Rated 4.9 out of 5 - based on 1790 reviews

Online backups reseller
Acronis data protection and backups

Prevent data disaster, and gain a competitive edge by reselling this online backup solution. Acronis cloud backups doubles as a backup & recovery plan, while also focusing on cybersecurity & protection.

grey dots woman backing up her laptop with acronis
sign up
KSh2,250
once-off
  • check mark Once off KSh2250 sign up
  • check mark Cancel anytime
  • check mark Discounts on list prices
  • check mark Fast & expert support
  • check mark Backup any device
  • check mark Unlimited backup agents
  • check mark Restore individual files
  • check mark Restore as virtual machine
  • check mark Bare metal recovery
  • check mark AES-256 encryption
  • check mark Backup to local storage
  • check mark Web-based control panel
  • check mark Includes cPanel plugin
  • check mark Flexible schedule configuration
  • check mark Auto email reports
  • check mark Advanced options available

Acronis online backup pricing

and advanced features for Acronis resellers

Option
Price
HOSTAFRICA Storage
Storage in HOSTAFRICA's storage cloud
KSh11.25/GB
Customer Local Storage
Backups to your own storage device
KSh9.38/GB
Acronis Storage
External Acronis Storage
KSh16.88/GB
Advanced Backup for Physical Servers
KSh3000/mo
Advanced Backup for Virtual Machines
KSh938/mo
Advanced Backup for Workstations
(Windows, Mac, and Linux)
KSh488/mo
Advanced Backup for Hosting Servers
KSh488/mo
Advanced Management
(Physical Servers, Virtual Machines, Workstations, Hosting Servers)
KSh263/mo
Advanced Security
(Physical Servers, Virtual Machines, Workstations, Hosting Servers)
KSh263/mo
Option
Price
HOSTAFRICA Storage
Storage in HOSTAFRICA's storage cloud
KSh11.25/GB
Customer Local Storage
Backups to your own storage device
KSh9.38/GB
Acronis South Africa North
External Acronis Storage
KSh16.88/GB
Advanced Backup for Physical Servers
KSh3000/mo
Advanced Backup for Virtual Machines
KSh938/mo
Option
Price
Advanced Backup for Workstations
(Windows, Mac, and Linux)
KSh488/mo
Advanced Backup for Hosting Servers
KSh488/mo
Advanced Management
(Physical Servers, Virtual Machines, Workstations, Hosting Servers)
KSh263/mo
Advanced Security
(Physical Servers, Virtual Machines, Workstations, Hosting Servers)
KSh263/mo

If you have any questions, please let us know via Live-Chat or submit a ticket.

backup icon

Server backup

Backup virtual/dedicated servers, and business-critical applications: Office 365, MS SharePoint, Exchange, MS-SQL, MySQL.

arrows icon

Choose a location

Store your data locally, network folder or NAS device, off-site in the cloud, or a combination to ensure total protection.

management icon

Backup your devices

Safeguard your PC/laptop/mobile data on the latest versions of Windows, Mac, iOS and Android devices, automatically and to local storage.

Acronis feature comparison

Augment your packages with Advanced services

Features
Standard Cloud Protect
With Advanced Backup
File-level, disk-level, image and application backups
check mark
check mark
Backup popular workloads: Mac, Windows, Linux, Microsoft 365, Google Workspace, Hyper-V, VMware, and much more
check mark
check mark
Hybrid storage options: Acronis-hosted storage, public clouds such as Microsoft Azure, or MSP local storage
check mark
check mark
Flexible recovery options from full systems to granular files
check mark
check mark
Cloud-Physical-Virtual migrations
check mark
check mark
Archive encryption
check mark
check mark
Incremental and differential backups
check mark
check mark
Vulnerability assessments
check mark
check mark
Continuous data protection (CDP): Acronis’ agent monitors and backs up changes in real-time for with near-zero RPOs, ensuring no data is lost
-
check mark
Expanded backup support: Covers Microsoft SQL clusters, Microsoft Exchange clusters, Oracle DB, and SAP HANA
-
check mark
Data protection map and compliance reporting: Scan clients’ environments to ensure their workloads, files, applications, and users are protected
-
check mark
Scheduled backup reports: Reduce time and highlight your MSP business value with automatic reporting
-
check mark

