Muttii OT resilience leadership is recognized by TAG

Menu

Advanced Backup

Best-in-breed cloud backup for MSP enhanced with cyber protection

Safeguarding business-critical data requires more than just backup – a comprehensive cyber protection strategy is essential. Muttii’s Advanced Backup Solution enhances cloud backup capabilities, providing proactive defense against threats while ensuring seamless data recovery and resilience.

Increase automation and productivity

Achieve minimal data loss and downtime with advanced cloud backup features like continuous data protection. Streamline operations, enhance efficiency, and ensure seamless recovery while safeguarding critical client data.

The most secure managed cloud backup

Muttii takes cloud backup to the next level by integrating advanced cybersecurity features, including anti-malware and proactive threat prevention. Ensure complete data security while maintaining seamless backup and recovery solutions for your clients.

Protect more workload types

Muttii safeguards over 20 workload types from a unified platform, covering Microsoft Exchange, Microsoft SQL Server, MariaDB, MySQL, Oracle DBMS Real Application Clusters, SAP HANA, and more—ensuring comprehensive protection with ease.

More than your average cloud backup – a complete cyber protection solution

Muttii offers more than just backup—it’s an all-in-one cyber protection platform. Secure over 20 workload types with an integrated approach that combines backup, security, and management in a single solution. With one platform, one agent, and one console, ensure seamless data protection and proactive threat defense for your clients.

FeaturesMutii Cyber Protect CloudWith Advanced Backup
File-level, disk-level, image and application backups
Backup popular workloads like Mac, Windows, Linux, Microsoft 365, Google Workspace, Hyper-V, VMware, and much more
Hybrid storage options – Acronis-hosted storage, public clouds such as Microsoft Azure, or MSP local storage
Flexible recovery options from full systems to granular files
Cloud-Physical-Virtual migrations
Archive encryption
Incremental and differential backups
Group management for Microsoft 365 and Google Workspace: Create static or dynamic groups based on your Azure AD data and simplify protection management for multiple seats by eliminating the need to configure protection for each individual seat
Adjustable backup frequency for Microsoft 365 and Google Workspace: Reduce RPO and improve business continuity by backing up your seats data up to 6 times per day-
Extended backup support: Covers Microsoft SQL clusters, Microsoft Exchange clusters, MariaDB, MySQL, Oracle DB, and SAP HANA-
Data protection map and compliance reporting: Scan clients’ environments to ensure their workloads, files, applications, and users are protected-
Continuous data protection (CDP): Acronis’ agent monitors and backs up changes in real time with near-zero RPOs, ensuring no data is lost-
Off-host data processing: Reduce the CPU/RAM consumption and achieve near-zero RTO of a protected workload-
Direct backup to Azure Storage, Amazon S3 or any (private and public) S3-compatible storage without any additional gateways-
Blockchain-based notarization of backups: Immutable, verifiable proof of data integrity protecting your business from tampering, ensuring compliance, and enhancing trust-

Significantly enhance your clients’ data protection

Go beyond traditional backup with advanced cyber protection. Safeguard over 20 workload types with a unified solution that integrates backup, security, and management. With a single platform, agent, and console, ensure seamless data resilience and proactive threat defense—delivering the comprehensive protection your clients need.

 

Enable quick and easy recovery with minimal IT intervention

Accelerate workload recovery while reducing IT overhead by empowering end-users with self-service restoration. With a one-click recovery option integrated into the protection plan, even non-technical users can swiftly and seamlessly restore entire workloads—minimizing downtime and ensuring business continuity.

Achieve near-zero RPOs with continuous data protection

Deliver seamless data security and rapid recovery to meet your clients’ needs. With Advanced Backup integrated into Muttii’s Cyber Protect solutions, you can eliminate downtime while safeguarding against sophisticated threats. Continuous data protection ensures that every change in business-critical applications is instantly captured and backed up—preventing data loss and ensuring uninterrupted operations.

Gain complete visibility into your clients’ protection

  • Ensure compliance and regulatory adherence by protecting all workloads—from data and applications to entire systems. Muttii’s advanced data protection solutions allow you to effortlessly scan client environments, identifying unprotected files, applications, and workloads. Proactively secure critical assets with real-time insights and comprehensive backup strategies.

     

Reduce the CPU/RAM consumption with off-host data processing

Optimize system performance by offloading backup replication, validation, retention, and VM conversion tasks to a separate machine. These operations can be scheduled independently from the protection plan, minimizing resource consumption on critical workloads.

Ensure backup integrity and recoverability with AI-powered validation through automated boot screenshot analysis. The system intelligently verifies backups without requiring manual intervention, enhancing efficiency and reliability.

Support even more workloads

Extend protection beyond standard environments with enhanced workload support. In addition to Windows, Linux KVM, Mac, VMware, Hyper-V, Red Hat Virtualization, Citrix XenServer, Oracle, Microsoft 365, Google Workspace, Azure, and Amazon EC2, Muttii’s advanced backup solutions also support:

  • Microsoft SQL Server clusters
  • Microsoft Exchange clusters
  • MariaDB
  • MySQL
  • Oracle DB
  • SAP HANA

4. Demonstrate your value to clients with powerful widgets

Enable ongoing reporting to clients with powerful widgets, that demonstrate the value of your DLP services. Provide service technicians and clients with visibility into blocked sensitive data flows; most active data senders; users with most blocked data transfers; and all sensitive data transfers split by category (blocked, allowed or justified).

