www.acronis.com Open in urlscan Pro
34.120.97.237  Public Scan

URL: https://www.acronis.com/en-us/blog/posts/data-protection/
Submission: On December 18 via manual from IN — Scanned from DE

Form analysis 1 forms found in the DOM

<form data-v-0cc1d132="" class="el-form is-valid is-untouched is-pristine">
  <div data-v-0cc1d132="" class="el-row" style="margin-left: -8px; margin-right: -8px;"><!----> <!---->
    <div data-v-0cc1d132="" class="el-col el-col-24 el-col-sm-24 el-col-lg-24" style="padding-left: 8px; padding-right: 8px;">
      <div data-v-0cc1d132="" class="el-form-item"><!---->
        <div class="el-form-item__content">
          <div data-v-0cc1d132="" class="el-input qa-input el-input--has-label"><!---->
            <div class="el-input__container qa-input-container"><!---->
              <div class="el-input__wrapper">
                <div class="el-input__label qa-input-label"> Email address </div> <!----> <!----> <input step="any" aria-label="Email address" type="input" autocomplete="off" name="email" spellcheck="false" class="qa-input-editor el-input__editor"
                  style="opacity: 1;"> <!----> <!---->
              </div> <!----> <!---->
            </div>
          </div> <!----> <!---->
          <div class="el-form-item__error-holder"><!----></div>
        </div>
      </div>
    </div> <!---->
  </div> <!----> <!---->
  <div data-v-0cc1d132="" class="s-form-registration__checkboxes"><label data-v-0cc1d132="" role="checkbox" tabindex="0" class="el-checkbox qa-checkbox"><span class="el-checkbox__content qa-checkbox-content"><span
          class="el-checkbox__control qa-checkbox-control"><i class="i is-latest qa-icon i-check-square--16 i--size-16" style="display: none;"><!----> <svg class="svg qa-svg svg--size-16"><use href="#mo-check-square--16"></use></svg></i> <input
            type="checkbox" tabindex="-1" name="terms" class="el-checkbox__original qa-checkbox-original" value=""></span> <span class="el-checkbox__label qa-checkbox-label el-text el-text--body-32 el-text--ellipsis">
          <div data-v-0cc1d132="" class="a-dangerous-html">I agree to the <a target="_blank" href="/en-us/company/privacy/">Acronis Privacy Statement</a></div>
        </span></span> <!----></label></div> <!----> <!----> <button data-v-0cc1d132="" type="button" target="_self" class="a-button s-form-registration__button a-button_type a-button_type_main a-button_size_m"><span
      class="a-button__content">Subscribe</span> <!----></button> <!----> <!----> <!----> <!---->
</form>

Text Content

Sie befinden sich auf der Website für USA und Kanada. Ändern Sie die Region,
damit für Ihre Region passende Inhalte angezeigt werden:
Germany + Switzerland
Deutsch
Germany + Switzerland
Deutsch
United States + Canada
English
Ändern Sie die Region



CHOOSE REGION AND LANGUAGE


AMERICAS

 * Brasil Português
 * Mexico Español
 * United States + Canada English


ASIA-PACIFIC

 * Chinese Simplified 简体中文
 * Chinese Traditional 繁體中文
 * Japan 日本語
 * Indonesia Bahasa Indonesia
 * Korea 한국어
 * Singapore English
 * Vietnam Tiếng Việt
 * India हिन्दी


EUROPE, MIDDLE EAST AND AFRICA

 * Bulgaria Български
 * Czech Čeština
 * Europe English
 * France Français
 * Germany + Switzerland Deutsch
 * Israel עברית
 * Italy Italiano
 * Poland Polski
 * Romania Română
 * Spain Español
 * Sweden Svenska
 * Turkey Türkçe
 * United Kingdom English
 * Hungary Magyar
 * Netherlands Dutch

 * Americas
    * Brasil Português
    * Mexico Español
    * United States + Canada English

 * Asia-Pacific
    * Chinese Simplified 简体中文
    * Chinese Traditional 繁體中文
    * Japan 日本語
    * Indonesia Bahasa Indonesia
    * Korea 한국어
    * Singapore English
    * Vietnam Tiếng Việt
    * India हिन्दी

