Acronis Cyber Protect and Code42 Incydr are two leading solutions in the data protection domain. Based on user reviews, Acronis Cyber Protect excels in pricing and customer support, while Code42 Incydr outshines Acronis in features and user satisfaction regarding its worth.
Features: Acronis Cyber Protect is appreciated for its comprehensive data backup and anti-malware protection. Code42 Incydr receives praise for its advanced insider threat detection and response capabilities. Users find Code42's features to be more specialized and robust in preventing data loss incidents.
Room for Improvement: Users of Acronis Cyber Protect frequently mention the need for a more intuitive and streamlined reporting system and enhancements in cross-platform support. For Code42 Incydr, reviewers suggest improvements in integration with third-party applications and more detailed customization options. The differences lie in Acronis focusing on usability, while Code42 is geared toward extensibility.
Ease of Deployment and Customer Service: Acronis Cyber Protect users highlight the straightforward deployment process and responsive customer service. In comparison, reviews of Code42 Incydr indicate a slightly more complex deployment process but commendable support. This suggests that while Acronis is easier to set up, Code42 offers substantial support to aid the deployment phase.
Pricing and ROI: Acronis Cyber Protect is favored for its competitive pricing structure and perceived value for money. Conversely, despite higher costs, Code42 Incydr's users report high ROI due to the features' effectiveness in preventing data breaches. This indicates that Code42 users find the premium cost justified by the advanced feature set.
The support takes too much time to respond to callbacks.
Acronis Cyber Protect is a scalable product.
The stability of Acronis Cyber Protect is very high.
The Protect environment should automatically secure the last backup screens to prevent any changes, even by an admin.
I would rate the price as nine out of ten.
The NASDAQ level CFS level backup is the feature I find most beneficial for our data protection strategy.
Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization – without the need for policies, proxies or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices.
Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This prioritization works on day 1 without any configuration. Incydr’s risk scoring logic is use case-driven and transparent to administrators. Incydr uses Watchlists to programmatically protect data from employees who are most likely to leak or steal files, such as departing employees.
Take action with appropriate responses to contain, resolve and educate on detected risk. Use Incydr Flows or SOAR integrations to initiate response controls that are proportionate to an activity’s risk severity. You’ll stop data leaks without getting in the way of employee collaboration and sanctioned file activity.
Improving your Insider Risk posture requires a change in employee behavior. Code42 Instructor provides bite-sized training to employees, delivered when they need it. Use Instructor in tandem with Incydr to send responsive video lessons when employees put data at risk. You’ll ensure appropriate data governance and compliance with security standards and corporate policies as well as report on the positive impact of your Insider Risk Management program.
Founded in 2001, the company is headquartered in Minneapolis, Minnesota, and backed by Accel Partners, JMI Equity, NEA, and Split Rock Partners. For more information, visit code42.com.
We monitor all Backup and Recovery reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.