At a time when dependence on the cloud seems inevitable, Acronis has decided to look at the other side of the technological mirror. The company, recognized for its leadership in cybersecurity and data protection, has presented Acronis Cyber Protect Locala solution designed for those environments where connection to the cloud is not possible or desirable.
Its objective is to offer the same advanced protection that characterizes its cloud services, but within the client’s facilities, guaranteeing sovereignty, regulatory compliance and operational continuity.
A response to the new cybersecurity map
More and more companies operate with critical infrastructure and legacy systems that cannot be exposed to the Internet. In sectors such as energy, transportation or health, dependence on OT (Operational Technology) or industrial control (ICS) systems means that cloud adoption is not always a viable option. It is in this context where this solution finds a niche of real need.
The new system integrates backup, disaster recovery, cybersecurity and endpoint management functions into a single platform, all without depending on external connectivity. With this, it seeks to offer a hybrid model where the cyber resilience do not depend on the cloud, but on the client’s own infrastructure.
Acronis Cyber Protect Locala solution designed for those environments where connection to the cloud is not possible or desirable.
“Critical infrastructures cannot wait”
Gaidar Magdanurov, president of the development company, sums it up clearly, “Despite the widespread adoption of cloud-based applications, there are critical infrastructures that require on-site deployment and protection.” According to the manager, sectors that guarantee essential services such as water, electricity, health or transportation continue to be vulnerable to cyberattacks due to their dependence on obsolete software and hardware.
“In 2025, more than 50% of OT organizations reported at least one cybersecurity incident,” Magdanurov added, underscoring the urgency of having solutions that operate in isolation but with the same levels of advanced protection. This new system runs on a management server within the client’s internal networks, allowing it to meet the strictest security and data localization requirements.
Technology designed for mixed and demanding environments
One of the strong points of this proposal is its compatibility. The solution is capable of working with old operating systems such as Windows XP and with modern hypervisors such as VMware, Hyper-V, Nutanix or Proxmox. It also covers OT and ICS environments, significantly expanding its reach in industrial infrastructures.
Added to this are features such as one-click self-service recoverythe cross-platform migration and the workload portabilitywhich facilitate administration even in hybrid or hyperconverged environments. In addition, it incorporates automated detection technology for unmanaged devices, thus reducing security blind spots.
Automation and artificial intelligence at the service of local protection
Although its deployment is local, the new platform does not renounce the artificial intelligence as an efficiency driver. AI-powered automation allows you to detect anomalies, manage vulnerabilities, and execute recovery processes autonomously. This combination reduces the workload on IT teams and improves incident response capabilities, especially in organizations with limited technical resources.
By consolidating multiple tools into a single console, the system aims to simplify technological management without sacrificing security. According to its developers, this centralization reduces operating costs and increases productivitywhile allowing a unified view of risks.
One more step towards data sovereignty
The concept of digital sovereignty is gaining ground in Europe and other regions where organizations seek to maintain full control of their information. This solution responds directly to this trend, offering a model that keeps data within the client’s security perimeter.
This architecture not only ensures regulatory compliance, but also reinforces confidence in the internal management of sensitive data. For companies that operate under strict regulations or in countries with technological sovereignty policies, it becomes a necessary alternative to exclusively cloud-based solutions.