 * Europe, Middle East and Africa
    * Bulgaria Български
    * Czech Čeština
    * Europe English
    * France Français
    * Germany + Switzerland Deutsch
    * Israel עברית
    * Italy Italiano
    * Poland Polski
    * Romania Română
    * Spain Español
    * Sweden Svenska
    * Turkey Türkçe
    * United Kingdom English
    * Hungary Magyar
    * Netherlands Dutch

Fortfahren

 * Products
 * Solutions
 * Partners
 * Support
 * Resources
 * Company

Contact us
 * Contact sales
 * Contact support

Login
 * Acronis Account Manage all of your Acronis software products
 * Cyber Protection Console Access and administer your client cloud solutions
 * Partner Portal All partner-related resources and tools at your fingertips
 * Connect Console Login to Acronis Connect Console


Menu Close
 * Products
   For service providers
   Acronis Cyber Protect Cloud
   Empowering service providers with backup, DR, cybersecurity, and endpoint
   management in one integrated solution
    * Advanced Security + EDR
    * Advanced Security
    * Advanced Management
    * Advanced Automation
    * Advanced Backup
    * Advanced Disaster Recovery
    * Advanced Email Security
    * Advanced Data Loss Prevention (DLP)
    * Advanced File Sync and Share
   
    * Try now
    * Get demo
   
   For businesses
   Acronis Cyber Protect
   The unique integration of backup, disaster recovery, cybersecurity, and
   endpoint management in one solution
    * Backup and recovery
    * Cybersecurity
    * Endpoint protection management
   
    * Try it free
   
    * Acronis Cyber Protect Connect
    * Acronis DeviceLock DLP
    * Acronis Snap Deploy
      -20%
   
   Acronis Cyber Protect Connect is a remote access solution to remotely manage
   client workloads — quickly and easily.
   For home
   Acronis Cyber Protect Home Office
   Formerly Acronis True Image, it's the only personal cyber protection solution
   that delivers easy-to-use, integrated backup and anti-malware in one
    * See plans
   
    * Acronis Cyber Protect Connect
    * Acronis VSS Doctor
    * Acronis #CyberFit Score
   
    * All products
   
   Looking to update or renew your product or contact us for help?
 * Solutions
   All solutions for service providers
    * Managed server backup
    * Recovery
    * Hosting service providers
   
   All solutions for businesses
    * File backup and recovery
    * Ransomware protection
    * IT disaster recovery
   
   Environment
    * Windows server backup
    * Microsoft 365 backup
    * Microsoft Azure VM backup
    * Google Workspace backup
    * Linux server backup
    * Hyper-V backup
   
   Industries
    * Government
    * Manufacturing
   
   Integrations
    * ConnectWise Manage
    * Datto RMM
    * Microsoft Intune
    * NinjaOne
    * Paessler PRTG
   
    * See all 80+ Integrations

 * Partners
   Acronis #CyberFit Partner Program
   One partner program. Total cyber protection.
    * Join the partner program
    * Partner portal login
   
   Benefits designed for you
    * Service providers
    * Resellers
    * Affiliates
    * OEMs
   
   Support for your business
    * Find an IT provider
    * Find a distributor
    * Partner Certification
      Access all sales and technical training for existing and prospect partners
    * MSP Academy
      Vendor-neutral training, covering the A-Z of managing an MSP business
   
   Go further with cyber protection
    * Acronis #CyberFit Technology Partner Program
      One tiered program to build and promote your custom solution
    * Acronis Developer Network
      Developer community and resources in our Technology Partner Program

 * Support
   Resources
    * Documentation
    * Knowledge Base
    * Acronis Academy
    * Product updates
    * Product support lifecycle
   
   Support by category
    * Business environments
    * Managed services
    * Home and individual use
    * Remote work
   
   Need more help?
    * Contact sales
    * Customer service and support
    * Renew your product
    * Professional Services
    * Forum
   
   Logins
    * Cyber Protection Console
      Access and administer your client cloud solutions
    * Partner Certification
      Access sales and technical training for partners

 * Resources
   Acronis Resource Center
   Browse through a full list of the latest product documentation, case studies,
   white papers, eBooks, upcoming and on-demand webinars of Acronis
    * Cyber Protection Operation Center
    * Acronis Blog
   
   Product resources
    * Datasheets
    * White Papers
    * Case Studies
    * eBooks
    * Analyst reports
   
