sb-eu logo
Story image

Acronis announces new security endpoint solution

Acronis has this week announced the launch of its newest catch-all solution, Acronis Cyber Protect 15.

The solution is an integration of data protection and cybersecurity which provides customers with effective endpoint protection in a landscape where the pointlessness of perimeter security is becoming more pronounced.

The tool features behavioural detection rooted in AI that stops zero-day attacks, URL filtering, vulnerability assessments, videoconference protection, and automated patch management.

“The cyber-threat landscape has changed dramatically during the past few years, and in the last six months in particular,” says Acronis founder and chief executive officer Serguei Beloussov.

“Traditional stand-alone antivirus and backup solutions are unable to protect against modern cyber-threats.

“Organisations that modernise their stack with integrated data protection and cybersecurity not only gain greater security, they lower their costs and improve efficiencies. 

“The automation and streamlined management of Acronis Cyber Protect 15 means any business can decrease their risk, avoid downtime, and increase their IT team’s productivity.” 

The announcement comes at a time when the need for organisations to have a secure cyber-protection solution is at an all-time high. As phishing campaigns, for example, experience a surge in success, tools should be at an organisations’ disposal to protect users, devices and company data which could be at risk.

According to data collected by the Acronis Cyber Protection Operations Center (CPOC), 10% of users might click on links that lead to malicious phishing attacks. But this number can be reduced significantly with Cyber Protect 15’s URL filtering feature, which blocks access to the sites that users are directed to. 

The rise of remote working has seen a proportional proliferation of remote collaboration and video conferencing apps like Zoom and Microsoft Teams. Of course, as global prominence rises, so too does the threat landscape.

Acronis Cyber Protect 15 addresses this by preventing code execution exploits in Webex before they are patched by Cisco.

The solution also promises 100% detection of malware attacks with zero false positives. Based on the current heightened cyber-attack rate, the unique integration of backup and cybersecurity enables Acronis Cyber Protect to prevent an estimated US$150 million in direct losses for its customers each year. 

With such a huge impact on the bottom line, it’s no surprise that 92% of companies surveyed in Acronis’ Cyber Readiness Report say they have adopted new technologies to enable remote work, including privacy solutions and endpoint cybersecurity. 

Phishing, DDoS and videoconferencing attacks are some of the most common tactics used by attackers as conditions brought about by the pandemic raise vulnerabilities, and many companies have invested in solutions specifically designed to combat these kinds of threats.

The frequency of these vectors of attack was a key subject of Acronis’ survey - here are some of the more significant details:

39% of the companies experienced a videoconferencing attack in the past three months as workers rely on apps like Zoom, Cisco Webex, and Microsoft Teams. 

31% of companies reported daily cyberattacks and 50% reported being targeted at least once a week.

35% of customer endpoints were exposed to malware attacks that were still getting through before the deployment of Acronis Cyber Protect 15.

Phishing attacks are occurring at historic levels, but most organisations aren’t sufficiently protected - only 2% of surveyed companies consider URL filtering when evaluating a cybersecurity solution. 

That oversight leaves remote workers vulnerable to phishing sites – Acronis CPOCs discovered that approximately 10% of users clicked on malicious websites in May, June, and July. 

With Acronis Cyber Protect 15, users can protect from phishing, malware, zero-day attacks, videoconferencing threats and more.

Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More
Story image
ConnectWise launches bug bounty program to bolster cybersecurity strategy
“Crowdsourcing in this way represents a solid additional layer of security, and we clearly value the community's expertise and participation in helping us keep our products secure."More
Story image
Remote staff overestimating knowledge of cybersecurity basics
‘Unconscious incompetence’ is one of the most difficult issues to identify and solve with security awareness training.More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More