Features
Standard Cloud Protect
With Advanced Backup
Centralized and group management
check mark
check mark
Auto-discovery and remote agent installation
check mark
check mark
Security gaps and vulnerability assessments
check mark
check mark
Hardware inventory collection
check mark
check mark
Remote desktop and remote assistance
check mark
check mark
Automated patch management: close vulnerabilities before they’re exploited
check mark
check mark
Software inventory collection: Save time and effort when preparing, planning, or tracking updates with a complete list of software used by clients
-
check mark
Drive health monitor: Proactively mitigate downtime caused by drive failure with predictive monitoring and alerts
-
check mark
Fail-safe patching: Recover from faulty patches quickly and easily with automatic system backups before patching
-
check mark
Report scheduling: Demonstrate the value of your MSP business and simplify renewals, while reducing time spent on reporting
-
check mark

Features
Standard Cloud Protect
With Advanced Backup
Acronis Active Protection: Next gen, behavior-based technology built to proactively stop cyberthreats, with a focus on ransomware and zero-day attacks
check mark
check mark
Vulnerability assessments
check mark
check mark
Data loss prevention (DLP) with device control
check mark
check mark
Backup and recovery
check mark
check mark
Automatic data recovery after a ransomware attack
check mark
check mark
Security gap identification with #CyberFit Score
check mark
check mark
Full-stack anti-malware protection: Real-time protection covering all attack vectors with multiple defense layers
-
check mark
URL filtering: Block malicious URLs, web-based attacks, and COVID-19 scams
-
check mark
Exploit prevention: Behavior-based detection heuristics prevent the exploitation of unknown vulnerabilities, including memory exploits and injections
-
check mark
Anti-malware scans of data in the Acronis Cloud: Offload client endpoints to enable more aggressive scans and ensure malware-free backups
-
check mark
Forensics data in backups: Collect digital evidence to faster and reduce the cost of remediation
-
check mark
CPOC threat feed: Increase reactiveness to emerging threats and get remediation suggestions
-
check mark
Automatic allowlisting: Reduce false positives and enable more aggressive scanning
-
check mark
Malware reinfection prevention: Scan for malware and update AV definitions during recovery to prevent a threat from reoccurring
-
check mark

Features
Standard Cloud Protect
With Advanced Backup
Acronis Instant Restore: Restore a system in 15 seconds as a virtual machine directly from the backup
check mark
check mark
Acronis Universal Restore: detects machine type and auto-installs required drivers for swift recovery
check mark
check mark
Point-to-site VPN connection: Give clients prompt access to their data from their personal devices via a secure connection
check mark
check mark
Disaster recovery orchestration: Windows and Linux physical servers and VMs, major hypervisors, and Microsoft apps
-
check mark
Production failover: Quash downtime with automated failover, moving the client’s production to an offsite Acronis DR storage
-
check mark
Site-to-site VPN: Aid a partial failover by maintaining communication during server recreation
-
check mark
Near-instant RPOs & RTOs: failover speeds under 15 minutes and flexible backup frequency
-
check mark
Execution monitoring: a bird’s-eye-view of DR with detailed runbook-execution, real-time view, and execution history
-
check mark
Point-in-time recovery: Load restores from any recoverable saved point in time
-
check mark
IPsec multisite VPN: Integrate secure protocols and algorithms for clients with multiple sites and demanding workloads
-
check mark
Customise DNS: Tailor client DNS setups without a hitch
-
check mark

