Acronis is trusted by
- Supports every OT system OS from the XP era to the presentAcronis Cyber Protect provides backup and recovery even for OT systems running older versions of Windows and Linux that other data protection vendors have abandoned.
- Protects OT systems even in air-gapped environmentsAcronis keeps OT systems up and running even in manufacturing and industrial environments that have no external network connections for security purposes.
- Enables local recovery of OT systems without IT interventionAcronis One-Click Recovery enables workers with no IT skills to restore failed OT systems in minutes with a few clicks, without the need for IT staff intervention.
- Strengthens regulatory compliance for OT systemsAcronis Cyber Protect helps automation vendors and manufacturers meet stringent local and industry-specific regulations by providing secure, compliant backup and recovery.
Local workers can recover OT systems without IT help and reduce system outages from hours to minutes
- Acronis One-Click Recovery enables local workers regardless of their IT skill level to recover failed OT systems — even in environments that are remote, unstaffed by IT and/or air-gapped for security reasons.
- Acronis One-Click Recovery reduces production outages due to OT system failures from hours or days to a matter of minutes without the need for direct IT intervention.
- Failed OT systems can be replicated to new hardware if necessary via Acronis Universal Restore, enabling fast recovery after a PC hardware failure, e.g., dead hard drive or motherboard.
Protection for all OT systems from the XP era to the present
Unique, ongoing support for legacy Windows and Linux versions that other data protection vendors have abandoned.

- Protects the PCs that run OT applications, preventing their failure from causing costly halts in real-time production
- Maintains the stability of OT environments with backup and recovery even for the oldest legacy OSs
- Enables backup operations without the need for scheduled OT system downtime (including initial installation)
Industry-best coverage of various OSs and hypervisors:
Windows
- Windows Server 2003 SP1, R2 and later, 2008/2008 R2, 2012/2012 R2, 2016, 2019, 2022 except Nano
- Windows Small Business Server 2003/2003 R2, 2008, 2011
- Windows Home Server 2011
- Windows MultiPoint Server 2010, 2011, 2012
- Windows Storage Server 2003, 2008/2008 R2, 2012/2012 R2, 2016
- Windows XP Professional SP1, SP2, SP3
- Windows 7, 8/8.1, 10 (except RT), 11 (all editions)
Microsoft Exchange Server
- 2019, 2016, 2013, 2010, 2007
Microsoft SQL Server
- 2022, 2019, 2017, 2016, 2014, 2012, 2008/RT, 2005
MacOS
- OS X Mavericks 10.9, Yosemite 10.10, El Capitan 10.11
- macOS Sierra 10.12, High Sierra 10.13, Mojave 10.14, Catalina 10.15, Big Sur 11, Monterey 12, Ventura 13, Sonoma 14
Hypervisors
- VMware vSphere 4.1, 5.0, 5.1, 5.5, 6.0, 6.5, 6.7, 7.0, 8.0
- Microsoft Hyper-V Server 2022, 2019, 2016, 2012/2012 R2, 2008/2008 R2
- Citrix XenServer/Citrix Hypervisor 8.2 - 4.1.5
- Linux KVM 8 - 7.6
- Scale Computing Hypercore 8.8, 8.9, 9.0
- Red Hat Enterprise Virtualization (RHEV) 3.6-2.2
- Red Hat Virtualization 4.0, 4.1, 4.2, 4.3, 4.4
- Virtuozzo 7.0.14 - 6.0.10
- Virtuozzo Infrastructure Platform 3.5
- Nutanix Acropolis Hypervisor (AHV) 20160925.x through 20180425.x
Linux
- Kernel 2.6.9 to 5.19
- RHEL 4.x, 5.x, 6.x, 7.x, 8.x*, 9.0*, 9.1*, 9.2*, 9.3*
- Ubuntu 9.10 - 23.04
- Fedora 11 - 31
- SUSE Linux Enterprise Server 10, 11, 12, 15
- Debian 4.x, 5.x, 6.x, 7.0, 7.2, 7.4-7.7, 8.0-8.8, 8.11, 9.0- 9.8, 10.x, 11.x
- CentOS 5.x, 6.x, 7.x, 8.x*
- Stream 8*,9*
- Oracle Linux 5.x, 6.x, 7.x, 8.x*, 9.0*, 9.1*, 9.2*, 9.3*
- CloudLinux 5.x, 6.x, 7.x, 8.x*
- ClearOS 5.x, 6.x, 7.x
- AlmaLinux 8.x*, 9.0*, 9.1*, 9.2*, 9.3*
- Rocky Linux 8.x*, 9.0*, 9.1*, 9.2*, 9.3*
- ALT Linux 7.0
Industry-proven protection
















Acronis is recognized as the OT cyber resilience leader by industry analysts:
Advanced features of Acronis Cyber Protect for Operational Technology (OT)
Integrated cybersecurity and data protection
The same agent that provides OT system backup and restoral protection can also deliver a range of cybersecurity features, including Active Protection against ransomware, antivirus and anti-malware, hard disk drive health monitoring and EDR. OT system backups can be scanned for malware and vulnerabilities and can remediate both prior to restoral operations.Protection of front-office and back-office systems
Acronis Cyber Protect can also protect workstations and applications outside of the OT environment, including back-office systems (ERP, supply chain management, procurement, production planning, quality control, maintenance, finance, accounting, HR and IT) and front-office systems (sales, marketing, customer service and PR).Additional cloud-based protections
In addition to the Acronis Management Server deployed on-premises to protect the OT environment, additional Acronis Management Servers can be deployed in the cloud to enable Disaster Recovery services, to protect cloud-based application suites like Microsoft 365 and Google Workspace, and to use the Acronis Cloud for secure, off-site storage of backups.Centralized dashboard
Metadata on OT systems can be streamed from the Acronis Management Server to a centralized data warehouse, monitored by an Acronis Monitoring Hub and processed by third-party monitoring, reporting and analytical tools.Advanced management and forensics
Acronis Cyber Protect can be used for vulnerability assessment, patch management, and hardware / software inventory on OT systems. Forensic data stored in OT system backups can be used in post-incident investigations for incident response improvement and compliance purposes.Flexible backup storage
Acronis Cyber Protect backups of OT systems can be archived on wide variety of storage options, including local storage, NAS, SANs, and public and private clouds, including the Acronis Cloud.
