www.acronis.com
Open in
urlscan Pro
34.120.97.237
Public Scan
URL:
https://www.acronis.com/en-us/blog/posts/data-protection/
Submission: On December 18 via manual from IN — Scanned from DE
Submission: On December 18 via manual from IN — Scanned from DE
Form analysis
1 forms found in the DOM<form data-v-0cc1d132="" class="el-form is-valid is-untouched is-pristine">
<div data-v-0cc1d132="" class="el-row" style="margin-left: -8px; margin-right: -8px;"><!----> <!---->
<div data-v-0cc1d132="" class="el-col el-col-24 el-col-sm-24 el-col-lg-24" style="padding-left: 8px; padding-right: 8px;">
<div data-v-0cc1d132="" class="el-form-item"><!---->
<div class="el-form-item__content">
<div data-v-0cc1d132="" class="el-input qa-input el-input--has-label"><!---->
<div class="el-input__container qa-input-container"><!---->
<div class="el-input__wrapper">
<div class="el-input__label qa-input-label"> Email address </div> <!----> <!----> <input step="any" aria-label="Email address" type="input" autocomplete="off" name="email" spellcheck="false" class="qa-input-editor el-input__editor"
style="opacity: 1;"> <!----> <!---->
</div> <!----> <!---->
</div>
</div> <!----> <!---->
<div class="el-form-item__error-holder"><!----></div>
</div>
</div>
</div> <!---->
</div> <!----> <!---->
<div data-v-0cc1d132="" class="s-form-registration__checkboxes"><label data-v-0cc1d132="" role="checkbox" tabindex="0" class="el-checkbox qa-checkbox"><span class="el-checkbox__content qa-checkbox-content"><span
class="el-checkbox__control qa-checkbox-control"><i class="i is-latest qa-icon i-check-square--16 i--size-16" style="display: none;"><!----> <svg class="svg qa-svg svg--size-16"><use href="#mo-check-square--16"></use></svg></i> <input
type="checkbox" tabindex="-1" name="terms" class="el-checkbox__original qa-checkbox-original" value=""></span> <span class="el-checkbox__label qa-checkbox-label el-text el-text--body-32 el-text--ellipsis">
<div data-v-0cc1d132="" class="a-dangerous-html">I agree to the <a target="_blank" href="/en-us/company/privacy/">Acronis Privacy Statement</a></div>
</span></span> <!----></label></div> <!----> <!----> <button data-v-0cc1d132="" type="button" target="_self" class="a-button s-form-registration__button a-button_type a-button_type_main a-button_size_m"><span
class="a-button__content">Subscribe</span> <!----></button> <!----> <!----> <!----> <!---->
</form>
Text Content
Sie befinden sich auf der Website für USA und Kanada. Ändern Sie die Region, damit für Ihre Region passende Inhalte angezeigt werden: Germany + Switzerland Deutsch Germany + Switzerland Deutsch United States + Canada English Ändern Sie die Region CHOOSE REGION AND LANGUAGE AMERICAS * Brasil Português * Mexico Español * United States + Canada English ASIA-PACIFIC * Chinese Simplified 简体中文 * Chinese Traditional 繁體中文 * Japan 日本語 * Indonesia Bahasa Indonesia * Korea 한국어 * Singapore English * Vietnam Tiếng Việt * India हिन्दी EUROPE, MIDDLE EAST AND AFRICA * Bulgaria Български * Czech Čeština * Europe English * France Français * Germany + Switzerland Deutsch * Israel עברית * Italy Italiano * Poland Polski * Romania Română * Spain Español * Sweden Svenska * Turkey Türkçe * United Kingdom English * Hungary Magyar * Netherlands Dutch * Americas * Brasil Português * Mexico Español * United States + Canada English * Asia-Pacific * Chinese Simplified 简体中文 * Chinese Traditional 繁體中文 * Japan 日本語 * Indonesia Bahasa Indonesia * Korea 한국어 * Singapore English * Vietnam Tiếng Việt * India हिन्दी * Europe, Middle East and Africa * Bulgaria Български * Czech Čeština * Europe English * France Français * Germany + Switzerland Deutsch * Israel עברית * Italy Italiano * Poland Polski * Romania Română * Spain Español * Sweden Svenska * Turkey Türkçe * United Kingdom English * Hungary Magyar * Netherlands Dutch Fortfahren * Products * Solutions * Partners * Support * Resources * Company Contact us * Contact sales * Contact support Login * Acronis Account Manage all of your Acronis software products * Cyber Protection Console Access and administer your client cloud solutions * Partner Portal All partner-related resources and tools at your fingertips * Connect Console Login to Acronis Connect Console Menu Close * Products For service providers Acronis Cyber Protect Cloud Empowering service providers with backup, DR, cybersecurity, and endpoint management in one integrated solution * Advanced Security + EDR * Advanced Security * Advanced Management * Advanced Automation * Advanced Backup * Advanced Disaster Recovery * Advanced Email Security * Advanced Data Loss Prevention (DLP) * Advanced File Sync and Share * Try now * Get demo For businesses Acronis Cyber Protect The unique integration of backup, disaster recovery, cybersecurity, and endpoint management in one solution * Backup and recovery * Cybersecurity * Endpoint protection management * Try it free * Acronis Cyber Protect Connect * Acronis DeviceLock DLP * Acronis Snap Deploy -20% Acronis Cyber Protect Connect is a remote access solution to remotely manage client workloads — quickly and easily. For home Acronis Cyber Protect Home Office Formerly Acronis True Image, it's the only personal cyber protection solution that delivers easy-to-use, integrated backup and anti-malware in