Automate Agents Update Management Using APIAutomate Agents Update Management Using API
Acronis Cyber Agent 9 min

Automate Agents Update Management Using API

Managing the Acronis Agent update using API was a common request from our partners and customers. There are 3 main requests. To have the possibility to customize Agents update setting, to retrieve downloadable links to the Agent installer packages, and, the last but not least, to force Agents updates. With lasts Acronis Cyber Protect Cloud updates all thee functilanity are availiuble in our public Cyber Platfrom API.
Acronis Cyber Platform 6 min
Monitor Acronis Protected Workloads with PRTG

Monitor Acronis Protected Workloads with PRTG

This article will look at how you can leverage the Acronis Cyber Platform to extend the capabilities of Acronis and Paessler PRTG integration and maximize the cyber protection monitoring you offer to clients.
Acronis Cyber Agent 8 min
Customize Unattended Acronis Agent Installation on macOS

Customize Unattended Acronis Agent Installation on macOS

Starting the agent for the Acronis Cyber Cloud 9.0, it's possible to customize the Acronis Cyber Agent installation using command line parameters. In this article, we'll navigate common customization scenarios for macOS systems.
Acronis Cyber Agent 8 min
Customize Unattended Acronis Agent Installation on Linux

Customize Unattended Acronis Agent Installation on Linux

Starting the agent for the Acronis Cyber Cloud 9.0, it's possible to customize the Acronis Cyber Agent installation using command line parameters. In this article, we'll navigate common customization scenarios for Linux systems.
Acronis Cyber Agent 8 min
Customize Unattended Acronis Agent Installation on Windows

Customize Unattended Acronis Agent Installation on Windows

Starting the agent for the Acronis Cyber Cloud 9.0, it's possible to customize the Acronis Cyber Agent installation using command line parameters. In this article, we'll navigate common customization scenarios for the Windows system.
Acronis Cyber Agent 10 min
Update Agent Automatically and Monitor Update Statuses Using API

Update Agent Automatically and Monitor Update Statuses Using API

A recent release of the Acronis Cyber Cloud brings one of the highly demanded features - the Agent auto-updating and corresponding public API to control that updates. The settings for automatic updates are preconfigured on a data center level. A company administrator can customize these settings for all machines in a company, unit, or individual device.
Account Management API 9 min
Billing Automation with Usage Report

Billing Automation with Usage Report

The common task for distributor or reseller automation is to automate billing. Manual processing requires a lot of time and might be affected by human errors hard to locate. It's why billing automation is one of the most requested integrations for any partner.  Before the C21.11 release of Acronis Cyber Cloud, it was possible but resources consuming to have an automated billing integration. We are continuously evolving our API so we are proud to present an additional option for usages reports creating API which requires us to spend months of development and planning behind to simplify our partner's daily tasks.
Acronis Cyber Agent 9 min
Automate Acronis Agent Installations with Protection Plan Applying

Automate Acronis Agent Installations with Protection Plan Applying

Automating software installation in IaaS environments in order to provide additional services to customers (e.g. IaaS or SaaS solutions based on IaaS) is a common challenge for many service providers. Acronis Cyber Protect integrates backup with next-generation, AI-based anti-malware and endpoint protection management into one solution. This article describes how to automate the installation of the Acronis Cyber Protect Agent and apply a protection plan.
Monitoring API 8 min
Advanced Monitoring Automation with Acronis Cyber Cloud

Advanced Monitoring Automation with Acronis Cyber Cloud

Automate provisioning helps you minimize the cost of sale and standardize the way you provision your customers. The next step is to automate protection management and automate monitoring and prevent customers from facing issues. The Acronis Cyber Platform API provides all needed functionality to build a sophisticated monitoring system. However, you might encounter some challenges when implementing that.
Account Management API 15 min
Prototyping Acronis Cyber Platform API Solutions with Postman: Account Management

Prototyping Acronis Cyber Platform API Solutions with Postman: Account Management

In years of the API economy when API is around us, it has become a common task to test how API fits a solution architecture and approach. There are a lot of ways to create a prototype and one of the commonly used is with Postman. While Postman can be applied in various scenarios, in this document we will be focusing on API.
Acronis Cyber Platform 10 min
Automate Acronis Agent Installations

