Acronis True Image

{{Short description|Data protection software for personal users}}

{{Infobox software

| name = Acronis True Image

| logo =

| screenshot =

| caption = Acronis True Image

| author = Acronis

| developer =

| released =

| latest release version = {{plainlist|

  • Build #41393 (Windows)
  • Build #41396 (Mac)

}}

| latest release date = {{Start date and age|2024|07|16}}{{cite web |title=Product Updates|url=https://forum.acronis.com/forum/acronis-true-image-formerly-acronis-cyber-protect-home-office/announcing-acronis-true-image-2025?ckattempt=1|website=www.acronis.com}}

| latest preview version =

| latest preview date =

| operating system = {{plainlist|

}}

| platform = IA-32 and x86-64

| size =

| language = English, French, German, Japanese, Italian, Spanish, Russian, Korean, Chinese Traditional, Chinese Simplified, Indonesian, Portuguese, Dutch

| genre = Data protection and backup software

| license = Proprietary software

| website = {{URL|https://www.acronis.com/en-us/products/true-image//}}

}}

Acronis True Image is a proprietary backup, imaging, cloning and cybersecurity suite developed by Acronis International GmbH.{{Cite web |date=2021-05-10 |title=Acronis True Image Review 2023: Is the High Cost Worth It? |url=https://www.websiteplanet.com/cloud-storage/acronis/ |access-date=2023-12-20 |website=Website Planet |language=en}} It can back up files, data, clone storage media and protects the system from ransomware.{{Cite journal |last=Alawida |first=Moatsum |last2=Omolara |first2=Abiodun Esther |last3=Abiodun |first3=Oludare Isaac |last4=Al-Rajab |first4=Murad |date=2022-11-01 |title=A deeper look into cybersecurity issues in the wake of Covid-19: A survey |url=https://www.sciencedirect.com/science/article/pii/S1319157822002762 |journal=Journal of King Saud University - Computer and Information Sciences |volume=34 |issue=10, Part A |pages=8176–8206 |doi=10.1016/j.jksuci.2022.08.003 |issn=1319-1578|pmc=9367180 }}{{Cite conference |last=Alsagoff |first=Syed Nasir |date=2010 |title=Malware self protection mechanism issues in conducting malware behaviour analysis in a virtual environment as compared to a real environment |url=https://ieeexplore.ieee.org/abstract/document/5561600 |conference=2010 International Symposium on Information Technology |volume=3 |pages=1326–1331 |doi=10.1109/ITSIM.2010.5561600 |access-date=2024-08-11 |via=IEEE Xplore|url-access=subscription }} In 2021, the product was renamed to Acronis Cyber Protect Home Office before being renamed back to True Image in 2024.{{Cite web |title=TIB File - What is a .tib file and how do I open it? |url=https://fileinfo.com/extension/tib |access-date=2024-08-11 |website=fileinfo.com}}{{Cite web |title=Acronis True Image returns: Reintroducing - ProQuest |url=https://www.proquest.com/docview/3083259675/abstract?_oafollow=false&pq-origsite=primo&sourcetype=Trade%20Journals |access-date=2024-08-11}}

Backup and restoration

The product can back up a computer, selected disks or selected files to a local location or to a data center operated by Acronis. Data is stored within a proprietary image file.

= Backup =

== Local backup ==

It can create two types of backup archives: (1) files and folder backups (which consist of user-specified files and directories (but not the metadata of the disk or partition)) and (2) full system images (which consist of files, directories and disk metadata).

The software can perform full, differential and incremental backups:

  • Full: Creates a new backup archive every time and backs up everything specified by the user.
  • Differential: Backups only backup the changes made since the latest full backup.
  • Incremental: Only backs up the changes made since the last incremental backup. Incremental backups are a chain and loss of any one of the incremental backups renders the entire backup useless.{{Cite journal |title=Changing Backup Software [From the Screen of Stone] |date=2015 |url=https://ieeexplore.ieee.org/document/7364342 |access-date=2023-12-20 |doi=10.1109/map.2015.2480085 |last1=Stone |first1=W. Ross |journal=IEEE Antennas and Propagation Magazine |volume=57 |issue=6 |pages=178–179 |bibcode=2015IAPM...57..178S }}

== Cloud backup ==

Users can specify to store their backup archives in Acronis's data centers around the globe.{{Cite conference |last1=Gill |first1=Arshpreet Kaur |last2=Zavarsky |first2=Pavol |last3=Swar |first3=Bobby |date=2021 |title=Automation of Security and Privacy Controls for Efficient Information Security Management |url=https://ieeexplore.ieee.org/abstract/document/9478126 |conference=2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) |pages=371–375 |doi=10.1109/ICSCCC51823.2021.9478126 |access-date=2024-08-11|url-access=subscription }}