New: Geo-redundant cloud storage

Acronis Geo-redundant Storage is designed to enhance your backup strategies by adding an extra layer of protection. Back up your data to an Acronis data center and have it automatically replicated to another remote Acronis location in the background.

Enhanced Data Protection

If one data center faces an outage, your data remains accessible from another location, guaranteeing uninterrupted access.

Compliance and Security

Geo-redundant storage helps meet regulatory requirements by ensuring that data is securely stored across diverse geographic locations.

Cost-Efficiency

Leveraging geo-redundant storage reduces the risk and associated costs of data loss, ensuring that your valuable data is always safe and accessible.

Powered by industry-recognized, award-winning endpoint protection

SE Labs: AAA Certification in Enterprise Advanced Security

IDC MarketScape: Worldwide Cyber-Recovery Leader

Frost Radar™: Endpoint Security Leader

CRN Security 100 List

Gold medal for Endpoint protection

OPSWAT Platinum certification for anti-malware

Microsoft Virus Initiative member

G2 Leader in Cloud Email Security

Cloud Security Alliance member

AV-TEST Approved Advanced EDR certification

ICSA Labs endpoint anti-malware certified

Anti-Malware Testing Standards Organization member

Mutii Cyber Protect Cloud

Modernize your cybersecurity and backup with integrated cyber protection

No credit card required

+41 52 569 10 98

Enhanced protection for workloads

Continuous data protection

Ensure that users don’t lose work that is in-progress by defining a list of critical applications that they frequently use. Acronis’ agent monitors every change made in the listed applications and continuously backs it up in real-time, so no data is lost.

Data protection map and compliance reporting

Guarantee that critical data is protected for compliance reporting, with the data protection map. Use the automatic data classification to track the protection status of important files, folders, and workstations. If they are not protected, an alert is created so you can protect your clients’ critical data.

Application cluster backup and restore

Ease the IT administrative burden with built-in capabilities to easily backup and restore Microsoft Exchange, Microsoft SQL Server, and Oracle DBMS Real Application clusters. This easy to preform backup for service providers helps you quickly and easily protect multiple workload with one solution.

SAP HANA backup

Strengthen SAP HANA database protection with consistent, script-based, disk-level backups that simplify management and do not require any SAP HANA expertise. If a recovery is needed, you can perform image-based backup for your clients’ SAP HANA database and all the data associated with it, including application configurations.

Expand your services with advanced protection packs

Add other powerful components to strengthen your services even further with advanced protection packs and unique cyber protection capabilities. Control your costs by paying only for the functionalities your clients need.

 
Advanced packs include:
Security + XDR
Instead of counting on a costly and complex stack of point solutions, Acronis XDR introduces natively integrated, highly efficient protection built for MSPs:
  •  Natively integrated cybersecurity, data protection and endpoint management
  •  Highly efficient security designed to protect the most vulnerable attack surfaces with AI-guided incident analysis and single-click response
  •  Built for MSPs, including a single agent and console for all services
Instead of counting on a costly & complex stack of point solutions, Acronis enables MSPs via integration of EDR, endpoint management, and backup & recovery to:
  •  Easily launch a complete security solution, including rapid recovery
  •  Protect against modern threats and readily comply with cyber insurance requirements
  •  Maximize efficiency through a single security platform
Achieve peak MSP performance with a natively integrated, secure, AI-powered RMM. Enhance client satisfaction by delivering superior IT administration and monitoring services while improving security posture for both endpoints and Microsoft 365. Boost technician performance with seamless automation of IT management.
  •  Automated patch management
  •  System and hardware monitoring
  •  AI-assisted scripting and more
Simplify success with an easy-to-deploy, adopt and use PSA tailored for modern recurring and cloud MSP business models. With Acronis PSA, you take the shortest path to increased profits and streamlined business operations.
  •  Service desk
  •  Billing and invoicing
  •  KPI reports and more
Defend clients’ data, even between scheduled backups. Extend backup capabilities to SAP HANA, Oracle DB, MariaDB, MySQL, and application clusters. You can also gain visibility into data-protection statuses across your clients’ infrastructure.
  •  Continuous data protection
  •  Data protection map
  •  Off-host data processing
Get clients back to business in mere minutes when disaster strikes by spinning up their systems in the Acronis Cloud and restoring them anywhere, ensuring immediate data availability. Make disaster recovery painless and increase efficiency with orchestration, runbooks, and automatic failover.
  •  Disaster recovery orchestration
  •  Production failover
  •  Site-to-site VPN
Block any email threat, including spam, phishing, business email compromise (BEC), account takeover (ATO), advanced persistent threats (APTs), and zero days in seconds before it reaches end users. Leverage Perception Point’s next-generation technology for lightning-fast detection and easy deployment, configuration, and management.
  •  Anti-phishing and anti-spoofing engines
  •  Anti-evasion and account takeover protection
  •  Next-generation dynamic detection against zero-days
Prevent leakage of sensitive data from endpoints via more than 70 local and network channels and strengthen compliance with minimal effort and speed to value.
  •  Content-aware data loss prevention
  •  Automatic client-specific DLP policy creation and extension
  •  Pre-build data classifiers for common regulatory frameworks
Get a full control over data location, management and privacy with a file sync and share service, including a transaction ledger to enable notarization and eSignature capabilities, across all platforms.
  •  File notarization
  •  Embedded eSignatures
  •  Independent file verification

