Acronis Cyber Agent
9 min
Automate Agents Update Management Using API
Managing the Acronis Agent update using API was a common request from our partners and customers. There are 3 main requests. To have the possibility to customize Agents update setting, to retrieve downloadable links to the Agent installer packages, and, the last but not least, to force Agents updates. With lasts Acronis Cyber Protect Cloud updates all the functionality is available in our public Cyber Platfrom API.
Acronis Cyber Platform
6 min
This article will look at how you can leverage the Acronis Cyber Platform to extend the capabilities of Acronis and Paessler PRTG integration and maximize the cyber protection monitoring you offer to clients.
Acronis Cyber Agent
8 min
Starting the agent for the Acronis Cyber Cloud 9.0, it's possible to customize the Acronis Cyber Agent installation using command line parameters. In this article, we'll navigate common customization scenarios for macOS systems.
Acronis Cyber Agent
8 min
Starting the agent for the Acronis Cyber Cloud 9.0, it's possible to customize the Acronis Cyber Agent installation using command line parameters. In this article, we'll navigate common customization scenarios for Linux systems.
Acronis Cyber Agent
8 min
Starting the agent for the Acronis Cyber Cloud 9.0, it's possible to customize the Acronis Cyber Agent installation using command line parameters. In this article, we'll navigate common customization scenarios for the Windows system.
Acronis Cyber Agent
10 min
A recent release of the Acronis Cyber Cloud brings one of the highly demanded features - the Agent auto-updating and corresponding public API to control that updates.
The settings for automatic updates are preconfigured on a data center level. A company administrator can customize these settings for all machines in a company, unit, or individual device.
Account Management API
9 min
The common task for distributor or reseller automation is to automate billing. Manual processing requires a lot of time and might be affected by human errors hard to locate. It's why billing automation is one of the most requested integrations for any partner.
Before the C21.11 release of Acronis Cyber Cloud, it was possible but resources consuming to have an automated billing integration. We are continuously evolving our API so we are proud to present an additional option for usages reports creating API which requires us to spend months of development and planning behind to simplify our partner's daily tasks.
Acronis Cyber Agent
9 min
Automating software installation in IaaS environments in order to provide additional services to customers (e.g. IaaS or SaaS solutions based on IaaS) is a common challenge for many service providers. Acronis Cyber Protect integrates backup with next-generation, AI-based anti-malware and endpoint protection management into one solution. This article describes how to automate the installation of the Acronis Cyber Protect Agent and apply a protection plan.
Monitoring API
8 min
Automate provisioning helps you minimize the cost of sale and standardize the way you provision your customers. The next step is to automate protection management and automate monitoring and prevent customers from facing issues. The Acronis Cyber Platform API provides all needed functionality to build a sophisticated monitoring system. However, you might encounter some challenges when implementing that.
Resources Management API
6 min
Acronis Cyber Platform API helps MSPs achieve greater operational efficiency, giving more time to engage with their clients rather than focusing on deployments, service desk tickets, etc.
Account Management API
15 min
In years of the API economy when API is around us, it has become a common task to test how API fits a solution architecture and approach. There are a lot of ways to create a prototype and one of the commonly used is with Postman. While Postman can be applied in various scenarios, in this document we will be focusing on API.
Account Management API
7 min
These courses are designed to get you up and running quickly. Whether you're an experienced developer or not, we can point you to training that will help you develop high-quality integrations that are both useful and marketable.
At this part, we focus on usage reporting and working with locations and infrastructure information.
Account Management API
10 min
These courses are designed to get you up and running quickly. Whether you're an experienced developer or not, we can point you to training that will help you develop high-quality integrations that are both useful and marketable.
At this part, we focus on Users Management.
Account Management API
8 min
These courses are designed to get you up and running quickly. Whether you're an experienced developer or not, we can point you to training that will help you develop high-quality integrations that are both useful and marketable.
At this part, we focus on Offering Items and Applications Management.
Account Management API
11 min
These courses are designed to get you up and running quickly. Whether you're an experienced developer or not, we can point you to training that will help you develop high-quality integrations that are both useful and marketable.
