{"id":8615,"date":"2026-01-16T14:29:41","date_gmt":"2026-01-16T11:29:41","guid":{"rendered":"https:\/\/sonotek.com.tr\/?page_id=8615"},"modified":"2026-02-10T16:05:44","modified_gmt":"2026-02-10T13:05:44","slug":"acronis-advanced-security-edr","status":"publish","type":"page","link":"https:\/\/sonotek.com.tr\/en\/solutions\/acronis-security-solutions\/acronis-advanced-security-edr\/","title":{"rendered":"Acronis Advanced Security + EDR"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"8615\" class=\"elementor elementor-8615\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb4e16e e-con-full e-flex e-con e-parent\" data-id=\"cb4e16e\" data-element_type=\"container\">\t\t<div class=\"elementor-element elementor-element-ecbd156 elementor-widget elementor-widget-template\" data-id=\"ecbd156\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"8192\" class=\"elementor elementor-8192\" data-elementor-post-type=\"elementor_library\">\n\t\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-61a519ad elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"61a519ad\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;gradient&quot;}\">\n\n                            <div class=\"elementor-background-overlay\"><\/div>\n            \n                <div class=\"elementor-container elementor-column-gap-extended\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d0c3eaf pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"7d0c3eaf\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-6e00ef7b elementor-widget elementor-widget-heading\" data-id=\"6e00ef7b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Acronis Advanced Security + EDR<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b6770df elementor-widget elementor-widget-spacer\" data-id=\"3b6770df\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74e30fbd elementor-widget__width-auto elementor-widget elementor-widget-pxl_breadcrumb\" data-id=\"74e30fbd\" data-element_type=\"widget\" data-widget_type=\"pxl_breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-breadcrumb-wrap\">\n\t<ul class=\"pxl-breadcrumb\"><li><span class=\"breadcrumb-entry\">Home Page<\/span><\/li><\/ul><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\r\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-b673c89 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"b673c89\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-extended\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8309e89 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"8309e89\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-f44dea6 elementor-widget elementor-widget-image\" data-id=\"f44dea6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/Acronis-Advanced-Security-EDR_cp.png\" class=\"attachment-1536x1536 size-1536x1536 wp-image-9315\" alt=\"\" srcset=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/Acronis-Advanced-Security-EDR_cp.png 1536w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/Acronis-Advanced-Security-EDR_cp-300x200.png 300w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/Acronis-Advanced-Security-EDR_cp-1024x683.png 1024w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/Acronis-Advanced-Security-EDR_cp-768x512.png 768w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/Acronis-Advanced-Security-EDR_cp-18x12.png 18w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/Acronis-Advanced-Security-EDR_cp-1065x710.png 1065w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-0f0b63c elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none elementor-invisible\" data-id=\"0f0b63c\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-extended\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a477876 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"a477876\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n                <section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8458c05 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"8458c05\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e773398 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"e773398\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-4077321 elementor-widget__width-auto elementor-widget elementor-widget-pxl_button\" data-id=\"4077321\" data-element_type=\"widget\" data-widget_type=\"pxl_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl-pxl_button-4077321-2045\" class=\"pxl-button pxl-atc-link\" data-wow-delay=\"ms\">\r\n    <a href=\"https:\/\/sonotek.com.tr\/en\/solutions\/\" class=\"btn pxl-icon-active btn-block-inline  btn-icon-box2 pxl-icon--right\">\r\n                    <span class=\"pxl--btn-icon\">\r\n                <i aria-hidden=\"true\" class=\"fal fa-long-arrow-right\"><\/i>                            <\/span>\r\n                <span class=\"pxl--btn-text\" data-text=\"T\u00fcm \u00c7\u00f6z\u00fcmlerimiz\">\r\n            All Our Solutions        <\/span>\r\n    <\/a>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a1515e9 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"a1515e9\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-a0c44e8 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"a0c44e8\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-618949e elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"618949e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"2\"><span class=\"\">Acronis EDR,<\/span><span class=\"\"> AI-powered, and against the ever-increasing volume of cyber-attacks, organisations need a complete \u201cIdentify,<\/span><span class=\"\"> Protect,<\/span><span class=\"\"> Detect,<\/span><span class=\"\"> Intervene and Recover\u201d framework.