Automate Acronis Agent Installations

Automating software installation in IaaS environments in order to provide additional services to customers (e.g. IaaS or SaaS solutions based on IaaS) is a common challenge for many service providers. Acronis Cyber Protect integrates backup with next-generation, AI-based anti-malware and endpoint protection management into one solution. This article describes how to automate the installation of the Acronis Cyber Protect Agent.
Python code examples 7 min
Some Technical Aspects of the Integration of Atera’s Powerful PSA and RMM Suite with Acronis Cyber Cloud

Some Technical Aspects of the Integration of Atera’s Powerful PSA and RMM Suite with Acronis Cyber Cloud

The turn-key integration of Acronis and Atera solutions will help MSPs achieve greater operational efficiency, giving more time to engage with their clients rather than focusing on deployments, service desk tickets, etc. them Thus, the key part of integration is the monitoring capabilities. In this deep dive tutorial let’s look, how Acronis Cyber Platform API provides enhanced capabilities to support such use cases.
Microserviсes 10 min
Microservices: how to comply with a contract

Microservices: how to comply with a contract

Switching over to a microservice architecture requires reviewing approaches to development, testing, support, and design, in other words, to all aspects of the software component life cycle. In this post, we’ll talk about the practices Acronis architects use to develop the best API components. This will include setting the objective and analyzing solutions to achieve it. Some people may view this post as “authoritative”, while others will wonder why they overlooked the super-solution X, but we hope you’ll find it interesting and useful.
Bash Code Examples 16 min
Base Acronis Cyber Platform API operations with Bash

Base Acronis Cyber Platform API operations with Bash

Bash is a very powerful tool which is suitable for many management tasks. It’s particularly popular for managing Linux workloads. So, let's look deeply at how to use bash to solve common tasks with the Acronis Cyber Platform API.
PowerShell Code Examples 11 min
Base Acronis Cyber Platform API operations with PowerShell

Base Acronis Cyber Platform API operations with PowerShell

PowerShell is a very powerful scripting tool which is suitable for many management tasks. It’s very popular for managing Microsoft infrastructure and with PowerShell Core, it can be used for Linux workloads. So let's look deeply at how to use PowerShell to solve common tasks with the Acronis Cyber Platform API.
Acronis Cyber Platform 7 min
Announcing the Acronis Cyber Platform

Announcing the Acronis Cyber Platform

Today, we are announcing the Acronis Cyber Platform. The Acronis Cyber Platform is the foundation of Acronis’ Cyber Protection solutions, and with this launch we are opening and expanding the APIs we have been using to build our solutions on for years. We are also launching the Acronis Developer Network, where developers, ISVs and service providers can register and gain access to SDKs, documentation, sample code, training, forums and a developer playground. To support the platform, we are also announcing the Acronis Cyber Cloud Solutions portal, with it, all of our existing and new integrations are described and made available to our ecosystem in one place.
RAML 7 min
Choosing between RAML and OAS (Swagger)

Choosing between RAML and OAS (Swagger)

Everything can get changed in the dynamic world of microservices. You can rewrite every component using another language or another framework or architecture. Only contracts are invariable. They define the way your microservice interacts despite any internal change.
Python code examples 12 min
Acronis Cyber Platform API with Python Quick Start

Acronis Cyber Platform API with Python Quick Start

We are actively opening Acronis Cyber Platform API for partners and developers and it’s very important not only to provide documentation, but also to support programmers with clear code examples to complete real-life development tasks. So we are opening our fully functional Acronis Cyber Cloud integration for WHMCS on PHP and base examples of the platform’s API usage with Python. Let’s look at the examples and understand how to use it as a base for your API evaluation.
PHP code examples 5 min
Fully functional Acronis Cyber Platform API PHP sample – WHMCS provisioning module

Fully functional Acronis Cyber Platform API PHP sample – WHMCS provisioning module

The Acronis Cyber Cloud WHMCS provisioning module is a production-quality fully functional WHMCS integration developed by Acronis’ engineering team. The module is also available at the WHMCS Marketplace. It’s a valuable example of Acronis Cyber Platform API usage with PHP and a great quick starter for companies who want to build their own WHMCS module for Acronis Cyber Cloud. A developer can just reuse the code and business logic, or change what they need to change, as we publish it under the MIT license.