At this part, we focus on Authorization and Tenants Management.
Acronis Developer Network
7 min
“Let’s automate.” “Yeah, it paid off.” We hear it everywhere about test automation. In this article, software testing company a1qa sheds light on its main perks, how to jump-start its adoption, and what role it plays in continuous and shift-lest testing.
Acronis Cyber Platform
10 min
Automating software installation in IaaS environments in order to provide additional services to customers (e.g. IaaS or SaaS solutions based on IaaS) is a common challenge for many service providers. Acronis Cyber Protect integrates backup with next-generation, AI-based anti-malware and endpoint protection management into one solution. This article describes how to automate the installation of the Acronis Cyber Protect Agent.
Python code examples
7 min
The turn-key integration of Acronis and Atera solutions will help MSPs achieve greater operational efficiency, giving more time to engage with their clients rather than focusing on deployments, service desk tickets, etc. them Thus, the key part of integration is the monitoring capabilities. In this deep dive tutorial let’s look, how Acronis Cyber Platform API provides enhanced capabilities to support such use cases.
Microserviсes
10 min
Switching over to a microservice architecture requires reviewing approaches to development, testing, support, and design, in other words, to all aspects of the software component life cycle. In this post, we’ll talk about the practices Acronis architects use to develop the best API components. This will include setting the objective and analyzing solutions to achieve it. Some people may view this post as “authoritative”, while others will wonder why they overlooked the super-solution X, but we hope you’ll find it interesting and useful.
Bash Code Examples
16 min
Bash is a very powerful tool which is suitable for many management tasks. It’s particularly popular for managing Linux workloads. So, let's look deeply at how to use bash to solve common tasks with the Acronis Cyber Platform API.
PowerShell Code Examples
11 min
PowerShell is a very powerful scripting tool which is suitable for many management tasks. It’s very popular for managing Microsoft infrastructure and with PowerShell Core, it can be used for Linux workloads. So let's look deeply at how to use PowerShell to solve common tasks with the Acronis Cyber Platform API.
Cyber Protection
19 min
Pax8 is the leader in cloud distribution for the IT channel. Born out of the challenges emerging within the traditional distribution ecosystem and the growth of cloud delivery and consumption models, Pax8’s mission is to enable the IT channel to simplify cloud buying through billing, provisioning, automation, PSA integrations, and pre-and-post sales support.
Acronis Cyber Platform
7 min
Today, we are announcing the Acronis Cyber Platform. The Acronis Cyber Platform is the foundation of Acronis’ Cyber Protection solutions, and with this launch we are opening and expanding the APIs we have been using to build our solutions on for years. We are also launching the Acronis Developer Network, where developers, ISVs and service providers can register and gain access to SDKs, documentation, sample code, training, forums and a developer playground. To support the platform, we are also announcing the Acronis Cyber Cloud Solutions portal, with it, all of our existing and new integrations are described and made available to our ecosystem in one place.
RAML
7 min
Everything can get changed in the dynamic world of microservices. You can rewrite every component using another language or another framework or architecture. Only contracts are invariable. They define the way your microservice interacts despite any internal change.
Python code examples
12 min
We are actively opening Acronis Cyber Platform API for partners and developers and it’s very important not only to provide documentation, but also to support programmers with clear code examples to complete real-life development tasks. So we are opening our fully functional Acronis Cyber Cloud integration for WHMCS on PHP and base examples of the platform’s API usage with Python. Let’s look at the examples and understand how to use it as a base for your API evaluation.
PHP code examples
5 min
The Acronis Cyber Cloud WHMCS provisioning module is a production-quality fully functional WHMCS integration developed by Acronis’ engineering team. The module is also available at the WHMCS Marketplace. It’s a valuable example of Acronis Cyber Platform API usage with PHP and a great quick starter for companies who want to build their own WHMCS module for Acronis Cyber Cloud. A developer can just reuse the code and business logic, or change what they need to change, as we publish it under the MIT license.