   Acronis Academy
    * Partner Certification
      Access all sales and technical training for existing and prospect partners
    * MSP Academy
      Vendor-neutral training, covering the A-Z of managing an MSP business
   
   Events, webinars and trainings
    * Upcoming events and webinars
    * On-demand videos
    * Other videos
    * Trainings and certifications

 * Company
   Company
    * About us
    * Vision
    * History
    * Careers
    * Contacts
    * Press releases
    * Cloud data centers
   
   Technologies
    * Active Protection
    * AnyData Engine
    * Acronis Notary
    * Universal Restore
    * Anti-malware
   
   Company policies
    * Trust and security
    * Sustainability and governance
   
   Special projects
    * Acronis #CyberFit Sports
      See how the world’s leading sports teams use cyber protection to gain a
      competitive advantage.
    * Acronis Cyber Foundation
      Discover how we can work together to create, spread, and protect knowledge
      to build a better future.


Back
April 12, 2018  —  Acronis
Cybersecurity Endpoint protection


ACRONIS NOTARY: A NEW WAY TO PROVE DATA AUTHENTICITY VIA BLOCKCHAIN

Share
 * 
 * 
 * 
 * 

Acronis Cyber Protect Cloud
for service providers
View Live Demo

Other languages available: Deutsch Francais 日本語

Acronis Notary is a new, innovative service based on blockchain technology. But
before we move into that, let’s define what a blockchain is. It can be known to
some due to its usage in Bitcoin currency, but it’s a lot more than just bitcoin
technology and it can be used in a much wider set of scenarios, such as for data
protection.

Many industries have already started to use blockchain or are actively looking
into it. For example, cloud storage, art and ownership, anti-counterfeiting,
governance, Internet of things, and digital identity.


BUT WHAT IS BLOCKCHAIN TECHNOLOGY?

A blockchain is a distributed database that maintains a continuously growing
list of records that are secured from tampering and revision. It consists of
data-structure blocks that may contain data or programs, with each block holding
batches of individual transactions, and the results of any blockchain
executables. Every node in a decentralized system has a copy of the blockchain.
No centralized "official" copy exists and no user is "trusted" more than any
other. 

The blockchain resides across a network of computers (nodes). Whenever new
transactions occur, the blockchain is authenticated across this distributed
network, before the transaction can be included as the next block on the chain.
So, the consensus of nodes is required to add the block into the blockchain.

The blockchain creates trust because a complete copy of the chain, which shows
every transaction, is held by the entire network. If someone attempts to cheat
the system, they can be easily identified.

To summarize, a blockchain is an append-only database with transaction order and
the following data protection properties:

 * Immutable data storage
 * Secure time-stamping
 * Public audit


ACRONIS NOTARY SERVICE: HOW DOES IT WORK?

Acronis Notary is the universal solution for timestamping and fingerprinting any
data objects and streams. It is impractical to store big chunks of data in a
blockchain, which is why Acronis products will only send file/backup hashes to
the Notary service. The Notary service then calculates a single hash by using
the received file hashes, and then sends the new hash to the Etherium
(Blockchain-based distributed computing platform). The Notary service provides a
certificate and technical details about how to verify the certificate to the
user of Acronis Cyber Backup Cloud. Then, whenever that file is reflected in an
Acronis True Image user interface, the file is shown as notarized by Acronis.
This ensures that a user can be assured that the file that is being stored is in
fact identical, on a bit-by-bit basis, with what was backed up and stored in the
cloud — whether it was a few hours ago, or a few months ago.

Acronis Notary service – how it works

ACRONIS NOTARY TECHNOLOGY CAN PROTECT ANY DATA IN ANY INDUSTRY. COMMON USE CASES
INCLUDE:

 * Proof of document ownership, including real-life and digital-work
   attribution. It works very well for protection of intellectual property and,
   for example, certifying who created, accessed, or modified a document.
 * Certification that a document existed.
 * Time-stamping is critical for digital contracts, research data, medical
   records, evidence, petitions, purchase orders, etc. Users can seamlessly and
   irrefutably prove the exact moment data in a document existed, for legal,
   compliance, and business purposes. Users also can create a registry of
   digitized copies of paper documents, proving their existence at a certain
   time.
 * Proof of Integrity. For example, the ability to demonstrate that data has not
   been tampered with.
 * Facilitation of sales and trading of digital assets or real objects, and
   digital rights management.
 * Users can digitally trace the document and find information about the
   file/document movement.
 * Proof of the product’s authenticity.

