You are on United States + Canada website. Change region to view location-specific content:

Backup, cloning, cyber protection and privacy tools for home users

From $72.49 USD per year

Over 20 years

on the market

Over 5,500,000

users worldwide

Over 500,000,000

backups and clones

Over 100,000

cyberattacks prevented last year

Acronis True Image (formerly Acronis Cyber Protect Home Office)

The most reliable cyber protection software on the market

Be protected from the unexpected. The complete cybersecurity protection you need with an easy-to-use and reliable solution against data loss, cyberattacks, and identity theft.*

* Only available in the U.S. for Advanced and Premium subscriptions.

Available in multiple editions

Backup

Flexible local or cloud backup of a complete machine or select files and folders on a flexible schedule that enables your cybersecurity.

Disk cloning

Create a complete replica of your data as a backup or a way to migrate to a new drive or computer.

Cybersecurity

Complete cyber protection, including antivirus and ransomware protection.

Acronis True Image is built on three key principles:

Reliable

•  Time-proven technology

•  Millions of satisfied users

•  Complete control of the backup process

Efficient

•  Fast backup and recovery

•  Fast upload and download of data

•  Pre-configured full-system backup plan

Easy to use

•  Intuitive user interface

•  One-click backup

•  Automatic protection

Acronis True Image capabilities

  • Full image backups — a complete replica of a drive or the whole machine
  • Local backups — to internal or external drives or network share
  • Cloud backups — to Acronis data centers designed for reliability, security and speed
  • Ransomware detection — based on behavioral analysis, preventing zero-day threats
  • Real-time cyber protection — detection and blocking of malicious processes
  • Automatic recovery — one-click recovery of all files affected by ransomware
  •  
    Web-based console — manage all protected devices and see protection status on one page
  •  
    Remote management — configure and run backup and recovery remotely

Devices and services protected

Operating systems

•  Windows
•  macOS

 

Mobile devices

•  iPhones and iPads
•  Android phones and
tablets

Cloud services

•  Outlook mailboxes
•  OneDrive

Choose the Acronis True Image plan that meets your needs

Formerly Acronis Cyber Protect Home Office

Essentials

Local backup & Anti-ransomware protection

One-year subscription

$72.49 USD

  • Flexible backups: full image to file-level
  • Active disk cloning
  • Universal restore and fast recovery
  • Ransomware protection

Advanced

Local and сloud backup & Security

One-year subscription

$84.39 USD

  • Flexible backups: full image to file-level
  • Active disk cloning
  • Universal restore and fast recovery
  • Ransomware protection
                                                         +
  • Block viruses and malware
  • Cloud backup and features
  • Automatic replication of data in the cloud
  • Microsoft 365 backups

Essentials

Local backup & Anti-ransomware protection

One-year subscription

$182.27 USD

  • Flexible backups: full image to file-level
  • Active disk cloning
  • Universal restore and fast recovery
  • Ransomware protection
                                                         +
  • Block viruses and malware
  • Cloud backup and features
  • Automatic replication of data in the cloud
  • Microsoft 365 backups
                                                         +
  • Blockchain certification of files
  • Electronic signatures on files
  • Ability to add up to 5TB of cloud storage

Award-winning cyber protection solution

Over 5.5 million users rely on Acronis True Image every day

Cybersecurity Excellence Awards Winner

Leader in Online Backup, G2

Editors' Choice, PCWorld

OPSWAT Anti-malware Platinum certification

100% Detection Rate, 0 False Alarms in Independent Test

What the expert says

Analyst Reports

Acronis True Image has saved my career on numerous occasions

“I was hit by a ransomware attack and a gentleman told me on the phone that I should pay a certain amount of money to get my data back. But in the back of my head, I knew that I had the ace card as I had Acronis True Image.”
Robin Ody
Principal Analyst, Canalys

Three layers of cyber resilience

Securing multi-site and industrial IT against IT complexity, spiraling costs and downtime.

Proactive

Vulnerability assessments, patch management and removal of malware from backups.

Active

Continuous data protection, AI and ML-based real-time protection against malware including ransomware and zero-day threats.

Reactive

Rapid recovery of data, integrated disaster recovery and user-initiated, one-click recovery, including bare-metal recovery.

See Acronis Cyber Protect in action

Discover how Cyber Protect expedites recovery, secures backups, slashes TCO, and fortifies multi-site IT and industrial computing against modern cyber threats.

Supported platforms

Windows 11 (all editions)
Windows 10 (all editions)
Windows 8+ (all editions)

Windows 7 SP1 (all editions)

NTFS
Ext2/Ext3/Ext4

ReiserFS(3) 

Linux SWAP 

HFS+/HFSX 

FAT16/32/exFAT 

macOS Sequoia 15
macOS Sonoma 14
macOS Ventura 13
macOS Monterey 12
macOS Big Sur 11
APFS
HFS+
FAT32
NTFS (including Boot Camp)
iOS 15 or later
Android 10 or later

Mobile backup

Keep your mobile contacts, calendars, photos and files safe. Our free Acronis mobile app safeguards your device, as well as all of your family’s smartphones and tablets with Acronis True Image (formerly Acronis Cyber Protect Home Office).

