{"id":8607,"date":"2026-01-16T14:12:11","date_gmt":"2026-01-16T11:12:11","guid":{"rendered":"https:\/\/sonotek.com.tr\/?page_id=8607"},"modified":"2026-02-10T16:05:31","modified_gmt":"2026-02-10T13:05:31","slug":"acronis-advanced-security-xdr","status":"publish","type":"page","link":"https:\/\/sonotek.com.tr\/en\/solutions\/acronis-security-solutions\/acronis-advanced-security-xdr\/","title":{"rendered":"Acronis Advanced Security + XDR"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"8607\" class=\"elementor elementor-8607\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb4e16e e-con-full e-flex e-con e-parent\" data-id=\"cb4e16e\" data-element_type=\"container\">\t\t<div class=\"elementor-element elementor-element-ecbd156 elementor-widget elementor-widget-template\" data-id=\"ecbd156\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"8192\" class=\"elementor elementor-8192\" data-elementor-post-type=\"elementor_library\">\n\t\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-61a519ad elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"61a519ad\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;gradient&quot;}\">\n\n                            <div class=\"elementor-background-overlay\"><\/div>\n            \n                <div class=\"elementor-container elementor-column-gap-extended\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d0c3eaf pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"7d0c3eaf\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-6e00ef7b elementor-widget elementor-widget-heading\" data-id=\"6e00ef7b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Acronis Advanced Security + XDR<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b6770df elementor-widget elementor-widget-spacer\" data-id=\"3b6770df\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74e30fbd elementor-widget__width-auto elementor-widget elementor-widget-pxl_breadcrumb\" data-id=\"74e30fbd\" data-element_type=\"widget\" data-widget_type=\"pxl_breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-breadcrumb-wrap\">\n\t<ul class=\"pxl-breadcrumb\"><li><span class=\"breadcrumb-entry\">Home Page<\/span><\/li><\/ul><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-b673c89 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"b673c89\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-extended\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8309e89 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"8309e89\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-f44dea6 elementor-widget elementor-widget-image\" data-id=\"f44dea6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/Acronis-Advanced-Security-XDR_cp-1.png\" class=\"attachment-1536x1536 size-1536x1536 wp-image-9325\" alt=\"\" srcset=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/Acronis-Advanced-Security-XDR_cp-1.png 1536w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/Acronis-Advanced-Security-XDR_cp-1-300x200.png 300w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/Acronis-Advanced-Security-XDR_cp-1-1024x683.png 1024w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/Acronis-Advanced-Security-XDR_cp-1-768x512.png 768w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/Acronis-Advanced-Security-XDR_cp-1-18x12.png 18w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/Acronis-Advanced-Security-XDR_cp-1-1065x710.png 1065w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-0f0b63c elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none elementor-invisible\" data-id=\"0f0b63c\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-extended\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a477876 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"a477876\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n                <section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8458c05 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"8458c05\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e773398 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"e773398\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-4077321 elementor-widget__width-auto elementor-widget elementor-widget-pxl_button\" data-id=\"4077321\" data-element_type=\"widget\" data-widget_type=\"pxl_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl-pxl_button-4077321-6648\" class=\"pxl-button pxl-atc-link\" data-wow-delay=\"ms\">\r\n    <a href=\"https:\/\/sonotek.com.tr\/en\/solutions\/\" class=\"btn pxl-icon-active btn-block-inline  btn-icon-box2 pxl-icon--right\">\r\n                    <span class=\"pxl--btn-icon\">\r\n                <i aria-hidden=\"true\" class=\"fal fa-long-arrow-right\"><\/i>                            <\/span>\r\n                <span class=\"pxl--btn-text\" data-text=\"T\u00fcm \u00c7\u00f6z\u00fcmlerimiz\">\r\n            All Our Solutions        <\/span>\r\n    <\/a>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a1515e9 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"a1515e9\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-a0c44e8 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"a0c44e8\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-618949e elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"618949e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"2\">Acronis XDR is a comprehensive solution that combines cyber security, data protection and endpoint management on a single platform, eliminating the complexity and cost of multiple security products. System, <b data-path-to-node=\"2\" data-index-in-node=\"208\">Acronis Copilot<\/b> GenAI assistant enables technical teams to analyse incidents and intervene quickly using natural language.