups, to be used for recovery in the event of data corruption, hard disk drive failure, or malware infection. It replaces NTBackup, which has been part of Windows since Windows NT 3.51. Unlike its predecessor, it supports CDs, DVDs, and Blu-rays discs as backup media.

VHD and its successor VHDX are file formats representing a virtual hard disk drive (HDD). They may contain what is found on a physical HDD, such as disk partitions and a file system, which in turn can contain files and folders. They are typically used as the hard disk of a virtual machine, are built into modern versions of Windows, and are the native file format for Microsoft's hypervisor, Hyper-V.

Disk cloning software facilitates a disk cloning operation by using software techniques to copy data from a source to a destination drive or to a disk image.

The subject of computer backups is rife with jargon and highly specialized terminology. This page is a glossary of backup terms that aims to clarify the meaning of such jargon and terminology.

<span class="mw-page-title-main">Clonezilla</span> Drive cloning software

Clonezilla is an open-source suite of disk cloning, disk imaging and system deployment utilities. Clonezilla Server Edition uses multicast technologies to deploy a single image file to a group of computers on a local area network. Clonezilla was designed by Steven Shiau and developed by the NCHC Free Software Labs in Taiwan.

This is a comparison of online backup services.

Macrium Reflect is a backup utility for Microsoft Windows developed by Paramount Software UK Ltd in 2006. It creates disk images and file backup archives using Microsoft Volume Shadow Copy Service to ensure 'point in time' data accuracy. Macrium Reflect can back up whole partitions or individual files and folders into a single compressed, mountable archive file, which can be used to restore exact images of the partitions on the same hard disk for disaster recovery, or a new hard disk for data migration.

<span class="mw-page-title-main">MSP360</span> Application service provider

MSP360, formerly CloudBerry Lab, is a software and application service provider company that develops online backup, remote desktop and file management products integrated with more than 20 cloud storage providers.

References

  1. "Product Updates". www.acronis.com. Retrieved 22 November 2021.
  2. Windows 11 Support in Acronis Products | Knowledge Base. https://kb.acronis.com/content/69259. Accessed 22 Nov. 2021.
  3. 1 2 "Acronis True Image is now Acronis Cyber Protect Home Office". Acronis. Retrieved 2023-12-20.
  4. Zhidkov, D. A., Kuligina, N. O., & Pavlycheva, T. N. (2020). METHODS AND PROBLEMS OF UPDATING THE MICROSOFT WINDOWS 7 OPERATING SYSTEM TO MICROSOFT WINDOWS 10 IN THE ENERGY ENTERPRISE. European Journal of Natural History, (6), 30-34.
  5. 1 2 "Acronis Cyber Protect Home Office Review". PCMAG. Retrieved 2023-12-20.
  6. "Zoom Meetings Cybersecurity Risks - Secure Your Work-From-Home Employees". Acronis. Retrieved 2023-12-20.
  7. 1 2 3 Warner, Gary, et al. "Investigative techniques of n-way vendor agreement and network analysis demonstrated with fake antivirus." (2014).
  8. How to Back Up a Hard Drive and Restore Your Computer. https://www.acronis.com/en-sg/articles/backup-hard-drive/. Accessed 22 Nov. 2021.
  9. "Acronis True Image Review 2023: Is the High Cost Worth It?". Website Planet. 2021-05-10. Retrieved 2023-12-20.
  10. "Creating a Sector-By-Sector Backup with Acronis Products". Acronis Knowledge Base. Retrieved 15 June 2017.
  11. 1 2 Stone, W. Ross (2015). "Changing Backup Software [From the Screen of Stone]". IEEE Antennas and Propagation Magazine. 57 (6): 178–179. Bibcode:2015IAPM...57..178S. doi:10.1109/map.2015.2480085 . Retrieved 2023-12-20.
  12. 1 2 "Acronis True Image 2020 and 2021: tib and tibx backup format usage". kb.acronis.com. Retrieved 2023-12-20.
  13. Kholopov, V. A., Kurnasov, E. V., Soklakov, F. V., Korolev, E. I., Untura, M. M., & Bolbakov, R. G. (2019). A METHOD FOR ENSURING THE SECURE TRANSFER AND STORAGE OF BACKUP USER DATA AND INFORMATION FROM INTERNET OF THINGS DEVICES.
  14. 1 2 "Clone Almost Finishes but Then Fails at the End". Crucial. Retrieved 2023-12-20.
  15. Holzman, Carey. "How To Upgrade A Hard Disk Drive | CRN". www.crn.com. Retrieved 2023-12-20.
  16. "WD Support". Support.wdc.com. 2012-02-05. Archived from the original on 2014-11-18. Retrieved 2014-11-24.
  17. "Download Intel® Data Migration Software". Intel. 27 May 2016. Archived from the original on 7 August 2019. Retrieved 16 June 2017.
  18. "Seagate DiscWizard". Acronis.com. Retrieved 2016-02-20.
  19. 1 2 Alsagoff, S. N. (2010, June). Malware self protection mechanism issues in conducting malware behaviour analysis in a virtual environment as compared to a real environment. In 2010 International Symposium on Information Technology (Vol. 3, pp. 1326-1331). IEEE.
  20. Backup Archive Compatibility across Different Product Versions | Knowledge Base. https://kb.acronis.com/tib. Accessed 22 Nov. 2021.
  21. "How do I stop these constant "Purchase 2015 Upgrade" prompts?". forum.acronis.com. September 28, 2014. Retrieved November 28, 2019.
  22. "Acronis True Image: How To Disable Notifications in Notification Area". acronis.com. November 28, 2019. Retrieved November 28, 2019.
  23. Philipson, Graeme (4 December 2014). "Acronis Head Signals Cloud Future". Cloud(Australia:iTWire). Archived from the original on 13 February 2015.
  24. "Release Notes for Acronis True Image Home 2012". Acronis, Inc. Retrieved 2011-10-28.
  25. Collins, Barry (2013-01-15). "Windows 8 Secure Boot snags Acronis True Image". Dennis Publishing. Retrieved 2013-01-16.
  26. "65498: Summary of Features Removed in ATI2015". acronis.com. 18 September 2014. Retrieved 7 February 2015.