How to back up your mobile device via Wi-Fi to a PC or Mac

Looking for help?

Frequently Asked Questions

Why is Cyber Protect uniquely suited to protect industrial IT?

Acronis Cyber Protect v16 delivers swift user-driven recovery of any computing system, regardless of age or function, crucial in minimizing operational disruptions. It uniquely delivers:
• Recovery of any computer regardless of age or function: Capable of recovering any systems, old or new, v16 ensures dependable and swift recovery. This is inclusive of a bare-metal restore to new hardware, essential for sustaining continuity with aging legacy systems.
• User-Driven Recovery: With One-Click Recovery, non-technical personnel can easily initiate recovery processes, effectively decentralizing IT workload and accelerating the return to operation, post-incident.
• Industry-Specific Recovery: Acronis v16 is tailored for the unique needs of industrial environments, offering targeted recovery for OT, ICS, and laboratory systems. This mitigates downtime risks in sectors where every second of production time is valuable.
• Compatibility Assurance: Cyber Protect boasts verified compatibility with all major OT and ICS providers, ensuring seamless integration and reliability.
• Self-service remote recovery: Remote and home office users can independently recover systems, vastly improving recovery time objectives (RTO) across diverse locations without central IT intervention.

Acronis Cyber Protect v16 is all about getting systems back online fast, without needing a lot of technical help, which is great for busy industrial settings.

Acronis Cyber Protect v16 helps reduce the total cost of ownership (TCO) for cyber protection solutions through several key features:

• Comprehensive Workload Support: With support for over 20 different workloads, including on-premises, cloud, and SaaS platforms, Acronis Cyber Protect v16 allows enterprises to streamline their data protection efforts across diverse IT environments. This extensive support facilitates vendor consolidation, simplifying management, and ensuring that all aspects of the enterprise IT infrastructure are comprehensively protected.
• Streamlined Management: The centralized management console simplifies the oversight of data protection and cybersecurity across the enterprise, thereby saving administrative time and reducing operational costs.• One-click Recovery: The one-click recovery feature empowers users to restore systems independently, reducing the burden on IT staff and minimizing downtime, which can be costly for businesses.
• Automated Processes: With automated features like patch management and vulnerability assessments, routine tasks are handled efficiently, allowing IT teams to focus on more strategic initiatives rather than time-consuming maintenance.
• Resource Efficiency: Acronis Cyber Protect v16 is designed to minimize the impact on system resources, ensuring that protection operations don’t interfere with productivity and do not require additional investment in hardware.
• Proactive Protection: Advanced AI and ML technologies help prevent cyber incidents before they occur, reducing the potential costs associated with data breaches, ransomware recovery, and system remediation.
• Compatibility with Legacy Systems: The ability to support and recover older systems with bare-metal recovery means that organizations can extend the life of their existing infrastructure without incurring costs for immediate upgrades.
• Data Sovereignty and Compliance: The built-in compliance and data sovereignty features help avoid fines and penalties associated with non-compliance, which can add up significantly for enterprises operating in multiple jurisdictions.

By focusing on these areas, Acronis Cyber Protect v16 allows enterprises to manage cyber protection more efficiently, both operationally and financially, leading to a lower TCO.

The auto-discovery feature in Acronis Cyber Protect v16 significantly simplifies the process of safeguarding new devices within an enterprise network. This is particularly useful for multi-site environments and remote IT. Here’s how it enhances the protection workflow:
• Automatic Device Detection: As soon as a new device connects to the network, Acronis Cyber Protect v16’s auto-discovery tool automatically detects it. This eliminates the need for manual monitoring and inventorying of new hardware additions, ensuring no device goes unprotected due to oversight or the lag of manual processes.
• Seamless Integration: Once a new device is detected, the system can be configured to automatically deploy the Acronis agent. This means that the device is immediately brought under the protection umbrella of Acronis Cyber Protect without any manual intervention, ensuring rapid defense against potential threats.
• Consistent Policy Application: With auto-discovery, the protection policies predefined for the enterprise are automatically applied to the new devices. This ensures that each device adheres to the company’s cybersecurity standards, maintaining consistency and compliance across the entire network.
• Efficient Resource Allocation: By automating the initial steps of device protection, IT teams are relieved of repetitive tasks, allowing them to focus on more strategic initiatives. This efficient use of human resources contributes to a reduction in operational costs and enhances overall productivity.

In essence, Acronis Cyber Protect v16’s auto-discovery feature streamlines the expansion of network protection, ensures immediate and consistent security coverage for new devices, and optimizes IT resource utilization.

Acronis Cloud Storage is a storage option that saves backups to safe and secure Acronis Data Centers. Acronis Cloud Storage licenses are subscription-based and depend on the storage capacity levels. You can save backups from an unlimited number of machines and any type of platform to cloud storage, including mobile device backups. The quota is shared among all the devices registered in the account*.

(!) Note that to use Acronis Cloud Storage you need at least one Acronis Cyber Protect license.

*Does not apply to the free cloud storage. The free cloud storage available with a subscription license is valid only for the licensed workload and cannot be shared across other workloads.

New Customer

New to Muttii? Create an account to get started today.

Registered Users

Have an account? Sign in now.