{"id":8961,"date":"2020-12-07T13:05:57","date_gmt":"2020-12-07T12:05:57","guid":{"rendered":"https:\/\/sertalink.com\/?page_id=8961"},"modified":"2020-12-07T13:10:02","modified_gmt":"2020-12-07T12:10:02","slug":"acronis-cloud-security","status":"publish","type":"page","link":"https:\/\/www.sertalink.com\/fr\/acronis-cloud-security\/","title":{"rendered":"Acronis Cloud Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;||0px|||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2020\/12\/me1-114.png&#8221; title_text=&#8221;me1&#8243; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; admin_label=&#8221;Image&#8221; _builder_version=&#8221;4.6.6&#8243; background_image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2020\/12\/me-11.png&#8221; background_position=&#8221;center_right&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; min_height=&#8221;100px&#8221; max_height=&#8221;1000px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;|76px||60px||&#8221; hover_enabled=&#8221;0&#8243; animation=&#8221;off&#8221; sticky=&#8221;off&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; always_center_on_mobile=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 style=\"text-align: center;\">Acronis Cloud Security<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h4 class=\"a-slice-header__title\"><span style=\"color: #333333;\">Security for Hybrid Cloud<\/span><\/h4>\n<div class=\"s-intro__wrapper\">\n<div class=\"a-slice-header__lead\">\n<div class=\"a-slice-header__lead\">Acronis Cloud Security provides a unified security platform for Microsoft Cloud, whether it\u2019s on-premises Hyper-V, Azure, or a hybrid deployment. It includes built-in agentless antivirus (AV) and anti-ransomware (ARW) scanning, virtual firewall, intrusion detection (IDS), deep packet inspection, network analytics, detailed audit logs, and support for software-defined networks (SDN).<\/div>\n<div class=\"s-intro__fact s-intro__additional-info\"><\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||41px||&#8221; hover_enabled=&#8221;0&#8243; box_shadow_style=&#8221;preset2&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p style=\"text-align: left;\"><span>in 2019, 93% of organizations reported that they had been the target of a cyberattack within the past three years. 40% reported the sophistication and complexity of attacks remain their greatest challenge.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Cost-Efficient&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2020\/12\/me1-107.png&#8221; title_tablet=&#8221;&#8221; title_phone=&#8221;&#8221; title_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"a-value-card__header\">\n<div class=\"a-value-card__title\">\n<div class=\"a-value-card__text\">\n<div class=\"a-dangerous-html\">Streamline security operations across multiple Hyper-V clusters and Azure instances. Secure all Microsoft Cloud resources from a single console, eliminating the need for multiple cybersecurity tools<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Secure&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2020\/12\/me1-115.png&#8221; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; title_text=&#8221;me1&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"a-value-card__header\">\n<div class=\"a-value-card__title\">\n<div class=\"a-value-card__header\">\n<div class=\"a-value-card__title\">\n<div class=\"a-value-card__text\">\n<div class=\"a-dangerous-html\">Virtual firewall allows organizations to control all inbound, outbound, and VM-to-VM traffic, inspecting packets before they reach VMs or virtual networks<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Controlled&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2020\/12\/me1-116.png&#8221; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; title_text=&#8221;me1&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"a-value-card__text\">\n<div class=\"a-dangerous-html\">Meet strict security, privacy, and compliance requirements with complete control over access to your VMs, hosts, tenants, and administrative functionality<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<h2 class=\"a-slice-header__title\" style=\"text-align: center;\">Features<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2020\/12\/me1-118.png&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; title_text=&#8221;me1&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Agentless Anitvirus Scans&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2020\/12\/me1-117.png&#8221; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;21px|||||&#8221; hover_enabled=&#8221;0&#8243; title_text=&#8221;me1&#8243; sticky_enabled=&#8221;0&#8243; background_enable_image=&#8221;off&#8221;]<\/p>\n<div class=\"a-dangerous-html a-feature-card__text\" style=\"text-align: center;\">\n<div class=\"a-dangerous-html a-feature-card__text\">No need to acquire and deploy separate third-party solutions \u2013 scans are performed at the network layer and require no agents so there is no effect on VM performance<\/div>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Virtual Firewall&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2020\/12\/me1-119.png&#8221; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;21px|||||&#8221; hover_enabled=&#8221;0&#8243; background_enable_image=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243; title_text=&#8221;me1&#8243;]<\/p>\n<div