one * See plans * Acronis Cyber Protect Connect * Acronis VSS Doctor * Acronis #CyberFit Score * All products Looking to update or renew your product or contact us for help? * Solutions All solutions for service providers * Managed server backup * Recovery * Hosting service providers All solutions for businesses * File backup and recovery * Ransomware protection * IT disaster recovery Environment * Windows server backup * Microsoft 365 backup * Microsoft Azure VM backup * Google Workspace backup * Linux server backup * Hyper-V backup Industries * Government * Manufacturing Integrations * ConnectWise Manage * Datto RMM * Microsoft Intune * NinjaOne * Paessler PRTG * See all 80+ Integrations * Partners Acronis #CyberFit Partner Program One partner program. Total cyber protection. * Join the partner program * Partner portal login Benefits designed for you * Service providers * Resellers * Affiliates * OEMs Support for your business * Find an IT provider * Find a distributor * Partner Certification Access all sales and technical training for existing and prospect partners * MSP Academy Vendor-neutral training, covering the A-Z of managing an MSP business Go further with cyber protection * Acronis #CyberFit Technology Partner Program One tiered program to build and promote your custom solution * Acronis Developer Network Developer community and resources in our Technology Partner Program * Support Resources * Documentation * Knowledge Base * Acronis Academy * Product updates * Product support lifecycle Support by category * Business environments * Managed services * Home and individual use * Remote work Need more help? * Contact sales * Customer service and support * Renew your product * Professional Services * Forum Logins * Cyber Protection Console Access and administer your client cloud solutions * Partner Certification Access sales and technical training for partners * Resources Acronis Resource Center Browse through a full list of the latest product documentation, case studies, white papers, eBooks, upcoming and on-demand webinars of Acronis * Cyber Protection Operation Center * Acronis Blog Product resources * Datasheets * White Papers * Case Studies * eBooks * Analyst reports Acronis Academy * Partner Certification Access all sales and technical training for existing and prospect partners * MSP Academy Vendor-neutral training, covering the A-Z of managing an MSP business Events, webinars and trainings * Upcoming events and webinars * On-demand videos * Other videos * Trainings and certifications * Company Company * About us * Vision * History * Careers * Contacts * Press releases * Cloud data centers Technologies * Active Protection * AnyData Engine * Acronis Notary * Universal Restore * Anti-malware Company policies * Trust and security * Sustainability and governance Special projects * Acronis #CyberFit Sports See how the world’s leading sports teams use cyber protection to gain a competitive advantage. * Acronis Cyber Foundation Discover how we can work together to create, spread, and protect knowledge to build a better future. Back April 12, 2018 — Acronis Cybersecurity Endpoint protection ACRONIS NOTARY: A NEW WAY TO PROVE DATA AUTHENTICITY VIA BLOCKCHAIN Share * * * * Acronis Cyber Protect Cloud for service providers View Live Demo Other languages available: Deutsch Francais 日本語 Acronis Notary is a new, innovative service based on blockchain technology. But before we move into that, let’s define what a blockchain is. It can be known to some due to its usage in Bitcoin currency, but it’s a lot more than just bitcoin technology and it can be used in a much wider set of scenarios, such as for data protection. Many industries have already started to use blockchain or are actively looking into it. For example, cloud storage, art and ownership, anti-counterfeiting, governance, Internet of things, and digital identity. BUT WHAT IS BLOCKCHAIN TECHNOLOGY? A blockchain is a distributed database that maintains a continuously growing list of records that are secured from tampering and revision. It consists of data-structure blocks that may contain data or programs, with each block holding batches of individual transactions, and the results of any blockchain executables. Every node in a decentralized system has a copy of the blockchain. No centralized "official" copy exists and no user is "trusted" more than any other. The blockchain resides across a network of computers (nodes). Whenever new transactions occur, the blockchain is authenticated across this distributed network, before the transaction can be included as the next block on the chain. So, the consensus of nodes is required to add the block into the blockchain. The blockchain creates trust because a complete copy of the chain, which shows every transaction, is held by the entire network. If someone attempts to cheat the system, they can be easily identified. To summarize, a blockchain is an append-only database with transaction order and the following data protection properties: * Immutable data storage * Secure time-stamping * Public audit ACRONIS NOTARY SERVICE: HOW DOES IT WORK? Acronis Notary is the universal solution for timestamping and fingerprinting any data objects and streams. It is impractical