= Restoration =

Acronis True Image allows users to restore files from a full disk or a file-based archive using either a preinstallation media with Acronis on it or from within the user interface of the program.{{Cite journal |last1=Warner |first1=Gary |last2=Nagy |first2=Mike |last3=Jones |first3=Kyle |last4=Mitchem |first4=Kevin |date=2014-05-29 |title=Investigative Techniques of N-Way Vendor Agreement and Network Analysis Demonstrated with Fake Antivirus |url=https://commons.erau.edu/adfsl/2014/thursday/3/ |journal=Annual ADFSL Conference on Digital Forensics, Security and Law}}

= File system support =

The software can create full disk backup archives of several file systems including: NTFS (Windows); FAT32 (Windows 9x and removable media); Macintosh systems (HFS+ and APFS) and Linux systems (ext2, ext3, ext4; ReiserFS, and Linux Swap). Acronis uses sector-by-sector copy when a non-supported filesystem is backed up.{{cite web |title=Creating a Sector-By-Sector Backup with Acronis Products |url=https://kb.acronis.com/content/1543 |access-date=15 June 2017 |website=Acronis Knowledge Base}}

= Encryption =

The backup archives can be encrypted to reduce the risk of unauthorized access using either: none, 128, 192, or 256-bit AES encryption.{{Cite web |date=2022-01-06 |title=Targeting Backup Encryption: Acronis, Macrium, and Veeam |url=https://blog.elcomsoft.com/2022/01/targeting-backup-encryption-acronis-macrium-and-veeam/ |access-date=2024-08-11 |website=ElcomSoft blog |language=en-US}} On modern systems, higher bit encryption algorithms do not noticeably impact backup or restoration performance rendering the selection of weaker options pointless.

= Technical limitations =

Managing backup archives created using the Acronis Cyber Protect Home Office software can be challenging for expert users who want to use it in conjunction with other software to manage their backups. The software does not recognize when backups have been deleted using external software.

The compatibility of backup archives is not guaranteed between products that are not within the same version.{{Cite web |title=Backup archive compatibility across different product versions |url=https://kb.acronis.com/tib |access-date=2024-08-11 |website=kb.acronis.com}}

= File format =

Prior to Acronis True Image 2020, the file format used for storing backup image or file data was the True Image Backup file format (TIB). True Image 2020 added an additional format: TIBX that provides additional functionality.

== TIB ==

The TIB (.tib) file format is used for storing the backup image data for all True Image versions especially prior to True Image 2020.

The TIB file can be forensically identified by looking for a file signature of CE 24 B9 A2 20 00 00 00 or B4 6E 68 44.{{Cite web |title=File Signatures |url=https://www.garykessler.net/library/file_sigs.html |access-date=2024-08-11 |website=www.garykessler.net}}

== TIBX ==

The TIBX file format, added in Acronis True Image 2020, addresses limitations with the TIB format such as replacing the MD5 hashed password with another mechanism to mitigate brute force attacks.

Disk cloning

The product supports cloning the contents of a SATA or NVMe storage media to another. The product will adjust the size of the partition(s) to ensure that they fit on the destination storage device.

Some hard disk manufacturers (including Western Digital,{{cite web |date=2012-02-05 |title=WD Support |url=http://support.wdc.com/product/downloaddetail.asp?swid=119&wdc_lang=en |url-status=dead |archive-url=https://web.archive.org/web/20141118192224/http://support.wdc.com/product/downloaddetail.asp?swid=119&wdc_lang=en |archive-date=2014-11-18 |access-date=2014-11-24 |publisher=Support.wdc.com}} Crucial and Seagate{{cite web |title=Seagate DiscWizard |url=http://www.seagate.com/support/downloads/discwizard/ |access-date=2016-02-20 |publisher=Acronis.com}}) provide customized variants of Acronis True Image with their drives that allows the user to clone their existing disk to another disk but with the caveat that the disks typically have to be of the same manufacturer.

Cybersecurity

In 2016, active ransomware countermeasures, blockchain-based notary services, and electronic signing (premium version only) were added to the product.

In 2020, security features (i.e., integrated advanced anti-malware features including real-time protection, vulnerability assessment, anti-virus scans, web filtering, and videotelephony app protection) were integrated into the product.

Naming

Prior to Acronis True Image 9, their business-focused product Acronis Backup or Acronis Cyber Protect shared the same name as their home product (i.e., True Image) with the minor exception that the business versions were called Acronis True Image Server. Later server backup software was renamed Acronis Backup.

In 2021 Acronis renamed the home product to Acronis Cyber Protect Home Office. It was renamed back to True Image in 2024.

See also

References