We performed a comparison between Acronis Cyber Protect and Code42 Incydr based on real PeerSpot user reviews.
Find out in this report how the two Backup and Recovery solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The setup is very easy."
"There is advanced management where we can do passing, software inventory, and hardware inventory."
"I have everything I need in the backup or in the partition. "
"The most valuable feature is its ability to back up and recover our production environment from ransomware."
"For local backups, it has options to back up almost any storage. The back can be either a shared folder or anything you want, it's pretty flexible."
"Acronis has a very rich functionality."
"It is a very fast and reliable backup, which requires less management and restores quickly."
"The ability to clone backups."
"Works in the background and users are able to perform restores."
"Low system overhead, setting retention policies, ease of use"
"Code42 Next-Gen DLP is scalable."
"The solution is very stable. Very rarely do we have any issues with it. We don't have to deal with bugs or glitches. It doesn't crash or freeze. We find it to be reliable."
"Backup and recovery have been great, but I love having the ability to keep the hybrid type build which they offer."
"There are a couple of things. One of them is that they have what they call Incydr. Their detection and response solution to the insider threat area is called Incydr. That gives visibility to the clients that have widely dispersed employee bases due to work from home, or that had a dispersed workforce predating any of the work from home requirements. Even though they might not be inside the organization physically, they're inside the organization. It allows us to get some visibility into what people are doing, what the context is, and how to control what might be the potential for intellectual property theft or file exposure."
"It had the ability to preseed by sending in a data drive and could restore by sending the user a data drive."
"Security tools: Being able to monitor data going in and coming off our endpoints. Seeing what it is and where it's going is awesome."
"The product needs to have a simple DR process."
"It would be nice to have it on the cloud platform without using third-party equipment."
"I would change the GUI a little to make it a bit more interactive. It should have a slightly more updated look, not something which looks like it was designed five years ago despite the fact it is easy to follow and very appealing."
"The tool's dashboard for daily operations is useful, but I find that it could benefit from enhancements, particularly in terms of reporting. While exporting reports, the format is not fancy as it appears on the dashboard. The exported files are typically in Excel CSV or PDF format."
"It would be nice to have a partition that I can boot and reinstall when taking a backup image from the operating system."
"The support and documentation must be improved."
"It does not delete locked files."
"I would like to have more cybersecurity integration to properly round up the product and its offering. In terms of cybersecurity, if the offerings can be more versatile so that it is not just a backup solution, it would be great. Some addition to cybersecurity would really be helpful so that it becomes a kind of a suite of products. Backup and recovery form a part of the broader security strategy. Its integration with other cybersecurity solutions would provide proper visibility to not just your cybersecurity dashboard but also to all of your backups. You would have a pretty good view of the entire security landscape that you are managing."
"More security would be nice, I would love to be able to remotely brick a stolen laptop and it's hard disk drive (HDD)."
"I would like to see more flexibility on privileges, perhaps create another kind of admin for regions. Also, I would like the ability to access logs without having to be on the actual device or a super-admin."
"You can't always filter out data that you'd like to."
"Java, please get rid of Java."
"There doesn't seem to be any feature that is lacking."
"I think one we can improve is the compression."
"In a couple of instances, we had a little bit of trouble in getting it distributed throughout the organization. We ultimately managed to do it, but they talk about it being a pretty simple process, and it became a little laborious. It would just turn away. The agents were not being distributed. It was just churning and churning and churning. When we were looking for specific categories of data, it was getting bogged down, but that was not even so much Code42, although some of it was their issue."
"Reporting could use an overhaul. It is very limited."
Acronis Cyber Protect is ranked 10th in Backup and Recovery with 117 reviews while Code42 Incydr is ranked 30th in Backup and Recovery with 78 reviews. Acronis Cyber Protect is rated 8.2, while Code42 Incydr is rated 9.0. The top reviewer of Acronis Cyber Protect writes " Good backup solution but challenges with the stability". On the other hand, the top reviewer of Code42 Incydr writes "Provides comprehensive visibility and protection, helps in identifying the gaps in security, and comes with excellent onboarding support". Acronis Cyber Protect is most compared with Veeam Backup & Replication, Veeam Backup for Microsoft 365, Acronis Cyber Protect Cloud, Azure Backup and N-able Cove Data Protection, whereas Code42 Incydr is most compared with Threat Detection, Investigation & Response (TDIR) Platform, Microsoft Purview Data Loss Prevention, Forcepoint Data Loss Prevention, Morphisec and Backup and Restore for SharePoint & Microsoft Office 365. See our Acronis Cyber Protect vs. Code42 Incydr report.
See our list of best Backup and Recovery vendors.
We monitor all Backup and Recovery reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.