Features
Standard Cloud Protect
Futuristic dynamic detection: Blast zero-days and APTs with Perception Point’s unique block and detection technology
check mark
Holistic insights: Get an executive view of threats across organisations along with insights for brewing threats + analyse any file or URL
check mark
Spam & anti-phishing filters: Block malicious emails and detect nefarious URLs with industry-leading recognition tech
check mark
Anti-evasion/spoofing: Detect malicious hidden content in under 30 seconds and prevent payload-less attacks with machine-learning algorithms
check mark
Threat perception intelligence: Stay ahead of the threat curve with Perception Point’s unique scanning and signature-based antivirus engines
check mark
Incident reporting service: Direct access to cyber analysts monitoring all customer traffic, with ongoing reports from the Incident Response Team
check mark
Email analysis & contextual help: Raise security awareness by flagging emails and allowing clients to consult Perception Point’s security experts
check mark
Automatically route Microsoft 365: Make life even easier with a ready-to-use script that automatically routes between Microsoft 365 and Acronis
check mark

Features
Standard Cloud Protect
Fully aware DLP controls: Apply preventive policies to avoid sensitive data being leaked
check mark
DLP policy creation & improvement: Automatically create and enhance clients-specific policies
check mark
External device transfers: Content-aware management of transfers to external devices to ensure no sensitive data leaks
check mark
Data classifiers: Use pre-built data classifiers to protect sensitive personal, health, and confidential data
check mark
Strict DLP policy & clipboard control: Enforce strict DLP controls for certain clients and redirected clipboards
check mark
Optical character recognition: Avert textual data in graphical format from leaking, even for remote and offline endpoints
check mark
Content inspection: Inspect and filter textual and binary content transferred via local and network channels
check mark
Real-time alerting: Give DLP admin the necessary visibility to react quickly to critical security events
check mark
Configure policy-based logs: Set automatic log collection and retention for security events stored in a central cloud
check mark
View DLP events: Spot DLP events easily with an overview pane with filtering capabilities
check mark
End-user popup notifications: Increase client awareness with on-screen explanations of blocked data transfers
check mark
Barricade override support: Allow business continuity by implementing a one-time override exception for certain situations
check mark

Features
Standard Cloud Protect
With Advanced Backup
Secure file sync and share
check mark
check mark
Notarisation: Generates a certificate of validation for files
check mark
check mark
Electronic signing: Authenticate e-signatures
check mark
check mark
File notarisation: Create undeniable proof that an original file is unaltered with a blockchain-based certificate and time stamp
-
check mark
Embed eSignatures: Confirm your identity with a drag, drop, and sign feature for every step of a document’s workflow
-
check mark
Verify files: Showcase transaction history and data authenticity by empowering your clients with an extraordinary audit trial
-
check mark