<\/span><span class=\"\"> Solution,<\/span><span class=\"\"> maximises business continuity by combining security and backup capabilities on a single platform.<\/span><\/p><p data-path-to-node=\"3\"><span class=\"\">The main features of the platform are as follows:<\/span><\/p><ul><li data-path-to-node=\"4,0,0\"><b class=\"\" data-path-to-node=\"4,0,0\" data-index-in-node=\"0\">Integrated Response:<\/b><span class=\"\"> Isolating the endpoint in the event of an attack,<\/span><span class=\"\"> quarantine and the ability to recover data with one click thanks to integrated backup.<\/span><\/li><li data-path-to-node=\"4,1,0\"><b class=\"\" data-path-to-node=\"4,1,0\" data-index-in-node=\"0\">Smart Analytics:<\/b><span class=\"\"> Fast situation detection with attack analyses mapped according to MITRE ATT&amp;CK standards and event summaries generated by artificial intelligence.<\/span><\/li><li data-path-to-node=\"4,2,0\"><b class=\"\" data-path-to-node=\"4,2,0\" data-index-in-node=\"0\">Business Continuity:<\/b><span class=\"\"> Quickly rollback files affected by the attack (Rollback),<\/span><span class=\"\"> safe recovery and disaster recovery (DR) integration.<\/span><\/li><li data-path-to-node=\"4,3,0\"><b class=\"\" data-path-to-node=\"4,3,0\" data-index-in-node=\"0\">Operational Ease:<\/b><span class=\"\"> Event prioritisation,<\/span><span class=\"\"> remote connection,<\/span><span class=\"\"> reduce administrative burden with tools such as device wipe and patch management.<\/span><\/li><li data-path-to-node=\"4,4,0\"><b class=\"\" data-path-to-node=\"4,4,0\" data-index-in-node=\"0\">Flexibility and Integration:<\/b><span class=\"\"> Compatible with Microsoft Defender,<\/span><span class=\"\"> general API support and ease of SIEM\/SOAR integration for MSP\/MSSPs.<\/span><\/li><\/ul><p>In short, by combining cyber security and data protection instead of complex point solutions, it increases resistance to attacks and shortens recovery time.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-916b789 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"916b789\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6ff2d91 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"6ff2d91\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n                <section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d4b1e93 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"d4b1e93\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a53f816 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"a53f816\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-544d6a4 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"544d6a4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">One-click response to attacks for unrivalled business continuity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fe69b7 elementor-widget elementor-widget-text-editor\" data-id=\"4fe69b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"9\">Prevail where point solutions fail - harness the full power of integration between cybersecurity, data protection and endpoint security configuration management with one-click incident response:<\/p><ul><li data-path-to-node=\"10,0,0\"><b data-path-to-node=\"10,0,0\" data-index-in-node=\"0\">Optimise:<\/b> By isolating endpoints and quarantining threats.<\/li><li data-path-to-node=\"10,1,0\"><b data-path-to-node=\"10,1,0\" data-index-in-node=\"0\">Find out more:<\/b> Using remote connections and forensic backups.<\/li><li data-path-to-node=\"10,2,0\"><b data-path-to-node=\"10,2,0\" data-index-in-node=\"0\">Prevent future attacks:<\/b> By closing open vulnerabilities.<\/li><li data-path-to-node=\"10,3,0\"><b data-path-to-node=\"10,3,0\" data-index-in-node=\"0\">Ensure business continuity:<\/b> With integrated backup and recovery.<\/li><\/ul><p data-path-to-node=\"11\"><b data-path-to-node=\"11\" data-index-in-node=\"0\">Attack specific rollbacks (Rollbacks)<\/b> Quickly and easily undo attack damage, including affected files, data and configurations, making it easy to remediate without relying on the vulnerable Microsoft Volume Shadow Copy Service (VSS) that most solutions use.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n                <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c29621b pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"c29621b\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-9a1c7c2 elementor-widget elementor-widget-image\" data-id=\"9a1c7c2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"946\" height=\"560\" src=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Single-click-response-to-attacks-for-unmatched-business-continuity.webp\" class=\"attachment-full size-full wp-image-8617\" alt=\"\" srcset=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Single-click-response-to-attacks-for-unmatched-business-continuity.webp 946w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Single-click-response-to-attacks-for-unmatched-business-continuity-300x178.webp 300w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Single-click-response-to-attacks-for-unmatched-business-continuity-768x455.webp 768w\" sizes=\"(max-width: 946px) 100vw, 946px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-862de61 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"862de61\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b5e07c4 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"b5e07c4\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n                <section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9e25927 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"9e25927\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c0f286c pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"c0f286c\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-d813330 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"d813330\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Attack specific rollbacks (Rollbacks)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94fb151 elementor-widget elementor-widget-text-editor\" data-id=\"94fb151\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"12\">Quickly and easily undo attack damage, including affected files, data and configurations, making it easy to remediate without relying on the vulnerable Microsoft Volume Shadow Copy Service (VSS) that most solutions use.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n                <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-90fe97b pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"90fe97b\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-563988a elementor-widget elementor-widget-image\" data-id=\"563988a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"946\" height=\"560\" src=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Attack-specific-rollbacks.webp\" class=\"attachment-full size-full wp-image-8618\" alt=\"\" srcset=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Attack-specific-rollbacks.webp 946w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Attack-specific-rollbacks-300x178.webp 300w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Attack-specific-rollbacks-768x455.webp 768w\" sizes=\"(max-width: 946px) 100vw, 946px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-e25c2ed elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"e25c2ed\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b5c49f1 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"b5c49f1\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n                <section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2d2a549 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"2d2a549\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7d742b3 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"7d742b3\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-4b5a103 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"4b5a103\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automatic interpretation of events paired with MITRE ATT&amp;CK\u00ae<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c728dde elementor-widget elementor-widget-text-editor\" data-id=\"c728dde\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"12\">Accelerate response and increase reactivity to threats by leveraging AI-based attack interpretations paired with MITRE ATT&amp;CK\u00ae to understand, in minutes<\/p><ul><li data-path-to-node=\"13,0,0\">How did the attacker get in?<\/li><li data-path-to-node=\"13,1,0\">How did they cover their tracks?<\/li><li data-path-to-node=\"13,2,0\">What damage did the attack cause and how did it cause it?<\/li><li data-path-to-node=\"13,3,0\">How did the attack spread?<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n                <div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-08981d0 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"08981d0\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-2f2683c elementor-widget elementor-widget-image\" data-id=\"2f2683c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Comprehensive-response-to-attacks-for-unmatched-business-continuity.webp\" data-elementor-open-lightbox=\"yes\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6ODYxMSwidXJsIjoiaHR0cHM6XC9cL3Nvbm90ZWsuY29tLnRyXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDI2XC8wMVwvQ29tcHJlaGVuc2l2ZS1yZXNwb25zZS10by1hdHRhY2tzLWZvci11bm1hdGNoZWQtYnVzaW5lc3MtY29udGludWl0eS53ZWJwIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"946\" height=\"560\" src=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Comprehensive-response-to-attacks-for-unmatched-business-continuity.webp\" class=\"attachment-full size-full wp-image-8611\" alt=\"\" srcset=\"https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Comprehensive-response-to-attacks-for-unmatched-business-continuity.webp 946w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Comprehensive-response-to-attacks-for-unmatched-business-continuity-300x178.webp 300w, https:\/\/sonotek.com.tr\/wp-content\/uploads\/2026\/01\/Comprehensive-response-to-attacks-for-unmatched-business-continuity-768x455.webp 768w\" sizes=\"(max-width: 946px) 100vw, 946px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-7484aef elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"7484aef\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-extended\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4ffe60a pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"4ffe60a\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-826adbd elementor-widget elementor-widget-image-box\" data-id=\"826adbd\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Event summaries generated by artificial intelligence (AI)<\/h3><p class=\"elementor-image-box-description\">Further accelerate incident analysis and response times by leveraging AI-generated summaries that provide a brief overview of each incident.