<\/p><p data-path-to-node=\"3\">The platform's prominent capabilities are:<\/p><ul><li data-path-to-node=\"4,0,0\"><b data-path-to-node=\"4,0,0\" data-index-in-node=\"0\">Integrated Response:<\/b> Thanks to the integration of cyber security and data protection, it is possible to isolate the endpoint in case of attack, take forensic backup and restore the system with a single click.<\/li><li data-path-to-node=\"4,1,0\"><b data-path-to-node=\"4,1,0\" data-index-in-node=\"0\">Automation and Intelligence:<\/b> Automated incident interpretation, AI-powered incident summaries and automated response scenarios (playbooks) paired with MITRE ATT&amp;CK.<\/li><li data-path-to-node=\"4,2,0\"><b data-path-to-node=\"4,2,0\" data-index-in-node=\"0\">Comprehensive Integration:<\/b> Increase threat visibility by integrating with email security, Entra ID, and Microsoft 365 collaboration tools.<\/li><li data-path-to-node=\"4,3,0\"><b data-path-to-node=\"4,3,0\" data-index-in-node=\"0\">Safe Recovery:<\/b> Safe Recovery and Attack-specific rollback features to clean backups from malware.<\/li><li data-path-to-node=\"4,4,0\"><b data-path-to-node=\"4,4,0\" data-index-in-node=\"0\">Proactive Protection:<\/b> Predetermine risks with real-time threat intelligence, patch management, vulnerability scans and #CyberFit score.<\/li><\/ul><p data-path-to-node=\"5\">In short, it reduces operational load and maximises security by managing the entire process from incident detection (EDR\/XDR) to business continuity (Backup\/DR) from a single console.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-916b789 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"916b789\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6ff2d91 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"6ff2d91\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n                <section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d4b1e93 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"d4b1e93\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a53f816 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"a53f816\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-544d6a4 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"544d6a4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Acronis Copilot: Your GenAI security assistant<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fe69b7 elementor-widget elementor-widget-text-editor\" data-id=\"4fe69b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"9\">Streamline operations for highly specialised technicians while enabling MSP technicians with limited safety skills to respond effectively and quickly to incidents. Conduct richer investigations, respond faster, and mitigate risks at scale in minutes using only natural language through a conversational user experience with the GenAI assistant. Users can:<\/p><ul><li data-path-to-node=\"10,0,0\">Interacting with Acronis Copilot to ask specific questions about an event.<\/li><li data-path-to-node=\"10,1,0\">To receive advice on actions to mitigate threats.<\/li><li data-path-to-node=\"10,2,0\">To get a list of events with similar detections for deeper analysis.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n                <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c29621b pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"c29621b\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-9a1c7c2 elementor-widget elementor-widget-image\" data-id=\"9a1c7c2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2000\" height=\"1092\" src=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Acronis-Copilot-Your-GenAI-security-assistant-.webp\" class=\"attachment-full size-full wp-image-8609\" alt=\"\" srcset=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Acronis-Copilot-Your-GenAI-security-assistant-.webp 2000w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Acronis-Copilot-Your-GenAI-security-assistant--300x164.webp 300w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Acronis-Copilot-Your-GenAI-security-assistant--1024x559.webp 1024w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Acronis-Copilot-Your-GenAI-security-assistant--768x419.webp 768w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Acronis-Copilot-Your-GenAI-security-assistant--1536x839.webp 1536w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Acronis-Copilot-Your-GenAI-security-assistant--1170x639.webp 1170w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-862de61 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"862de61\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b5e07c4 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"b5e07c4\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n                <section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9e25927 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"9e25927\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c0f286c pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"c0f286c\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-d813330 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"d813330\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automatic response scenarios (Playbooks)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94fb151 elementor-widget elementor-widget-text-editor\" data-id=\"94fb151\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"2\">Automate response to XDR and EDR events to scale your security operations and improve response times, while reducing the operational burden of managing security events. Grow your business worry-free, knowing you can protect more businesses and workloads without adding additional resource needs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n                <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-90fe97b pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"90fe97b\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-563988a elementor-widget elementor-widget-image\" data-id=\"563988a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"946\" height=\"560\" src=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Automated-response-playbooks-.webp\" class=\"attachment-full size-full wp-image-8610\" alt=\"\" srcset=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Automated-response-playbooks-.webp 946w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Automated-response-playbooks--300x178.webp 300w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Automated-response-playbooks--768x455.webp 768w\" sizes=\"(max-width: 946px) 100vw, 946px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-e25c2ed elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"e25c2ed\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b5c49f1 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"b5c49f1\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n                <section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2d2a549 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"2d2a549\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7d742b3 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"7d742b3\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-4b5a103 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"4b5a103\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Comprehensive response to attacks for unrivalled business continuity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c728dde elementor-widget elementor-widget-text-editor\" data-id=\"c728dde\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"12\">Prevail where point solutions fail - harness the full power of integration between cybersecurity, data protection and endpoint security configuration management with one-click incident response:<\/p><ul><li data-path-to-node=\"13,0,0\"><b data-path-to-node=\"13,0,0\" data-index-in-node=\"0\">Optimise:<\/b> By isolating endpoints and quarantining threats.<\/li><li data-path-to-node=\"13,1,0\"><b data-path-to-node=\"13,1,0\" data-index-in-node=\"0\">Find out more:<\/b> Using remote connections and forensic backups.<\/li><li data-path-to-node=\"13,2,0\"><b data-path-to-node=\"13,2,0\" data-index-in-node=\"0\">Prevent future attacks:<\/b> By closing open vulnerabilities.<\/li><li data-path-to-node=\"13,3,0\"><b data-path-to-node=\"13,3,0\" data-index-in-node=\"0\">Ensure business continuity:<\/b> With integrated backup and recovery.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n                <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-08981d0 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"08981d0\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-2f2683c elementor-widget elementor-widget-image\" data-id=\"2f2683c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Comprehensive-response-to-attacks-for-unmatched-business-continuity.webp\" data-elementor-open-lightbox=\"yes\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6ODYxMSwidXJsIjoiaHR0cHM6XC9cL3Nvbm90ZWsuY29tLnRyXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDI2XC8wMVwvQ29tcHJlaGVuc2l2ZS1yZXNwb25zZS10by1hdHRhY2tzLWZvci11bm1hdGNoZWQtYnVzaW5lc3MtY29udGludWl0eS53ZWJwIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"946\" height=\"560\" src=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Comprehensive-response-to-attacks-for-unmatched-business-continuity.webp\" class=\"attachment-full size-full wp-image-8611\" alt=\"\" srcset=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Comprehensive-response-to-attacks-for-unmatched-business-continuity.webp 946w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Comprehensive-response-to-attacks-for-unmatched-business-continuity-300x178.webp 300w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Comprehensive-response-to-attacks-for-unmatched-business-continuity-768x455.webp 768w\" sizes=\"(max-width: 946px) 100vw, 946px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-7484aef elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"7484aef\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-extended\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4ffe60a pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"4ffe60a\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-826adbd elementor-widget elementor-widget-image-box\" data-id=\"826adbd\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Attack specific rollbacks (Rollbacks)<\/h3><p class=\"elementor-image-box-description\">Quickly and easily undo attack damage, including affected files, data and configurations, making it easy to remediate without relying on the vulnerable Microsoft Volume Shadow Copy Service (VSS) that most solutions use.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f371ee8 elementor-widget elementor-widget-image-box\" data-id=\"f371ee8\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Automatic interpretation of events paired with MITRE ATT&amp;CK\u00ae<\/h3><p class=\"elementor-image-box-description\">Accelerate response and increase reactivity to threats by leveraging AI-based attack interpretations paired with MITRE ATT&amp;CK\u00ae to understand, in minutes How did the attacker get in? How did he cover his tracks? What kind of damage was done? How did the attack spread?<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90203fb elementor-widget elementor-widget-image-box\" data-id=\"90203fb\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Event summaries generated by artificial intelligence (AI)<\/h3><p class=\"elementor-image-box-description\">Further accelerate incident analysis and response times by leveraging AI-generated summaries that provide a brief overview of each incident.