Acronis feature comparison

Augment your packages with Advanced services

Features
Standard Cloud Protect
With Advanced Backup
File-level, disk-level, image and application backups
check mark
check mark
Backup popular workloads: Mac, Windows, Linux, Microsoft 365, Google Workspace, Hyper-V, VMware, and much more
check mark
check mark
Hybrid storage options: Acronis-hosted storage, public clouds such as Microsoft Azure, or MSP local storage
check mark
check mark
Flexible recovery options from full systems to granular files
check mark
check mark
Cloud-Physical-Virtual migrations
check mark
check mark
Archive encryption
check mark
check mark
Incremental and differential backups
check mark
check mark
Vulnerability assessments
check mark
check mark
Continuous data protection (CDP): Acronis’ agent monitors and backs up changes in real-time for with near-zero RPOs, ensuring no data is lost
-
check mark
Expanded backup support: Covers Microsoft SQL clusters, Microsoft Exchange clusters, Oracle DB, and SAP HANA
-
check mark
Data protection map and compliance reporting: Scan clients’ environments to ensure their workloads, files, applications, and users are protected
-
check mark
Scheduled backup reports: Reduce time and highlight your MSP business value with automatic reporting
-
check mark
Features
Standard Cloud Protect
With Advanced Management
Centralized and group management
check mark
check mark
Auto-discovery and remote agent installation
check mark
check mark
Security gaps and vulnerability assessments
check mark
check mark
Hardware inventory collection
check mark
check mark
Remote desktop and remote assistance
check mark
check mark
Automated patch management: close vulnerabilities before they’re exploited
check mark
check mark
Software inventory collection: Save time and effort when preparing, planning, or tracking updates with a complete list of software used by clients
-
check mark
Drive health monitor: Proactively mitigate downtime caused by drive failure with predictive monitoring and alerts
-
check mark
Fail-safe patching: Recover from faulty patches quickly and easily with automatic system backups before patching
-
check mark
Report scheduling: Demonstrate the value of your MSP business and simplify renewals, while reducing time spent on reporting
-
check mark
Features
Standard Cloud Protect
With Advanced Security
Acronis Active Protection: Next gen, behavior-based technology built to proactively stop cyberthreats, with a focus on ransomware and zero-day attacks
check mark
check mark
Vulnerability assessments
check mark
check mark
Data loss prevention (DLP) with device control
check mark
check mark
Backup and recovery
check mark
check mark
Automatic data recovery after a ransomware attack
check mark
check mark
Security gap identification with #CyberFit Score
check mark
check mark
Full-stack anti-malware protection: Real-time protection covering all attack vectors with multiple defense layers
-
check mark
URL filtering: Block malicious URLs, web-based attacks, and COVID-19 scams
-
check mark
Exploit prevention: Behavior-based detection heuristics prevent the exploitation of unknown vulnerabilities, including memory exploits and injections
-
check mark
Anti-malware scans of data in the Acronis Cloud: Offload client endpoints to enable more aggressive scans and ensure malware-free backups
-
check mark
Forensics data in backups: Collect digital evidence to faster and reduce the cost of remediation
-
check mark
CPOC threat feed: Increase reactiveness to emerging threats and get remediation suggestions
-
check mark
Automatic allowlisting: Reduce false positives and enable more aggressive scanning
-
check mark
Malware reinfection prevention: Scan for malware and update AV definitions during recovery to prevent a threat from reoccurring
-
check mark
Features
Standard Cloud Protect
With Advanced Recovery
Acronis Instant Restore: Restore a system in 15 seconds as a virtual machine directly from the backup
check mark
check mark
Acronis Universal Restore: detects machine type and auto-installs required drivers for swift recovery
check mark
check mark
Point-to-site VPN connection: Give clients prompt access to their data from their personal devices via a secure connection
check mark