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f371ee8 elementor-widget elementor-widget-image-box\" data-id=\"f371ee8\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Prioritisation of events<\/h3><p class=\"elementor-image-box-description\">Focus on what's important and increase your speed of response to attacks with automated event alerts prioritised by criticality, so your team can focus on troubleshooting rather than threat hunting.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90203fb elementor-widget elementor-widget-image-box\" data-id=\"90203fb\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Threat containment and quarantine<\/h3><p class=\"elementor-image-box-description\">Remediate attacks by stopping malicious processes and quarantining analysed threats to prevent them from being executed as part of unified, one-click response capabilities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2292c42 elementor-widget elementor-widget-image-box\" data-id=\"2292c42\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">End point isolation<\/h3><p class=\"elementor-image-box-description\">Stop attacks from spreading and affecting more endpoints; you can isolate affected points from the network to prevent lateral movement.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82ecc60 elementor-widget elementor-widget-image-box\" data-id=\"82ecc60\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Recovery and full image restoration (Reimaging)<\/h3><p class=\"elementor-image-box-description\">Ensure that customers' business is always up and running and that they can quickly recover data and functionality after attacks. With best-in-class backup and recovery capabilities integrated into our one-click response system, you can recover specific files or reinstall an image of the entire endpoint.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea8b262 elementor-widget elementor-widget-image-box\" data-id=\"ea8b262\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Disaster recovery failover (with Disaster Recovery)<\/h3><p class=\"elementor-image-box-description\">Provide unparalleled business continuity with integrated disaster recovery. Automatically transition to a redundant, off-site environment in the event of attacks that disrupt customer business continuity.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f428ae elementor-widget elementor-widget-image-box\" data-id=\"2f428ae\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Remote connection to the endpoint (with Management)<\/h3><p class=\"elementor-image-box-description\">Investigate incidents further with secure remote connectivity to affected endpoints for troubleshooting and additional analysis purposes.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b15f7ac elementor-widget elementor-widget-image-box\" data-id=\"b15f7ac\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Forensics backup<\/h3><p class=\"elementor-image-box-description\">Gather evidence for further investigation, reporting, compliance and legal purposes by collecting forensic information such as memory dumps and process information and storing it in tamper-proof backups.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2211593 elementor-widget elementor-widget-image-box\" data-id=\"2211593\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Patch management (with Administration)<\/h3><p class=\"elementor-image-box-description\">As part of a one-click response to attacks, you can close vulnerabilities to prevent recurrence of future incidents with our integrated patch management for more than 250 applications.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f46bb0a elementor-widget elementor-widget-image-box\" data-id=\"f46bb0a\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Event monitoring and automatic correlations<\/h3><p class=\"elementor-image-box-description\">The solution tracks events at the endpoint level and automatically correlates them in per-event attack chain graphs.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d788c51 elementor-widget elementor-widget-image-box\" data-id=\"d788c51\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Intelligent search for IoCs focussing on emerging threats<\/h3><p class=\"elementor-image-box-description\">Instead of scanning hundreds of lines of logs, focus on what matters, such as indicators of compromise (IoCs) related to emerging threats from our real-time threat intelligence feeds, and automatically search for IoCs across all endpoints.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6588c3 elementor-widget elementor-widget-image-box\" data-id=\"f6588c3\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Malware protection for backups<\/h3><p class=\"elementor-image-box-description\">Prevent infected files from being restored from backups with built-in malware scanning, including encrypted backups. Acronis Cyber Protect Cloud scans full-disk backups in a central location to help find malware and enable users to restore a clean and malware-free backup.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23df9a5 elementor-widget elementor-widget-image-box\" data-id=\"23df9a5\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Safe recovery<\/h3><p class=\"elementor-image-box-description\">Prevent dangerous infections from occurring again with Acronis' unique secure recovery technology. During the recovery process, the integrated solution scans the backup for malware, installs the latest security patches and updates antivirus databases.