Acronis Cyber Protect OT
Maximize production uptime with Operational Technology system protection
Now with One-Click Recovery
Why customers choose Acronis Cyber Protect for OT security and resilience
Looking for help?
Frequently Asked Questions
What types of OT systems does Acronis support?
Acronis Cyber Protect provides backup and recovery for OT systems running on Windows or Linux. For example, this includes OT systems operating in Zones 2, 3 and 3.5 of the Purdue Model, including, but not limited to Zone 2 Supervisory Control Systems like HMI, SCADA and Jump Servers, Zone 3 Operations Systems like Historians and I/O Servers, and Zone 3.5 (OT / IT DMZ) Systems like Patch Servers and Historian Mirrors. Acronis Cyber Protect is also commonly used to protect non-OT systems operating in Zone 4, Enterprise and Business Network Systems, including an extremely broad range of hardware platforms, virtual machines, cloud workloads, operating systems and applications.How does the Acronis backup process work for OT systems?
Acronis protection of OT systems running on Windows and Linux uses an agent-based architecture in conjunction with very flexible and highly customizable backup plans. Given the importance of stability and the reliance on very old versions of Windows and Linux in real-time production settings, it is common for businesses in manufacturing and industry to use image-based backup for their OT systems, automatically executed at least once per day.Is the Acronis backup process secure and compliant with industry standards?
Acronis Cyber Protect offers optional strong encryption based on AES-256 for OT system backups in transit and at rest regardless of how and where backups are stored. Acronis encryption is also FIPS 140-2 compliant. This helps businesses to achieve compliance with industry-specific standards like IEC 62443 (for OT systems in general), NERC CIP (for the North American power generation sector), and GxP (for the pharmaceutical, biotechnology, medical devices and other industries).How frequently can Acronis backups be scheduled?
Backup plans in Acronis Cyber Protect offer great flexibility in backup frequency, anywhere from multiple times per day to daily, weekly or monthly. OT system backups can also be triggered automatically in response to specific events, like an OT system reboot or OS detection of a bad block on a hard disk drive (often an indicator that the drive is about to fail).How are Acronis backups of OT systems stored and protected?
Acronis Cyber Protect offers a broad range of backup storage options for OT systems, including: a secure partition on the hard drive; local storage hardware (e.g., directly connected via SATA or USB); local network storage (NAS or SAN devices); private or public cloud storage; and in the Acronis Cloud, our secure global data center network. Connection to a network is not necessary to use Acronis Cyber Protect; many businesses in manufacturing and industry use Acronis to protect their OT systems in air-gapped environments.Can Acronis perform backup and testing operations on OT systems without affecting real-time production operations?
Acronis Cyber Protect is designed to back up OT systems without disrupting real-time production operations. It is not necessary to schedule production downtime or to reboot OT systems to perform backups. Even the initial installation of the Acronis backup agent can be performed on a live OT system without disrupting its operation or requiring a reboot.Can Acronis perform granular restores or full system recoveries of OT systems?
Acronis Cyber Protect offers a variety of backup types to accommodate diverse data protection needs, including full-image backup, file-level backup, incremental backup and differential backup, all with rich version control capabilities.What deployment architectures does Acronis support?
Acronis Cyber Protect offers flexible deployment options. The on-premises deployment option, with the Acronis Management Server installed on hardware or a virtual machine on the same premises as the systems it is protecting, is most commonly used in OT environments and is especially valued in air-gapped environments. Other deployment options include cloud-based deployment, in which the Acronis Management Server runs on a virtual machine hosted in the Acronis Cloud, and hybrid deployment, which uses both cloud-based and premises-based Acronis Management Servers to allow some system backups to remain on-site while enabling the use of cloud storage, disaster recovery and immutable storage options.What is the 3-2-1 backup rule, and how does it apply to OT systems?
The 3-2-1 rule of backup is a widely recommended best practice in data protection, including in OT environments. It recommends maintaining three backup copies (including the primary production system) on at least two different storage media types with one copy stored off-site. Maintaining three copies of data helps protect against a range of potential system outage causes, e.g., hardware failure, cyberattack and human error, by improving the ability to restore a copy from local or off-site storage. Using two different storage media types minimizes the impact of losing one type of storage media, e.g., a ransomware attack that propagates through all local storage devices it can find online, but cannot affect offline media like tape drives. Storing one backup copy off-site preserves recovery capabilities even in the event of a local disaster like a fire or flood. Given the high cost of downtime in real-time production environments, the 3-2-1 rule is a recommended best practice for protecting OT systems.
Sorry, your browser is not supported.
It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.