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2292c42 elementor-widget elementor-widget-image-box\" data-id=\"2292c42\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Prioritisation of events<\/h3><p class=\"elementor-image-box-description\">Focus on what's important and increase your speed of response to attacks with automated event alerts prioritised by criticality, so your team can focus on troubleshooting rather than threat hunting.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82ecc60 elementor-widget elementor-widget-image-box\" data-id=\"82ecc60\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Integration with Email Security (Perception Point)<\/h3><p class=\"elementor-image-box-description\">Gain increased telemetry by integrating rich forensic data from Acronis' best-in-class Email Security solution. Understand if the attack originated from an email and respond by removing malicious attachments and URLs, searching more mailboxes for the threat, or blocking the sender's email address.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea8b262 elementor-widget elementor-widget-image-box\" data-id=\"ea8b262\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Integration with Entra ID<\/h3><p class=\"elementor-image-box-description\">Leverage advanced visibility and response capabilities for attacks that exploit compromised credentials; detect compromised user accounts, terminate their sessions, force password resets, or suspend the account entirely.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f428ae elementor-widget elementor-widget-image-box\" data-id=\"2f428ae\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Integration with Collaboration Security (for Microsoft 365 applications)<\/h3><p class=\"elementor-image-box-description\">Cloud applications such as Microsoft 365 Teams, SharePoint, and OneDrive are increasingly targeted in attacks. Ensure you can overcome such threats with natively integrated telemetry and response actions for Microsoft 365 applications.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b15f7ac elementor-widget elementor-widget-image-box\" data-id=\"b15f7ac\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Threat containment and quarantine<\/h3><p class=\"elementor-image-box-description\">Remediate attacks by stopping malicious processes and quarantining analysed threats to prevent them from being executed as part of unified, one-click response capabilities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2211593 elementor-widget elementor-widget-image-box\" data-id=\"2211593\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">End point isolation<\/h3><p class=\"elementor-image-box-description\">Stop attacks from spreading and affecting more endpoints; you can isolate affected points from the network to prevent lateral movement.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f46bb0a elementor-widget elementor-widget-image-box\" data-id=\"f46bb0a\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Recovery and full image restoration (Reimaging)<\/h3><p class=\"elementor-image-box-description\">Ensure customers' business is always up and running, quickly recovering data and operability after attacks. With best-in-class backup and recovery capabilities integrated into our one-click response system, you can recover specific files or reinstall an image of the entire endpoint.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d788c51 elementor-widget elementor-widget-image-box\" data-id=\"d788c51\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Disaster recovery failover (with Disaster Recovery)<\/h3><p class=\"elementor-image-box-description\">Provide unparalleled business continuity with integrated disaster recovery. Automatically transition to a backup, off-site environment in the event of attacks that disrupt customer business continuity.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6588c3 elementor-widget elementor-widget-image-box\" data-id=\"f6588c3\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Remote connection to endpoint (with Acronis RMM)<\/h3><p class=\"elementor-image-box-description\">Investigate incidents further with secure remote connectivity to affected endpoints for troubleshooting and additional analysis purposes.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23df9a5 elementor-widget elementor-widget-image-box\" data-id=\"23df9a5\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Forensics backup<\/h3><p class=\"elementor-image-box-description\">Gather evidence for further investigation, reporting, compliance and legal purposes by collecting forensic information such as memory dumps and process information and storing it in tamper-proof backups.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e8c481 elementor-widget elementor-widget-image-box\" data-id=\"9e8c481\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Patch management (with Acronis RMM)<\/h3><p class=\"elementor-image-box-description\">As part of a one-click response to attacks, you can close vulnerabilities to prevent recurrence of future incidents with our integrated patch management for more than 250 applications.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce14837 elementor-widget elementor-widget-image-box\" data-id=\"ce14837\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Event monitoring and automatic correlations<\/h3><p class=\"elementor-image-box-description\">The solution tracks events at the endpoint level and automatically correlates them in a per-event attack chain graph.