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e8c481 elementor-widget elementor-widget-image-box\" data-id=\"9e8c481\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Remote device wipe<\/h3><p class=\"elementor-image-box-description\">Prevent business-critical data from falling into the wrong hands by remotely wiping compromised or lost Windows devices. You can prevent data from being wiped by disgruntled employees or accessed from lost\/stolen devices.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce14837 elementor-widget elementor-widget-image-box\" data-id=\"ce14837\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">General API for EDR<\/h3><p class=\"elementor-image-box-description\">MSSPs and MSPs specialising in security can now more easily integrate Acronis EDR into their MDR applications: especially within technologies such as SOAR and SIEM for event enrichment, management (including response actions), workflow automation and reporting.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14c59fc elementor-widget elementor-widget-image-box\" data-id=\"14c59fc\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Enhancing Microsoft Defender AV<\/h3><p class=\"elementor-image-box-description\">Acronis EDR enhances Microsoft Defender with advanced, AI-powered analysis, detection, response and recovery. MSPs gain centralised visibility, enhanced protection and built-in resiliency without replacing Defender to scale profitably.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40b6c31 elementor-widget elementor-widget-image-box\" data-id=\"40b6c31\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Potentially unwanted application (PUA) protection<\/h3><p class=\"elementor-image-box-description\">Protect against potentially unwanted applications (PUAs) that can degrade system performance, display annoying adverts or monitor user activity for commercial purposes. When detected, PUAs are quarantined or blocked according to policy settings and relevant details are integrated into EDR events for further analysis.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-77a6f55 elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none\" data-id=\"77a6f55\" data-element_type=\"section\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-default\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-942f6c3 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"942f6c3\" data-element_type=\"column\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-a0e7716 elementor-widget elementor-widget-text-editor\" data-id=\"a0e7716\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<table dir=\"ltr\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\" data-sheets-root=\"1\" data-sheets-baot=\"1\"><colgroup> <col width=\"100\" \/> <col width=\"100\" \/> <col width=\"100\" \/> <col width=\"100\" \/><\/colgroup><tbody><tr><td>Features<\/td><td>Acronis Cyber Protect Cloud<\/td><td>EDR<\/td><td>XDR<\/td><\/tr><tr><td>Behaviour-based detection<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Ransomware protection with automatic rollback<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Vulnerability assessments<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Device control<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>File and system level backup<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Inventory collection (with Acronis RMM)<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Patch management (with Acronis RMM)<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>#CyberFit Score (security posture assessment)<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Remote connection (with Acronis RMM)<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Optimisation including full image refresh<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Business continuity (with Disaster Recovery)<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Enhancing Microsoft Defender AV<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>URL filtering<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Exploit prevention<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Real-time flow of threat intelligence<\/td><td>\u2714<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Threat hunting - Early access<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Automatic, adjustable allowed list based on profiling<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Forensic data collection<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td>Event monitoring<\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Automatic event correlation<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>GenAI assistant (Acronis Copilot - Early Access)<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Prioritisation of suspicious activities<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>AI-generated event summaries<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Automated MITRE ATT&amp;CK\u00ae attack chain visualisation and interpretation<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>One-click response to incidents<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Full threat containment including endpoint quarantine and isolation<\/div><\/div><\/td><td>\u00a0<\/td><td>\u2714<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Automatic response scenarios (playbooks)<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Intelligent search for IoCs, including emerging threats<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Attack-specific undo<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Integration with Email Security (email telemetry)<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Integration