to store big chunks of data in a blockchain, which is why Acronis products will only send file/backup hashes to the Notary service. The Notary service then calculates a single hash by using the received file hashes, and then sends the new hash to the Etherium (Blockchain-based distributed computing platform). The Notary service provides a certificate and technical details about how to verify the certificate to the user of Acronis Cyber Backup Cloud. Then, whenever that file is reflected in an Acronis True Image user interface, the file is shown as notarized by Acronis. This ensures that a user can be assured that the file that is being stored is in fact identical, on a bit-by-bit basis, with what was backed up and stored in the cloud — whether it was a few hours ago, or a few months ago. Acronis Notary service – how it works ACRONIS NOTARY TECHNOLOGY CAN PROTECT ANY DATA IN ANY INDUSTRY. COMMON USE CASES INCLUDE: * Proof of document ownership, including real-life and digital-work attribution. It works very well for protection of intellectual property and, for example, certifying who created, accessed, or modified a document. * Certification that a document existed. * Time-stamping is critical for digital contracts, research data, medical records, evidence, petitions, purchase orders, etc. Users can seamlessly and irrefutably prove the exact moment data in a document existed, for legal, compliance, and business purposes. Users also can create a registry of digitized copies of paper documents, proving their existence at a certain time. * Proof of Integrity. For example, the ability to demonstrate that data has not been tampered with. * Facilitation of sales and trading of digital assets or real objects, and digital rights management. * Users can digitally trace the document and find information about the file/document movement. * Proof of the product’s authenticity. It goes even further when we talk about usage for Acronis Notary and blockchain for business: chain-of-evidence for court documents, police video or security camera footage, long-term archiving that could be subject to IT audits, and ‘consortium’ data storage where multiple entities or individuals need to securely store and exchange massive amounts of data and information. If we are talking about an individual user’s documents, these are examples of what they may need to sign and notarize: * Rental/lease agreements * Sales contracts or asset purchase agreements * Loan agreement * Permission slips * Financial documents * Insurance documents * Liability waiver * Healthcare documents * Research papers * Certificate of product authenticity * Nondisclosure agreements * Offer letters * Confidentiality agreements * Independent contractor agreements LET’S LOOK AT FEW EASY EXAMPLES OF ACRONIS NOTARY USAGE: 1. Sally is a composer and she has been skeptical about publishing her work on the Internet. Using blockchain certification as a tool for copyright protection can change her mind. Sally can create a protected backup of a folder that contains her work. Once the backup is completed, she can obtain a registration certificate with cryptographic evidence that protects her copyright. The record is permanent and immutable. Sally can prove that her piece of art existed at a certain time in past, was authored by her, and claim her ownership for it. 2. Bill is a lawyer, and he needs to prove to a judge and jury that a file in his possession can be proven to have been in existence on a certain date/time. Using Acronis Notary, Bill can tie the file in his possession to data on an Ethereum blockchain, which mathematically proves the existence of the file. 3. Emily bought a certified diamond and notarized the certificate and the invoice by using Acronis Notary. After a period of time, she decides to sell the diamond. A buyer can use Acronis Notary to verify the initial certificate. Once a buyer is confident about the original certificate, he can then compare certification with a stone by using a third-party’s professional evaluation. 4. Roger has an archive of paid bills that he keeps in electronic form. He keeps all bills in the notarized backup. One day, Roger receives an overdue notice for a bill that he paid two years ago. The record in blockchain is permanent and immutable. Roger can prove that this bill was sent by mistake. As you can see, in all cases using Acronis Notary technology, you compare a “new” document with the original document’s certificate or just present original certificate to prove your document timestamp and authenticity. ACRONIS ASIGN Notary is actually a foundation for another Acronis service within consumer product line called ASign. It is an easy to use web interface which allows you to digitally sign documents without having to print, sign, and scan them. It supports sending documents to multiple signatories at the same time which results in PDF file with all the details on the file and audit trail including timestamps. The hash of this PDF is computed and goes to Acronis Notary, creating a secure trail of the signatures in the blockchain. At the moment you can only sign files stored in your Acronis Cloud backup. This is done for security and authenticity reasons. YOUR GUARANTEE THAT FILES ARE