It goes even further when we talk about usage for Acronis Notary and blockchain
for business: chain-of-evidence for court documents, police video or security
camera footage, long-term archiving that could be subject to IT audits, and
‘consortium’ data storage where multiple entities or individuals need to
securely store and exchange massive amounts of data and information.

If we are talking about an individual user’s documents, these are examples of
what they may need to sign and notarize:

 * Rental/lease agreements
 * Sales contracts or asset purchase agreements
 * Loan agreement
 * Permission slips
 * Financial documents
 * Insurance documents
 * Liability waiver
 * Healthcare documents
 * Research papers
 * Certificate of product authenticity
 * Nondisclosure agreements
 * Offer letters
 * Confidentiality agreements
 * Independent contractor agreements

LET’S LOOK AT FEW EASY EXAMPLES OF ACRONIS NOTARY USAGE:

 1. Sally is a composer and she has been skeptical about publishing her work on
    the Internet. Using blockchain certification as a tool for copyright
    protection can change her mind. Sally can create a protected backup of a
    folder that contains her work. Once the backup is completed, she can obtain
    a registration certificate with cryptographic evidence that protects her
    copyright. The record is permanent and immutable. Sally can prove that her
    piece of art existed at a certain time in past, was authored by her, and
    claim her ownership for it.
 2. Bill is a lawyer, and he needs to prove to a judge and jury that a file in
    his possession can be proven to have been in existence on a certain
    date/time. Using Acronis Notary, Bill can tie the file in his possession to
    data on an Ethereum blockchain, which mathematically proves the existence of
    the file.
 3. Emily bought a certified diamond and notarized the certificate and the
    invoice by using Acronis Notary. After a period of time, she decides to sell
    the diamond. A buyer can use Acronis Notary to verify the initial
    certificate. Once a buyer is confident about the original certificate, he
    can then compare certification with a stone by using a third-party’s
    professional evaluation.
 4. Roger has an archive of paid bills that he keeps in electronic form. He
    keeps all bills in the notarized backup. One day, Roger receives an overdue
    notice for a bill that he paid two years ago. The record in blockchain is
    permanent and immutable. Roger can prove that this bill was sent by mistake.

As you can see, in all cases using Acronis Notary technology, you compare a
“new” document with the original document’s certificate or just present original
certificate to prove your document timestamp and authenticity. 


ACRONIS ASIGN

Notary is actually a foundation for another Acronis service within consumer
product line called ASign. It is an easy to use web interface which allows you
to digitally sign documents without having to print, sign, and scan them. It
supports sending documents to multiple signatories at the same time which
results in PDF file with all the details on the file and audit trail including
timestamps. The hash of this PDF is computed and goes to Acronis Notary,
creating a secure trail of the signatures in the blockchain.

At the moment you can only sign files stored in your Acronis Cloud backup. This
is done for security and authenticity reasons.


YOUR GUARANTEE THAT FILES ARE STILL EXACTLY THE SAME

Acronis Notary protects any data from tampering and deleting because data
immutability is algorithmically protected by the blockchain technology and can
be verified independently. A carefully designed service architecture ensures the
high throughput necessary for a wide range of industrial solutions. Because of
this, Acronis Notary can be installed as a proxy on any existing data stream and
requires no changes in the existing processes or infrastructure. More than that,
it can be deployed either in the cloud or on-premises

Download pdf version of Notary Data Protection

Share
 * 
 * 
 * 
 * 

Previous post
Acronis
Next post

About Acronis

Acronis is a Swiss company, founded in Singapore. Celebrating two decades of
innovation, Acronis has more than 1,800 employees in 45 locations. The Acronis
Cyber Protect Cloud solution is available in 26 languages in over 150 countries
and is used by 20,000 service providers to protect over 750,000 businesses.

Cybersecurity Data protection Cloud backup Disaster recovery
Stay up-to-date
Subscribe now for tips, tools and news.
Email address

I agree to the Acronis Privacy Statement
Subscribe
Check out a sample newsletter
Monthly digest from the Acronis Blog
Articles
How the New Acronis #CyberFit Academy Empowers Partners asdasd…

As the novel coronavirus/COVID-19 continues to spread, impacting individuals,
organizations, and communities across the globe, we want to share how Acronis is
responding to the pandemic.