with Entra ID (identity telemetry)<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Integration with Collaboration Security (telemetry of Microsoft 365 applications)<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Delete malicious email attachment or URLs<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Search for malicious attachments in mailboxes<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Blocking malicious email address<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Terminate all user sessions<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>Force user account password reset on next login<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>User account suspension<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td>MDR service<\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><tr><td><div><div>General API for EDR<\/div><\/div><\/td><td>\u00a0<\/td><td>\u00a0<\/td><td>\u2714<\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t        <section class=\"elementor-section elementor-top-section elementor-element elementor-element-14456d9 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default pxl-row-scroll-none pxl-zoom-point-false pxl-section-overflow-visible pxl-section-fix-none pxl-bg-color-none pxl-section-overlay-none elementor-invisible\" data-id=\"14456d9\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:200}\">\n\n                \n                <div class=\"elementor-container elementor-column-gap-extended\">\n                <div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e4d1ad5 pxl-column-none pxl-column-overflow-hidden-no\" data-id=\"e4d1ad5\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\r\n        <div class=\"elementor-widget-wrap elementor-element-populated\">\r\n                     \r\n        \t\t<div class=\"elementor-element elementor-element-48989d7 elementor-widget elementor-widget-pxl_heading\" data-id=\"48989d7\" data-element_type=\"widget\" data-widget_type=\"pxl_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div id=\"pxl-pxl_heading-48989d7-4278\" class=\"pxl-heading px-sub-title-default-style\">\n\t<div class=\"pxl-heading--inner\">\n\t\t\t\t\t<div class=\"pxl-item--subtitle px-sub-title-default\" data-wow-delay=\"ms\">\n\t\t\t\t<span class=\"pxl-item--subtext\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"\">FIRST STEP<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\n\t\t<h3 class=\"pxl-item--title style-default highlight-default wow clarityRise\" data-wow-delay=\"ms\">\n\n\t\t\t<span class=\"pxl-heading--text\">\n\n\t\t\t\t\t\t\t\t\tFree Preliminary Evaluation\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t<\/span>\n\t\t<\/h3>\n\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3390513 elementor-invisible elementor-widget elementor-widget-pxl_text_editor\" data-id=\"3390513\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"pxl_text_editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"pxl-text-editor\">\n\t<div class=\"pxl-item--inner\" data-wow-delay=\"ms\">\n\t\t<p>Your system and network infrastructure<br \/>Let's design together according to the needs of today and tomorrow.<\/p>\t\t\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1874d8c elementor-widget__width-auto elementor-align-center elementor-widget elementor-widget-pxl_button\" data-id=\"1874d8c\" data-element_type=\"widget\" data-widget_type=\"pxl_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pxl-pxl_button-1874d8c-9764\" class=\"pxl-button pxl-atc-link\" data-wow-delay=\"ms\">\r\n    <a href=\"https:\/\/sonotek.com.tr\/en\/communication\/\" class=\"btn pxl-icon-active btn-block-inline  btn-icon-box2 pxl-icon--right\">\r\n                    <span class=\"pxl--btn-icon\">\r\n                <i aria-hidden=\"true\" class=\"fal fa-long-arrow-right\"><\/i>                            <\/span>\r\n                <span class=\"pxl--btn-text\" data-text=\"\u0130leti\u015fim\">\r\n            Contact        <\/span>\r\n    <\/a>\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t            <\/div>\r\n        <\/div>\r\n        \t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>T\u00fcm \u00c7\u00f6z\u00fcmlerimiz Acronis EDR, yapay zeka destekli ve giderek artan siber sald\u0131r\u0131 hacmine kar\u015f\u0131 kurulu\u015flara eksiksiz bir &#8220;Tan\u0131mla, Koru, Tespit Et, M\u00fcdahale Et ve Kurtar&#8221; \u00e7er\u00e7evesi sunar. \u00c7\u00f6z\u00fcm, g\u00fcvenlik ve yedekleme (backup) yeteneklerini tek bir platformda birle\u015ftirerek i\u015f s\u00fcreklili\u011fini maksimize eder. Platformun \u00f6ne \u00e7\u0131kan temel \u00f6zellikleri \u015funlard\u0131r: Entegre M\u00fcdahale: Sald\u0131r\u0131 an\u0131nda u\u00e7 noktay\u0131 izole etme, [&hellip;]<\/p>","protected":false},"author":1,"featured_media":9315,"parent":8502,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-8615","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/pages\/8615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/comments?post=8615"}],"version-history":[{"count":13,"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/pages\/8615\/revisions"}],"predecessor-version":[{"id":9360,"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/pages\/8615\/revisions\/9360"}],"up":[{"embeddable":true,"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/pages\/8502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/media\/9315"}],"wp:attachment":[{"href":"https:\/\/sonotek.com.tr\/en\/wp-json\/wp\/v2\/media?parent=8615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}