check mark
Disaster recovery orchestration: Windows and Linux physical servers and VMs, major hypervisors, and Microsoft apps
-
check mark
Production failover: Quash downtime with automated failover, moving the client’s production to an offsite Acronis DR storage
-
check mark
Site-to-site VPN: Aid a partial failover by maintaining communication during server recreation
-
check mark
Near-instant RPOs & RTOs: failover speeds under 15 minutes and flexible backup frequency
-
check mark
Execution monitoring: a bird’s-eye-view of DR with detailed runbook-execution, real-time view, and execution history
-
check mark
Point-in-time recovery: Load restores from any recoverable saved point in time
-
check mark
IPsec multisite VPN: Integrate secure protocols and algorithms for clients with multiple sites and demanding workloads
-
check mark
Customise DNS: Tailor client DNS setups without a hitch
-
check mark
Features
Standard Cloud Protect
Futuristic dynamic detection: Blast zero-days and APTs with Perception Point’s unique block and detection technology
check mark
Holistic insights: Get an executive view of threats across organisations along with insights for brewing threats + analyse any file or URL
check mark
Spam & anti-phishing filters: Block malicious emails and detect nefarious URLs with industry-leading recognition tech
check mark
Anti-evasion/spoofing: Detect malicious hidden content in under 30 seconds and prevent payload-less attacks with machine-learning algorithms
check mark
Threat perception intelligence: Stay ahead of the threat curve with Perception Point’s unique scanning and signature-based antivirus engines
check mark
Incident reporting service: Direct access to cyber analysts monitoring all customer traffic, with ongoing reports from the Incident Response Team
check mark
Email analysis & contextual help: Raise security awareness by flagging emails and allowing clients to consult Perception Point’s security experts
check mark
Automatically route Microsoft 365: Make life even easier with a ready-to-use script that automatically routes between Microsoft 365 and Acronis
check mark
Features
Standard Cloud Protect
Fully aware DLP controls: Apply preventive policies to avoid sensitive data being leaked
check mark
DLP policy creation & improvement: Automatically create and enhance clients-specific policies
check mark
External device transfers: Content-aware management of transfers to external devices to ensure no sensitive data leaks
check mark
Data classifiers: Use pre-built data classifiers to protect sensitive personal, health, and confidential data
check mark
Strict DLP policy & clipboard control: Enforce strict DLP controls for certain clients and redirected clipboards
check mark
Optical character recognition: Avert textual data in graphical format from leaking, even for remote and offline endpoints
check mark
Content inspection: Inspect and filter textual and binary content transferred via local and network channels
check mark
Real-time alerting: Give DLP admin the necessary visibility to react quickly to critical security events
check mark
Configure policy-based logs: Set automatic log collection and retention for security events stored in a central cloud
check mark
View DLP events: Spot DLP events easily with an overview pane with filtering capabilities
check mark
End-user popup notifications: Increase client awareness with on-screen explanations of blocked data transfers
check mark
Barricade override support: Allow business continuity by implementing a one-time override exception for certain situations
check mark
Features
Standard Cloud Protect
With Advanced Features
Secure file sync and share
check mark
check mark
Notarisation: Generates a certificate of validation for files
check mark
check mark
Electronic signing: Authenticate e-signatures
check mark
check mark
File notarisation: Create undeniable proof that an original file is unaltered with a blockchain-based certificate and time stamp
-
check mark
Embed eSignatures: Confirm your identity with a drag, drop, and sign feature for every step of a document’s workflow
-
check mark
Verify files: Showcase transaction history and data authenticity by empowering your clients with an extraordinary audit trial
-
check mark