New update adds vulnerability assessments to Acronis True …

Working from home has become a critical part of containing the virus, but for
small to mid-size businesses tackling remote work for the first time, there are
security considerations to keep in mind.

New update adds vulnerability assessments to Acronis True …

With the coronavirus on the verge of being declared a global pandemic and
thousands dead in its wake, there are sick attempts by criminals to scam
unsuspected victims to profit from the illness.

Looking Forward to Better Days

Travel may be restricted and conferences canceled, but this crisis will
eventually pass. To give us something to look forward to, let’s look at the
session tracks for the 2020 Acronis Global Cyber Summit.

--------------------------------------------------------------------------------

Insights, trends, and analysis
Find a story

© 2023 Acronis International GmbH.
Rheinweg 9, 8200 Schaffhausen, Switzerland.
© All rights reserved.

Your information is used in accordance with our privacy statement. You receive
this email because you are subscribed for a blog newsletter.

 * Customer Service
 * Send Feedback
 * Manage Subscriptions
 * Company Blog

 * 
 * 
 * 
 * 
 * 


MORE FROM ACRONIS

December 14, 2023  — 4 min read

December 14, 2023  — 4 min read
Why your health care data protection strategy should include intellectual prop…
In today's real-world ransomware incidents in health care, patient data isn’t
always the principal target of cyberattacks. Health care intellectual…
December 06, 2023  — 3 min read

December 06, 2023  — 3 min read
Unlock your true potential with MSP Academy training and certification
Acronis is proud to announce the launch of MSP Academy, a comprehensive training
program designed specifically for MSPs. With a focus o…
December 06, 2023  — 12 min read

December 06, 2023  — 12 min read
Hybrid cloud storage: Bridging the gap between flexibility and security
In the face of growing digital uncertainty, more and more businesses are turning
to hybrid cloud storage for data management and protection.…
November 30, 2023  — 3 min read

November 30, 2023  — 3 min read
Acronis named a Leader in IDC's Worldwide Cyber-Recovery 2023 Vendor…
Acronis is named a Leader in the 2023 IDC MarketScape for worldwide
cyber-recovery. This prestigious recognition highlights the gro…
Engage with Acronis
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 

© 2003–2023 Acronis International GmbH.
 * Legal information
 * Privacy policy
   
 * United States + Canada
   
   
   CHOOSE REGION AND LANGUAGE
   
   
   AMERICAS
   
    * Brasil Português
    * Mexico Español
    * United States + Canada English
   
   
   ASIA-PACIFIC
   
    * Chinese Simplified 简体中文
    * Chinese Traditional 繁體中文
    * Japan 日本語
    * Indonesia Bahasa Indonesia
    * Korea 한국어
    * Singapore English
    * Vietnam Tiếng Việt
    * India हिन्दी
   
   
   EUROPE, MIDDLE EAST AND AFRICA
   
    * Bulgaria Български
    * Czech Čeština
    * Europe English
    * France Français
    * Germany + Switzerland Deutsch
    * Israel עברית
    * Italy Italiano
    * Poland Polski
    * Romania Română
    * Spain Español
    * Sweden Svenska
    * Turkey Türkçe
    * United Kingdom English
    * Hungary Magyar
    * Netherlands Dutch
   
    * Americas
       * Brasil Português
       * Mexico Español
       * United States + Canada English
   
    * Asia-Pacific
       * Chinese Simplified 简体中文
       * Chinese Traditional 繁體中文
       * Japan 日本語
       * Indonesia Bahasa Indonesia
       * Korea 한국어
       * Singapore English
       * Vietnam Tiếng Việt
       * India हिन्दी
   
    * Europe, Middle East and Africa
       * Bulgaria Български
       * Czech Čeština
       * Europe English
       * France Français
       * Germany + Switzerland Deutsch
       * Israel עברית
       * Italy Italiano
       * Poland Polski
       * Romania Română
       * Spain Español
       * Sweden Svenska
       * Turkey Türkçe
       * United Kingdom English
       * Hungary Magyar
       * Netherlands Dutch

The Most Reliable, Secure Business Backup

Backup unlimited endpoints, physical/virtual servers, databases, applications,
and cloud workloads

Free 30-day Trial