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14c59fc elementor-widget elementor-widget-image-box\" data-id=\"14c59fc\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Intelligent search for IoCs focussing on emerging threats<\/h3><p class=\"elementor-image-box-description\">Instead of scanning hundreds of lines of logs, focus on what matters, such as indicators of compromise (IoCs) related to emerging threats from our real-time threat intelligence feeds, and automatically search for IoCs across all endpoints.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5602ba2 elementor-widget elementor-widget-image-box\" data-id=\"5602ba2\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Malware protection for backups<\/h3><p class=\"elementor-image-box-description\">Prevent infected files from being restored from backups with built-in malware scanning, including encrypted backups. Acronis Cyber Protect Cloud scans full-disk backups in a central location to help find malware and enable users to restore a clean and malware-free backup.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db39069 elementor-widget elementor-widget-image-box\" data-id=\"db39069\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Safe recovery<\/h3><p class=\"elementor-image-box-description\">Prevent dangerous infections from occurring again with Acronis' unique secure recovery technology. During the recovery process, the integrated solution scans the backup for malware, installs the latest security patches and updates antivirus databases.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97a06a6 elementor-widget elementor-widget-image-box\" data-id=\"97a06a6\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Remote device wipe<\/h3><p class=\"elementor-image-box-description\">Prevent business-critical data from falling into the wrong hands by remotely wiping compromised or lost Windows devices. You can prevent data from being wiped by disgruntled employees or accessed from lost\/stolen devices.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-145828d elementor-widget elementor-widget-image-box\" data-id=\"145828d\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Real-time flow of threat intelligence<\/h3><p class=\"elementor-image-box-description\">Acronis Cyber Protection Operations Centres (CPOC) constantly monitor the cybersecurity environment and issue alerts about any potential threats. Receive real-time alerts about malware, vulnerabilities, natural disasters and other global events that could affect data protection, so you can prevent them.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64e6504 elementor-widget elementor-widget-image-box\" data-id=\"64e6504\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Exploit prevention<\/h3><p class=\"elementor-image-box-description\">Prevent advanced attack techniques, including zero-day and fileless attacks, with behaviour-based detection heuristics focused on vulnerability exploitation. Acronis' exploit prevention technology specifically detects attempts to exploit software vulnerabilities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26cd2fe elementor-widget elementor-widget-image-box\" data-id=\"26cd2fe\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Ransomware detection with automatic rollback<\/h3><p class=\"elementor-image-box-description\">Detect and stop ransomware, including advanced complex forms, and automatically roll back changes caused by the threat or data affected.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bf4e67 elementor-widget elementor-widget-image-box\" data-id=\"0bf4e67\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Behaviour-based detection<\/h3><p class=\"elementor-image-box-description\">Protect customers, their data and operations against modern threats with award-winning protection to detect typical patterns of malicious behaviour and prevent threats from operating.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8df4d57 elementor-widget elementor-widget-image-box\" data-id=\"8df4d57\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">URL filtering<\/h3><p class=\"elementor-image-box-description\">Help your customers achieve compliance and increase productivity by preventing attacks from malicious websites. Acronis URL filtering allows you to control website access via an HTTP\/HTTPS blocker, manage exceptions for URLs and perform payload analysis.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d536c32 elementor-widget elementor-widget-image-box\" data-id=\"d536c32\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Unprotected endpoint discovery<\/h3><p class=\"elementor-image-box-description\">Ensure there are no gaps in customer defence by facilitating discovery of unprotected endpoints and enabling remote agent deployment and service provisioning.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49911db elementor-widget elementor-widget-image-box\" data-id=\"49911db\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Vulnerability assessments<\/h3><p class=\"elementor-image-box-description\">Monitor endpoints for open vulnerabilities and streamline attack detection and response as well as security configuration management by providing a prioritised view based on vulnerability criticality.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8759a7f elementor-widget elementor-widget-image-box\" data-id=\"8759a7f\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">#CyberFit Score to assess the security posture of endpoints<\/h3><p class=\"elementor-image-box-description\">Quickly and easily assess the security posture of endpoints and utilise our guided recommendations to secure customer endpoints. Unlock a unified view of all endpoints as well as #CyberFit Scores to simplify security configuration management.