class=\"a-dangerous-html a-feature-card__text\">Virtual firewall allows organizations to control all inbound, outbound, and VM-to-VM traffic, inspecting packets before they reach VMs or virtual networks<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Role-Based Access Control (RBAC)&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2020\/12\/me1-111.png&#8221; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;0px|||||&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; background_enable_image=&#8221;off&#8221;]<\/p>\n<div class=\"a-dangerous-html a-feature-card__text\">\n<div class=\"a-dangerous-html a-feature-card__text\">\n<div class=\"a-dangerous-html a-feature-card__text\">Granular user and tenant management through role-based access control (RBAC), separating users and resources, reducing risk of cross-contamination<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Audit Logs&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2020\/12\/me1-120.png&#8221; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;0px|||||&#8221; hover_enabled=&#8221;0&#8243; background_enable_image=&#8221;off&#8221; sticky_enabled=&#8221;0&#8243; title_text=&#8221;me1&#8243;]<\/p>\n<div class=\"a-dangerous-html a-feature-card__text\">\n<div class=\"a-dangerous-html a-feature-card__text\">\n<div class=\"a-dangerous-html a-feature-card__text\">\n<div class=\"a-dangerous-html a-feature-card__text\">Logging of all events, network traffic, and user actions, including results of changes, enabling easy and simple audits to meet strict security compliance requirements<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_text _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3 class=\"a-slice-header__title\"><span style=\"color: #333333;\">What Differentiates Acronis Cloud Security<\/span><\/h3>\n<div class=\"a-slice-header__lead\">Acronis Cloud Security is the only unified hybrid cloud security platform. It provides virtual firewall, agentless antivirus scans, ransomware protection, intrusion detection, and analysis of anomalies for the Microsoft Cloud<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_image src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2020\/12\/me1-121.png&#8221; _builder_version=&#8221;4.6.6&#8243; _module_preset=&#8221;default&#8221; title_text=&#8221;me1&#8243; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>Acronis Cloud Security Security for Hybrid Cloud Acronis Cloud Security provides a unified security platform for Microsoft Cloud, whether it\u2019s on-premises Hyper-V, Azure, or a hybrid deployment. It includes built-in agentless antivirus (AV) and anti-ransomware (ARW) scanning, virtual firewall, intrusion detection (IDS), deep packet inspection, network analytics, detailed audit logs, and support for software-defined networks [&hellip;]<\/p>","protected":false},"author":26,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-8961","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Acronis Cloud Security | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sertalink.com\/acronis-cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Acronis Cloud Security | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sertalink.com\/acronis-cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-07T12:10:02+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/www.sertalink.com\/fr\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/www.sertalink.com\/fr\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.sertalink.com\/fr\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/www.sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/www.sertalink.com\/fr\/#logo\"},\"location\":{\"@id\":\"https:\/\/sertalink.com\/acronis-cloud-security\/#local-place\"},\"address\":{\"@id\":\"https:\/\/sertalink.com\/acronis-cloud-security\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sertalink.com\/fr\/#website\",\"url\":\"https:\/\/www.sertalink.com\/fr\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/www.sertalink.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.sertalink.com\/fr\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sertalink.com\/acronis-cloud-security\/#webpage\",\"url\":\"https:\/\/sertalink.com\/acronis-cloud-security\/\",\"name\":\"Acronis Cloud Security | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/www.sertalink.com\/fr\/#website\"},\"datePublished\":\"2020-12-07T12:05:57+00:00\",\"dateModified\":\"2020-12-07T12:10:02+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sertalink.com\/acronis-cloud-security\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/sertalink.com\/acronis-cloud-security\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/sertalink.com\/acronis-cloud-security\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgique\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/8961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/comments?post=8961"}],"version-history":[{"count":2,"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/8961\/revisions"}],"predecessor-version":[{"id":8972,"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/8961\/revisions\/8972"}],"wp:attachment":[{"href":"https:\/\/www.sertalink.com\/fr\/wp-json\/wp\/v2\/media?parent=8961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}