Resources

Datasheet

Acronis Cyber Protect Cloud

Datasheet

Advanced Backup for Acronis Cyber Protect Cloud

Whitepaper

Avesta Group case study

Learn More, Earn More with Acronis Academy

Whether you and your team are seeking professional certifications or starting an MSP business, we’re here to support you at every stage.

Start learning for Free

New! MSP Academy offers budding and seasoned MSP professionals vendor-neutral training covering the A-Z of managing a successful MSP business.

Train on-demand

Access our most popular sales and technical training courses designed for existing MSPs looking to enhance their cybersecurity skills and knowledge.

Login to Partner Portal

Available exclusively to Acronis Partners. Access our complete Acronis Academy training catalogue and earn your required certifications

Frequently Asked Questions

I signed up for a trial. Where can I download the backup agents?

You first need to create a customer and an account for them. Once that is done, you can either log in as that customer or, in the Account management console, select the customer to manage their backups. This will bring you to the Backup management console where you can download the backup agent.

1. Resource usage is relative to the system specifications and a number of other factors, such as disk speed, disk size, available bandwidth, etc. By default, the Acronis backup process runs on low priority, with the operating system dynamically throttling its resources.

2. On modern servers and workstations, the CPU usage is typically around 3-4% and RAM consumption will be up to 500 MB with CPU spikes during the snapshot phase.

Acronis provides a hardware-independent software solution that can work with almost any hardware on industry-standard protocols like SMB and NFS. Acronis can also support any block-based storage, as long as it’s supported by the operating system.

In the backups section of the backup portal:

  • Select Add Location
  • Select a Network folder and enter the network path

We also have online documentation

This will depend on the size and performance of the hard disk, the amount of data changed, and the available bandwidth. Testing needs to be done, but the minimum threshold is 10 minutes.

We recommended you perform agentless backup for Hyper-V guest VMs, unless the VM needs to have ransomware protection and application-aware backups. Then, installing a Windows application agent is required.

1. Acronis backup agents support deduplication, in archives, for a single machine. Any new duplicated files will be skipped and not backed up.

2. Acronis Cyber Protect Cloud does not use a centralized deduplication server as the client’s data can be encrypted and containerized for security purposes.

Compression rates vary depending on the type of data but generally, you can expect around 30-40% compression unless the data is exclusively media files.

Yes, Acronis Cyber Protect Cloud and its services use encryption on all levels.

Acronis Active Protection is an advanced anti-ransomware technology. Completely compatible with the most common anti-malware solutions, our artificial-intelligence-based technology actively protects all of the data on your systems, including documents, media files, programs, Acronis Cyber Protect Cloud files, and more. It can detect and deflect attacks, and restore impacted data. For more information, review this guide in the Knowledge Base.

Granular recovery can restore individual items from the mailbox: a single email, contact, or calendar item.

Bare metal restores can be done by booting the target machine using bootable media, point to the backup repository for the image file. (Refer to: https://www.acronis.com/en-us/support/documentation/BackupService/index.html#42056.html).

The destination VM needs to have an OS pre-installed with the Acronis agent. The restoration will then be done using either P2V or V2V. It’s not possible to use bootable media in Azure/Google/Amazon.

Yes. It’s possible to restore a disk image to a smaller drive if the smaller drive has enough space to accommodate the occupied space of the larger disk (e.g. if you have a 200 GB disk with 100 GB of space used, you can transfer an image of this disk to a 150 GB drive, but not to an 80 GB disk).

This process is done in two stages:

  • Creation of the initial backup on external media, please refer to the online documentation.
  • Sending the data, which can be done through physical shipment, also described in this Knowledge Base article, or upload via WAN from an alternative location using a special tool.

MSP backup solutions enable managed service providers to deliver backup services to their clients.

Yes, the Advanced Backup pack is available to managed service partners using Acronis Cyber Protect Cloud. The Advanced Backup pack enables service providers to extend the cloud backup capabilities their clients need to proactively protect their data, including continuous data protection, extended backup support, one-click recovery, and more.

Cloud storage is the most flexible and cost-effective way to back up critical files and programs. Cloud backup solutions help isolate data from local device failures, malware attacks or natural disasters. However, experts recommend that you follow the 3-2-1 rule: make three copies of every piece of important data; store that data in two different formats; and keep one off-site copy.

Navigation

Search Here !

New Customer

New to Muttii? Create an account to get started today.

Registered Users

Have an account? Sign in now.