Acronis Cyber Protect
Cloudbackup Space
Hosted in Saudi Arabia
Government-Approved, Safe AES-256 Encryption
Unlimited Device
Unmetered Bandwidth
Virtual Servers, Office365
Workstation, and Mobile
Cloudbackup Space
Hosted in the Cloud
Government-Approved, Safe AES-256 Encryption
Unlimited Device
Unmetered Bandwidth
Virtual Servers, Office365
Workstation, and Mobile
10GB Cloudbackup Space
Hosted in Saudi Arabia
Government-Approved, Safe AES-256 Encryption
Unlimited Device
Unmitered Bandwidth
Virtual Servers, Office365
Workstation, and Mobile
25GB Cloudbackup Space
Hosted in Saudi Arabia
Government-Approved, Safe AES-256 Encryption
Unlimited Device
Unmitered Bandwidth
Virtual Servers, Office365
Workstation, and Mobile
50GB Cloudbackup Space
Hosted in Saudi Arabia
Government-Approved, Safe AES-256 Encryption
Unlimited Device
Unmitered Bandwidth
Virtual Servers, Office365
Workstation, and Mobile
100GB Cloudbackup Space
Hosted in Saudi Arabia
Government-Approved, Safe AES-256 Encryption
Unlimited Device
Unmitered Bandwidth
Virtual Servers, Office365
Workstation, and Mobile
250GB Cloudbackup Space
Hosted in Saudi Arabia
Government-Approved, Safe AES-256 Encryption
Unlimited Device
Unmetered Bandwidth
Virtual Servers, Office365
Workstation, and Mobile
500GB Cloudbackup Space
Hosted in Saudi Arabia
Government-Approved, Safe AES-256 Encryption
Unlimited Device
Unmetered Bandwidth
Virtual Servers, Office365
Workstation, and Mobile
1000GB Cloudbackup Space
Hosted in Saudi Arabia
Government-Approved, Safe AES-256 Encryption
Unlimited Device
Unmetered Bandwidth
Virtual Servers, Office365
Workstation, and Mobile
2000GB Cloudbackup Space
Hosted in Saudi Arabia
Government-Approved, Safe AES-256 Encryption
Unlimited Device
Unmetered Bandwidth
Virtual Servers, Office365
Workstation, and Mobile
4000GB Cloudbackup Space
Hosted in Saudi Arabia
Government-Approved, Safe AES-256 Encryption
Unlimited Device
Unmetered Bandwidth
Virtual Servers, Office365
Workstation, and Mobile
Block email threats, including spam, phishing, business email compromise (BEC), account takeover (ATO), malware, advanced persistent threats (APTs), and zero-days before they reach end users’ mailboxes. Leverage this next-generation, cloud-based email security solution for holistic protection.