Turnkey data loss prevention solution

Issue 3 2022 Infrastructure, Information Security, Products & Solutions

Acronis has launched a new Advanced Data Loss Prevention (DLP) pack for Acronis Cyber Protect Cloud, a solution that shields managed service providers (MSPs) and businesses of all sizes from data leakage. Notably, the solution does not require months for deployment, nor highly skilled teams to maintain it.

Drawing from decades-long experience enabling MSPs in data protection, this expansion resolves the main obstacles hindering the broader adoption of DLP solutions: gruelling roll-out and cumbersome ongoing administrative execution.

For years, organisations have struggled to protect sensitive data from unauthorised access via external attacks or insider risks such as IT misconfiguration and human error. Only a handful of large enterprises had the resources to manage the overall complexity, high deployment costs, and more significant obstacles that come with DLP adoption. Which is why the global DLP market size is set to exceed US$6 billion by 2026, according to Global Industry Analysts.

According to the 2021 Gartner Market Guide for Data Loss Prevention, “Small and mid-size organisations often struggle to implement and operate DLP tools. Consulting and managed DLP services can offer a path to value in terms of managing tools, but they cannot replace internal data knowledge and ownership of risk by business units.” [1]

Acronis Advanced DLP

The integration of behavioural-based DLP capabilities into the Acronis Cyber Protect Cloud platform is what extends its ability to deliver unified data protection, cybersecurity and management across systems, data and workloads regardless of their location. It offers a range of cyber protection capabilities that span the NIST cybersecurity framework from Identification to Recovery to ensure business continuity in the face of cybercriminals, insider risk threats or technology failure.

The Early Access version of Acronis Advanced DLP:

• Protects sensitive data transferred via a wide array of user and system connections including instant messaging and peripheral devices.

• Uses the same, unified Acronis Cyber Protect Cloud console and agent for data visibility and classification.

• Offers out-of-box data classification templates for common regulatory frameworks including GDPR, HIPAA and PCI DSS.

• Provides continuous monitoring for DLP incidents with multiple policy enforcement options, enabling ongoing automated policy adjustment to business-specifics.

• Includes robust audit and logging capabilities, giving administrators the ability to respond effectively to DLP events and conduct post-breach forensic investigations.

With a single platform and agent enabling this highly accessible form of DLP, both MSPs and businesses will benefit from faster, easier deployment and time-to-value, while avoiding all the most common threats to data. These same benefits can be accrued by larger organisations needing immediate protection while evaluating more complex and sophisticated DLP programmes with multi-year implementation cycles.

The Advanced DLP technology is now available in an Early Access Programme via Acronis Cyber Protect Cloud. Existing Acronis customers and partners using the platform can provision and trial the solution at no cost.

In addition, for organisations new to Acronis and its platform, the Acronis Cyber Protect Cloud platform with Advanced DLP is also available as a free trial.

[1] 2021 Gartner Market Guide for Data Loss Prevention, Published 28, June 2021 – ID G00742074 – 12, By Ravisha Chugh, Andrew Bales.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Inside the RealScan SG10
neaMetrics Access Control & Identity Management Products & Solutions
The SG10 was optimised for speed at every stage, from capture to processing. The result is faster fingerprint acquisition and near-instant response for operators.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.