STILL EXACTLY THE SAME Acronis Notary protects any data from tampering and deleting because data immutability is algorithmically protected by the blockchain technology and can be verified independently. A carefully designed service architecture ensures the high throughput necessary for a wide range of industrial solutions. Because of this, Acronis Notary can be installed as a proxy on any existing data stream and requires no changes in the existing processes or infrastructure. More than that, it can be deployed either in the cloud or on-premises Download pdf version of Notary Data Protection Share * * * * Previous post Acronis Next post About Acronis Acronis is a Swiss company, founded in Singapore. Celebrating two decades of innovation, Acronis has more than 1,800 employees in 45 locations. The Acronis Cyber Protect Cloud solution is available in 26 languages in over 150 countries and is used by 20,000 service providers to protect over 750,000 businesses. Cybersecurity Data protection Cloud backup Disaster recovery Stay up-to-date Subscribe now for tips, tools and news. Email address I agree to the Acronis Privacy Statement Subscribe Check out a sample newsletter Monthly digest from the Acronis Blog Articles How the New Acronis #CyberFit Academy Empowers Partners asdasd… As the novel coronavirus/COVID-19 continues to spread, impacting individuals, organizations, and communities across the globe, we want to share how Acronis is responding to the pandemic. New update adds vulnerability assessments to Acronis True … Working from home has become a critical part of containing the virus, but for small to mid-size businesses tackling remote work for the first time, there are security considerations to keep in mind. New update adds vulnerability assessments to Acronis True … With the coronavirus on the verge of being declared a global pandemic and thousands dead in its wake, there are sick attempts by criminals to scam unsuspected victims to profit from the illness. Looking Forward to Better Days Travel may be restricted and conferences canceled, but this crisis will eventually pass. To give us something to look forward to, let’s look at the session tracks for the 2020 Acronis Global Cyber Summit. -------------------------------------------------------------------------------- Insights, trends, and analysis Find a story © 2023 Acronis International GmbH. Rheinweg 9, 8200 Schaffhausen, Switzerland. © All rights reserved. Your information is used in accordance with our privacy statement. You receive this email because you are subscribed for a blog newsletter. * Customer Service * Send Feedback * Manage Subscriptions * Company Blog * * * * * MORE FROM ACRONIS December 14, 2023 — 4 min read December 14, 2023 — 4 min read Why your health care data protection strategy should include intellectual prop… In today's real-world ransomware incidents in health care, patient data isn’t always the principal target of cyberattacks. Health care intellectual… December 06, 2023 — 3 min read December 06, 2023 — 3 min read Unlock your true potential with MSP Academy training and certification Acronis is proud to announce the launch of MSP Academy, a comprehensive training program designed specifically for MSPs. With a focus o… December 06, 2023 — 12 min read December 06, 2023 — 12 min read Hybrid cloud storage: Bridging the gap between flexibility and security In the face of growing digital uncertainty, more and more businesses are turning to hybrid cloud storage for data management and protection.… November 30, 2023 — 3 min read November 30, 2023 — 3 min read Acronis named a Leader in IDC's Worldwide Cyber-Recovery 2023 Vendor… Acronis is named a Leader in the 2023 IDC MarketScape for worldwide cyber-recovery. This prestigious recognition highlights the gro… Engage with Acronis * * * * * * * * © 2003–2023 Acronis International GmbH. * Legal information * Privacy policy * United States + Canada CHOOSE REGION AND LANGUAGE AMERICAS * Brasil Português * Mexico Español * United States + Canada English ASIA-PACIFIC * Chinese Simplified 简体中文 * Chinese Traditional 繁體中文 * Japan 日本語 * Indonesia Bahasa Indonesia * Korea 한국어 * Singapore English * Vietnam Tiếng Việt * India हिन्दी EUROPE, MIDDLE EAST AND AFRICA * Bulgaria Български * Czech Čeština * Europe English * France Français * Germany + Switzerland Deutsch * Israel עברית * Italy Italiano * Poland Polski * Romania Română * Spain Español * Sweden Svenska * Turkey Türkçe * United Kingdom English * Hungary Magyar * Netherlands Dutch * Americas * Brasil Português * Mexico Español * United States + Canada English * Asia-Pacific * Chinese Simplified 简体中文 * Chinese Traditional 繁體中文 * Japan 日本語 * Indonesia Bahasa Indonesia * Korea 한국어 * Singapore English * Vietnam Tiếng Việt * India हिन्दी * Europe, Middle East and Africa * Bulgaria Български * Czech Čeština * Europe English * France Français * Germany + Switzerland Deutsch * Israel עברית * Italy Italiano * Poland Polski * Romania Română * Spain Español * Sweden Svenska * Turkey Türkçe * United Kingdom English * Hungary Magyar * Netherlands Dutch The Most Reliable, Secure Business Backup Backup unlimited endpoints, physical/virtual servers, databases, applications, and cloud workloads Free 30-day Trial