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d388e8 elementor-widget elementor-widget-image-box\" data-id=\"8d388e8\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Data classification (with DLP)<\/h3><p class=\"elementor-image-box-description\">When investigating attacks, increase your visibility over affected data by classifying outbound data from customer endpoints to detect and stop sensitive data leakage with greater efficiency.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfe9da8 elementor-widget elementor-widget-image-box\" data-id=\"bfe9da8\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">File and system level backup<\/h3><p class=\"elementor-image-box-description\">Ensure that not only endpoints are protected, but also the data on them. Take advantage of pre-integrated, best-in-class backup capabilities that provide unparalleled data protection and business continuity.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbba0cb elementor-widget elementor-widget-image-box\" data-id=\"dbba0cb\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Device and port control<\/h3><p class=\"elementor-image-box-description\">Strengthen data security and prevent sensitive information from leaking over local channels with controls over user access to (and data transactions on) locally connected devices and ports - even for virtualised sessions.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e17887f elementor-widget elementor-widget-image-box\" data-id=\"e17887f\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Automatic, adjustable allowlisting based on profiling<\/h3><p class=\"elementor-image-box-description\">To save time and prevent resource-consuming false positives, you can enable monitoring and profiling of customer applications to create an automatic allowed list of the most used applications, including custom applications. You can also manually add or remove apps from the list.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d8acc7 elementor-widget elementor-widget-image-box\" data-id=\"9d8acc7\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Enhancing Microsoft Defender AV<\/h3><p class=\"elementor-image-box-description\">Acronis EDR enhances Microsoft Defender with advanced, AI-powered analysis, detection, response and recovery. MSPs gain centralised visibility, enhanced protection and built-in resiliency without replacing Defender to scale profitably.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40b6c31 elementor-widget elementor-widget-image-box\" data-id=\"40b6c31\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Potentially unwanted application (PUA) protection<\/h3><p class=\"elementor-image-box-description\">Protect against potentially unwanted applications (PUAs) that can degrade system performance, display annoying adverts or monitor user activity for commercial purposes. When detected, PUAs are quarantined or blocked according to policy settings and relevant details are integrated into EDR events for further analysis.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-77a6f55 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"77a6f55\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-942f6c3 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"942f6c3\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-a0e7716 elementor-widget elementor-widget-text-editor\" data-id=\"a0e7716\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<table dir=\"ltr\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\" data-sheets-root=\"1\" data-sheets-baot=\"1\"><colgroup> <col width=\"100\" \/> <col width=\"100\" \/> <col width=\"100\" \/> <col width=\"100\" \/><\/colgroup><tbody><tr><td>Features<\/td><td>Acronis Cyber Protect Cloud<\/td><td>EDR<\/td><td>XDR<\/td><\/tr><tr><td>Behaviour-based detection<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Ransomware protection with automatic rollback<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Vulnerability assessments<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Device control<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>File and system level backup<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Inventory collection (with Acronis RMM)<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Patch management (with Acronis RMM)<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>#CyberFit Score (security posture assessment)<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Remote connection (with Acronis RMM)<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Optimisation including full image refresh<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Business continuity (with Disaster Recovery)<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Enhancing Microsoft Defender AV<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>URL filtering<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Exploit prevention<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Real-time flow of threat intelligence<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Threat hunting - Early access<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Automatic, adjustable allowed list based on profiling<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Forensic data collection<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Event monitoring<\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Automatic event correlation<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>GenAI assistant (Acronis Copilot - Early Access)<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Prioritisation