Client reviews

Our clients have rated our hosting services and support 5 stars!

  • Highly Recommend HOSTAFRICA

    I would highly recommend HOSTAFRICA compared to all the web hosting companies that i have used. the dedicated staff always ready to help and very patient to hear your issues with minimal time taken in having every issue fixed and resolved. Thanks to all the dedicated staff and thank you to Ryno Van Wyk for helping with a sound mind. 100% recommendation from me.
  • Best Website services for everyone.

    HOSTAFRICA is the best, the support is always available and efficient. I am happy I chose them to develop and host my website. The best experience on website hosting, I learnt a lot and without a doubt I do recommend it for anyone who needs website services. Thank you, HOSTAFRICA.
  • Consistent outstanding support

    From personal experience as a long-standing client with several domains, HOSTAFRICA has consistently provided me with fast response and outstanding support to any queries. I would recommend HOSTAFRICA to any business looking for a reliable ISP.
grey dots support staff fielding a call support ticket open on a mobile device

Committed to outstanding support

We are fiercely committed to providing outstanding service and support to our customers. We uphold this standard of excellence because businesses like yours depend on us to operate uninterrupted at all times, and this is a responsibility we take to heart.

Protect your clients with free cybersecurity services

Fortify your reseller offering and profits with world-class protection

security icon

Steadfast Cybersecurity

Take charge of your clients’ online safety with enhanced protection that works with their antivirus seamlessly. Don’t let your clients fall victim to the same cyberthreats, malware attacks, and ransomware that unprotected people get swindled by.

pen paper icon

Notary

Authentic, verified data and signatures. The perks you’ll enjoy from this blockchain-based file notarisation and eSigning service. A fascinating solution to file integrity.

upload download icon

Disaster Recovery

Be prepared by testing disaster recovery plans in isolated network environments. When disaster strikes, you can provide your clients the immediate access they need to their backed-up data from their personal devices via a secure Business VPN connection.

cloud icon

File Sync and Share

Remote work is the future. Increasing your clients’ productivity by enabling them to create and share from any device or location with no extra cost is a top-draw move. Don’t stay trapped in a bygone work paradigm, equip yourself for the future.

Start your Acronis reseller business today!

Join the thousands of happy clients hosting with us.

  • check mark Once off KSh2250 sign up
  • check mark Try risk free
  • check mark Discounts on list prices
  • check mark Incredible support
  • check mark Backup any device
  • check mark Unlimited backup agents
  • check mark Restore individual files
  • check mark Restore as virtual machine
  • check mark Bare metal recovery
  • check mark AES-256 encryption
  • check mark Backup to local storage
  • check mark Web-based control panel
  • check mark In-file-delta technology
  • check mark Flexible schedule configuration
  • check mark Auto email reports
  • check mark Advanced options available

Related posts

Frequently asked questions

If you still have unanswered questions, please reach out to us and we’ll be happy to assist.

The once-off payment fee is required to activate the reseller account and enable orders to be placed from the range of reseller products.

After the first successful order of any reseller product, it will then be automatically activated. The first invoice will only be sent on the 1st of the following month and will be payable on presentation. All the reseller products are being invoiced in arrears – this means the product is used first and then paid for later. This method of billing will continue for every billing period.

The reseller discount will be automatically applied to the reseller invoice for every billing period.

To become an Acronis reseller, you’ll need some Acronis products, we provide these at a competitive price to ensure comfortable profits for you. Just sign up, pay the KSh2250 registration fee and begin selling Acronis services.

We even provide you the opportunity to resell Acronis’ Advanced service packs. These are world-class ready-made data security solutions you can offer your clients, all the work is done for you.

Not only is your data stored in the safest possible location, the cloud which is maintained by experts, but you can back up your data automatically and therefore a lot more frequently. It’s a set-and-forget solution.

You’re also able to restore lost files from any point in time with hardly any downtime if any. Lastly, you save time as the whole process is customisable and streamlined, making backing up and restoration much swifter than from hard storage devices.

Ransomware is a type of malware that encrypts your files and then holds them hostage by demanding payment in exchange for the decryption key. Here are some ways to protect yourself:

  • Be careful what you click on: Ransomware is often delivered through emails that look legitimate but actually contain malicious links or attachments.
  • Keep your software up to date: Make sure you install the latest updates for your operating system and applications to ensure you are protected against the latest threats.
  • Use strong passwords: Using long, unique passwords that combine letters, numbers, and punctuation can help protect you from being compromised by weak passwords that may be exposed in a data breach.
  • Use antivirus software: Antivirus software can help detect and block ransomware before it infects your system.
  • Backup your data: A backup can help protect your data in the event of an infection and is a good recovery option.

Yes, Acronis backups can be encrypted if you enable encryption. As per regulations, they’re encrypted before transfer with AES-256, the highest form of encryption. This added layer of protection ensures that your data remains confidential in the case of a disastrous security breach. The password to your encrypted data lies in your hands only.

Acronis acts as both a backup solution as well as a data protection application.

You can backup servers, virtual servers, devices such as pc's, laptops and smartphones, as well as applications like Microsoft Office, SharePoint and Exchange.

In addition to backing up your devices and applications, Acronis provides security in the form of patching, antimalware, anti-virus and ransomware protection.

Yes, with Acronis' VM protection, you can backup individual and multiple cPanel accounts. With the addition of the cPanel plugin, users can restore their own backups without the need for root access.