Intelligent CISO Issue 36 | Page 34

We were looking for a more robust data protection tool so that our remote users could survive any incident that might impact productivity .
PREDICTIVE INTELLIGENCE

is very user-friendly and administration is straightforward , we had a few questions for Acronis support engineers on specific security needs in the area of single signon , handling of data encryption and user isolation of data .
In the limited number of times we had to reach out to the Acronis engineers , we found them to be professional and very willing to address our edge cases .
How do your staff find the technology ?
Our internal operations staff found the implementation straightforward and ongoing administration to be a major strength of the product . One of the real advantages of the Acronis platform is the relatively low learning curve compared with other cybersecurity tools .
For organisations that don ’ t have large cybersecurity teams , the ability to centrally administer the product with a low learning curve together with number of compelling features makes Acronis a compelling cybersecurity solution .
How far would you say this solution has future-proofed your organisation ?
While cybersecurity threats continue to evolve , we feel like the Acronis solution provides a key foundational level of protection that meets our current needs and can evolve with the changing needs of our business .

We were looking for a more robust data protection tool so that our remote users could survive any incident that might impact productivity .

The single agent solution that provides multiple needs , data protection and cyber serves to consolidate several capabilities under a single intuitive and centrally managed platform .
This capability allows our organisation to reduce agent count and system overhead through the single agent solution , so as additional functionality is added into the platform , we anticipate realising long-term benefits .
What advice would you offer other organisations looking to implement similar technology ?
Look for cybersecurity products that in addition to providing needed protection are relatively easy to install and administer . In today ’ s cybersecurity field , no one tool can meet all your needs , rather it requires a portfolio of products .
Be thoughtful in your selection so that your team has the capacity to fully leverage your cybersecurity products . Too often , companies only take advantage of 50 % of the capabilities
34 www . intelligentciso . com