Endpoint security

Scenario overview

This scenario is for ISVs that provide endpoint protection and security using an endpoint agent managed by the cloud service. The purpose of such integration is to allow management and monitoring of ISV endpoint agents from Acronis Cyber Platform.

The general scheme is the following:

../../../_images/endpoint_protection_scenario.png

Typical integration scope

Typical integration scope is built around monitoring the scenario and should include the following functionality:

  1. Establishing connection to ISV cloud - connection parameters and credentials to allow endpoint protection data to be transferred to Acronis Cyber Platform using Integration settings extension point.

  2. Mapping customers - pairing ISV customers to Acronis tenants to be able to report the list of protected workloads to the correct tenant using the Integration settings extension point.

  3. Reporting protected workloads and their statuses to the Devices list in Acronis Cyber Protection Console using the Workloads extension point.

  4. Reporting alerts on detected threats and security issues to the Alerts list in Acronis Cyber Protection Console using the Alerts extension point.

Extended integration scope

To increase the integration value for the MSPs, it is recommended to enhance the integration with additional monitoring and management functionality:

  1. Create integration-specific widgets to monitor endpoint protection status using the Widgets extension point.

  2. Provide the ability to configure tenant-level settings in Acronis Cyber Protection Console using the main menu extension point.

  3. Provide the ability to configure endpoint-level settings in Acronis Cyber Protection Console using the Protection plan extension point.