We performed a comparison between Acronis Cyber Protect and Code42 Incydr based on real PeerSpot user reviews.
Find out in this report how the two Backup and Recovery solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."i use the backup solution and I use something called Disk Director, which is a related product. Together, they allow me to manage all of my storage space."
"It's a good solution that's very easy to use. Acronis has two valuable features. The first one is creating images, and the other is starting virtual machines in the cloud so the client can work immediately."
"The most valuable feature is that you can do a bare-metal restore even with dissimilar hardware."
"The most valuable feature is the extra protection, especially for the backup."
"The main reasons that our customers like Acronis are that it is very strong and easy to use."
"The ability to clone backups."
"The interface is easy to use. They keep on adding new features. Acronis recently added multi-platform support."
"Stability is always good. I have used Acronis for 10 years now, if not more. I have never had a problem with availability, etc."
"The solution is very stable. Very rarely do we have any issues with it. We don't have to deal with bugs or glitches. It doesn't crash or freeze. We find it to be reliable."
"Low system overhead, setting retention policies, ease of use"
"It required very little ongoing maintenance once setup."
"It had the ability to preseed by sending in a data drive and could restore by sending the user a data drive."
"Risk factors can be adjusted for all intricate details."
"It has quite a bit of flexibility in configuring backup sets."
"There are a couple of things. One of them is that they have what they call Incydr. Their detection and response solution to the insider threat area is called Incydr. That gives visibility to the clients that have widely dispersed employee bases due to work from home, or that had a dispersed workforce predating any of the work from home requirements. Even though they might not be inside the organization physically, they're inside the organization. It allows us to get some visibility into what people are doing, what the context is, and how to control what might be the potential for intellectual property theft or file exposure."
"Security tools: Being able to monitor data going in and coming off our endpoints. Seeing what it is and where it's going is awesome."
"Their support process can be quite lengthy...This is an area that needs improvement."
"We would always support better pricing."
"The whole product structure is confusing. You can actually get to do what you want to do. But Acronis seems to have a singular ability to make things difficult."
"If we could have a mass deployment option using Acronis, that would be helpful."
"I would like to have more cybersecurity integration to properly round up the product and its offering. In terms of cybersecurity, if the offerings can be more versatile so that it is not just a backup solution, it would be great. Some addition to cybersecurity would really be helpful so that it becomes a kind of a suite of products. Backup and recovery form a part of the broader security strategy. Its integration with other cybersecurity solutions would provide proper visibility to not just your cybersecurity dashboard but also to all of your backups. You would have a pretty good view of the entire security landscape that you are managing."
"The reporting can be improved."
"The solution's reporting feature could be better."
"A little bit more integration would be good. It should support broader platforms."
"In a couple of instances, we had a little bit of trouble in getting it distributed throughout the organization. We ultimately managed to do it, but they talk about it being a pretty simple process, and it became a little laborious. It would just turn away. The agents were not being distributed. It was just churning and churning and churning. When we were looking for specific categories of data, it was getting bogged down, but that was not even so much Code42, although some of it was their issue."
"I would like to see more flexibility on privileges, perhaps create another kind of admin for regions. Also, I would like the ability to access logs without having to be on the actual device or a super-admin."
"What I think could be improved is how I get support."
"More security would be nice, I would love to be able to remotely brick a stolen laptop and it's hard disk drive (HDD)."
"The application, written in Java, required far more system resources on a Client than other solutions."
"Due to recent changes that effectively abandoned an entire segment of their user base, I no longer trust nor can recommend Code42 products."
"Java, please get rid of Java."
"There doesn't seem to be any feature that is lacking."
Acronis Cyber Protect is ranked 10th in Backup and Recovery with 117 reviews while Code42 Incydr is ranked 30th in Backup and Recovery with 78 reviews. Acronis Cyber Protect is rated 8.2, while Code42 Incydr is rated 9.0. The top reviewer of Acronis Cyber Protect writes " Good backup solution but challenges with the stability". On the other hand, the top reviewer of Code42 Incydr writes "Provides comprehensive visibility and protection, helps in identifying the gaps in security, and comes with excellent onboarding support". Acronis Cyber Protect is most compared with Veeam Backup & Replication, Veeam Backup for Microsoft 365, Acronis Cyber Protect Cloud, Azure Backup and N-able Cove Data Protection, whereas Code42 Incydr is most compared with Threat Detection, Investigation & Response (TDIR) Platform, Microsoft Purview Data Loss Prevention, Forcepoint Data Loss Prevention, Morphisec and Backup and Restore for SharePoint & Microsoft Office 365. See our Acronis Cyber Protect vs. Code42 Incydr report.
See our list of best Backup and Recovery vendors.
We monitor all Backup and Recovery reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.