Stay updated with the latest Cybersecurity News on our TecnetBlog.

Acronis Cyber Protect: Leader in Protection Endorsed by AV-TEST

Written by Adan Cuevas | Sep 25, 2025 3:00:03 PM

Acronis Cyber Protect continues to demonstrate why it is one of the leading solutions in advanced threat protection (ATP). This year, not only did it once again achieve perfect results, but it also finally received the official certification badge—right during the same period it participated in AV-TEST’s public test series.

We’re talking about a top score in a highly rigorous evaluation designed to simulate real-world threats and assess how security solutions respond to complex and sophisticated attacks.

The test was conducted between May and June 2025 on devices running Windows 10, which remains one of the most widely used operating systems by both businesses and individual users. A total of 20 security solutions were evaluated, including 12 focused on corporate endpoints, such as Acronis Cyber Protect Cloud.

 

 

Configuration and Testing Process: How Acronis Cyber Protect Was Put to the Test

 

The evaluation was designed to closely resemble a real-world attack. A total of 10 live attack scenarios were recreated, all initiated through spear-phishing emails—a very common technique among cybercriminals. Each of these emails contained compressed malicious files, which in turn included executable files (.EXE) or malicious shortcuts (.LNK) with hidden code.

What’s interesting is that, just like in real attacks, these scenarios didn’t stop there: many of them quickly evolved using tools like PowerShell to launch more complex payloads. In other words, the test didn’t just measure whether the solution detected the initial attack, but also whether it could stop an ongoing attack chain.

To ensure a comprehensive and transparent analysis, every step of the attack and the software’s response was documented using the MITRE ATT&CK framework. This framework classifies specific tactics and techniques used by attackers, such as T1566.001 (spear-phishing with attachments), allowing evaluators to assess exactly how and when threats were detected or blocked.

 

Read more: Acronis Cyber Protect Evolves for a New IT Reality

 

What Types of Threats Were Analyzed?

 

The test focused on two of the most common and dangerous types of malware today:

 

  1. Ransomware – Software that encrypts files and demands a ransom.

  2. Infostealers – Malware designed to steal sensitive information, such as passwords or banking data.

 

Five real samples of each type were used (10 in total). Each security solution was scored based on its performance:

 

  1. 3 points for each ransomware sample successfully blocked

  2. 4 points for each infostealer stopped

  3. Partial blocks received half the corresponding points

 

The maximum score was 35 points. To receive the official “Advanced Approved Endpoint Protection” certification, corporate solutions had to score at least 75% of the total—26.5 points or more.

 

What Makes This Methodology Unique?

 

Unlike other, more theoretical or isolated evaluations, this approach focuses on comprehensive protection—not just initial detection. The goal is to reflect what actually happens when an organization is targeted by persistent, well-organized threat actors such as ransomware gangs or industrial espionage groups.

The test doesn’t just check whether the malware was detected. It also analyzes:

 

  1. How quickly was the response?

  2. Was the attack chain interrupted?

  3. Was the threat fully contained?

  4. What tools and techniques were used to mitigate the damage?

 

This kind of real-world attack simulation is crucial to measure the effectiveness of a solution like Acronis Cyber Protect Cloud—especially in an environment where cyberattacks are increasingly complex, automated, and targeted.

 

Read more: Acronis TecnetOne Platinum Partner: Guaranteed Data Protection

 

Outstanding Results for Acronis Cyber Protect Cloud in the ATP Test

 

At TecnetOne, we’re proud to share that Acronis Cyber Protect Cloud achieved a perfect score of 35/35 in the demanding Advanced Threat Protection (ATP) evaluation. The solution delivered flawless defense across all 10 tested attack scenarios, successfully detecting and blocking both ransomware and information-stealing malware—without compromising system performance or allowing any data encryption.

 

 

In the corporate segment, Acronis ranked among the highest-rated solutions, joining a select group of platforms that achieved flawless results. Thanks to this outstanding performance, it received the “Advanced Approved Endpoint Protection” certification—a recognition that validates its ability to deliver strong, modern, all-in-one security for today’s businesses.

Beyond the numbers, these results highlight the value of Acronis’s comprehensive cyber protection approach. Acronis Cyber Protect Cloud combines backup, anti-malware protection, endpoint management, and disaster recovery into a single solution. This integration not only stops advanced threats before they cause harm, but also ensures business continuity: no data loss, no downtime, no surprises.

Check out the full report with all evaluation results here.

 

Read more: Info-Tech names Acronis Cyber Protect Cloud as XDR Champion

 

Why this matters for your business

 

Independent evaluations like AV-TEST’s ATP test are more than just recognition—they’re real validation that our solutions perform where it matters most: in real-world scenarios, under pressure, and against increasingly sophisticated threats.

At TecnetOne, as official Acronis partners, we share the same commitment: to constantly innovate and keep your business one step ahead of cyberattacks. Our goal is to give you peace of mind knowing your data, systems, and operations are protected 24/7.

If you’re looking to strengthen your cybersecurity strategy, Acronis Cyber Protect Cloud is the ideal solution: a comprehensive platform that combines advanced security, backups, endpoint management, and disaster recovery—all in one place. At TecnetOne, we can help you implement it easily and effectively, ensuring business continuity and minimizing risk.