of suspicious activities<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>AI-generated event summaries<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Automated MITRE ATT&amp;CK\u00ae attack chain visualisation and interpretation<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>One-click response to incidents<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Full threat containment including endpoint quarantine and isolation<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Automatic response scenarios (playbooks)<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Intelligent search for IoCs, including emerging threats<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Attack-specific undo<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Integration with Email Security (email telemetry)<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Integration with Entra ID (identity telemetry)<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Integration with Collaboration Security (telemetry of Microsoft 365 applications)<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Delete malicious email attachment or URLs<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Search for malicious attachments in mailboxes<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Blocking malicious email address<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Terminate all user sessions<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Force user account password reset on next login<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>User account suspension<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td>MDR service<\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>General API for EDR<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-14456d9 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none elementor-invisible\" data-id=\"14456d9\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:200}\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-extended\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e4d1ad5 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"e4d1ad5\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-48989d7 elementor-widget elementor-widget-pxl_heading\" data-id=\"48989d7\" data-element_type=\"widget\" data-widget_type=\"pxl_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div id=\"pxl-pxl_heading-48989d7-8870\" class=\"pxl-heading px-sub-title-default-style\">\n\t<div class=\"pxl-heading--inner\">\n\t\t\t\t\t<div class=\"pxl-item--subtitle px-sub-title-default\" data-wow-delay=\"ms\">\n\t\t\t\t<span class=\"pxl-item--subtext\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"\">FIRST STEP<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\n\t\t<h3 class=\"pxl-item--title style-default highlight-default wow clarityRise\" data-wow-delay=\"ms\">\n\n\t\t\t<span class=\"pxl-heading--text\">\n\n\t\t\t\t\t\t\t\t\tFree Preliminary Evaluation\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/span>\n\t\t<\/h3>\n\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3390513 elementor-invisible elementor-widget elementor-widget-pxl_text_editor\" data-id=\"3390513\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner\" data-wow-delay=\"ms\">\n\t\t<p>Your system and network infrastructure<br \/>Let's design together according to the needs of today and tomorrow.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1874d8c elementor-widget__width-auto elementor-align-center elementor-widget elementor-widget-pxl_button\" data-id=\"1874d8c\" data-element_type=\"widget\" data-widget_type=\"pxl_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl-pxl_button-1874d8c-3771\" class=\"pxl-button pxl-atc-link\" data-wow-delay=\"ms\">\r\n    <a href=\"https:\/\/sonotek.com.tr\/en\/communication\/\" class=\"btn pxl-icon-active btn-block-inline  btn-icon-box2 pxl-icon--right\">\r\n                    <span class=\"pxl--btn-icon\">\r\n                <i aria-hidden=\"true\" class=\"fal fa-long-arrow-right\"><\/i>                            <\/span>\r\n                <span class=\"pxl--btn-text\" data-text=\"\u0130leti\u015fim\">\r\n            Contact        <\/span>\r\n    <\/a>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>T\u00fcm \u00c7\u00f6z\u00fcmlerimiz Acronis XDR, \u00e7oklu g\u00fcvenlik \u00fcr\u00fcnlerinin yaratt\u0131\u011f\u0131 karma\u015f\u0131kl\u0131\u011f\u0131 ve maliyeti ortadan kald\u0131rarak, siber g\u00fcvenlik, veri koruma ve u\u00e7 nokta y\u00f6netimini tek bir platformda birle\u015ftiren kapsaml\u0131 bir \u00e7\u00f6z\u00fcmd\u00fcr. Sistem, Acronis Copilot adl\u0131 GenAI asistan\u0131 sayesinde, teknik ekiplerin do\u011fal dil kullanarak olaylar\u0131 analiz etmesini ve h\u0131zl\u0131 m\u00fcdahale etmesini sa\u011flar. Platformun \u00f6ne \u00e7\u0131kan yetenekleri \u015funlard\u0131r: B\u00fct\u00fcnle\u015fik M\u00fcdahale: [&hellip;]<\/p>","protected":false},"author":1,"featured_media":9325,"parent":8502,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-8607","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/pages\/8607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/comments?post=8607"}],"version-history":[{"count":16,"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/pages\/8607\/revisions"}],"predecessor-version":[{"id":9351,"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/pages\/8607\/revisions\/9351"}],"up":[{"embeddable":true,"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/pages\/8502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/media\/9325"}],"wp:attachment":[{"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/media?parent=8607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}