User Manual

7
The SMB Value Checklist
Key Features
10 Reasons Why Acronis is the Obvious Choice
Fast and reliable recovery of live machines in just minutes or even seconds
Disaster Recovery and Data Protection now in one solution
One complete solution for all types of environments, platforms and media
A smooth transition from physical to virtual to cloud environments
No dependency on a specific type of machine or hardware
Deduplication to free up storage space and enhance productivity
Enterprise-class features made accessible to SMBs without dedicated IT resources
An affordable license from a single vendor reducing TCO
A flexible range of product support offerings protecting your software investment
A company 100% dedicated to disaster recovery and data protection for SMBs
Integrated Disaster Recovery, Backup, Data Protection, Search, Catalog, and Applications
Adds deep catalog and search capabilities for granular access to specific data across all backups
Built to integrate with Acronis’ granular application recovery modules such as for Microsoft Exchange Server
and Microsoft SQL Server
Physical/Virtual/Cloud in One Solution
Supports workstations and servers; physical and virtual; Windows
®
and Linux
®
; disk, tape and cloud.
Superior virtualization support
Unlimited Virtual Machines (VMs) per physical host plus unlimited P2V, V2V and V2P migrations
Agent-less backup reduces resources and simplifies operations
Supports VMware
®
, Hyper-V
®
, Citrix
®
, Red Hat
®
and Parallels
®
Fast Restore of Operating System, Applications, Files and Data
Installs without reboots
Allows for easy system recovery to the same or different hardware, including VMs
Use recovering systems while data is being restored
Enables mobile laptop users to recover a machine on the road
Secure, Easy-to-use, Centralized Management
Intuitive user interface makes it easy to install, configure and deploy
Manage all backup and recovery from one console, anywhere on the network
Enterprise-level reporting for more efficient management
User authentication and data encryption (AES-256) secure data access, storage and transfer
Eliminates Redundant Data
File and block-level deduplication reduces storage volumes by up to 90%