Skip to main

You are here

Acronis buys European cyber-consultancy

Acronis, positioning itself more widely in security, has bought CyberLynx, an Israel-based cybersecurity consultancy firm with a presence in the UK, Switzerland, and Luxembourg. This acquisition marks Acronis’ third in the past year, which continues the company’s accelerated growth plan.

As a provider of security audits, penetration testing, and proprietary training solutions, CyberLynx claims a global customer presence built on its expertise and connections with forensic suppliers. Acquiring these capabilities will advance Acronis’ mission to deliver world-class cyber protection to organisations around the world, it says. Acronis will integrate CyberLynx’s services into its suite of Acronis Security Services, expanding the training and solutions available to increase an organisation’s security posture. Drawing on CyberLynx’s expertise in threat simulation and analysis, Acronis aims to better assist managed service providers and managed security service providers as they protect their clients and serve as the “last line of defence” against the latest threats.

“Acronis’ acquisition of CyberLynx demonstrates its commitment to strengthening its expertise in cybersecurity,” said Frank Dickson from IDC. “By providing integrated cybersecurity and data protection offerings, Acronis reduces the complexity of implementing cybersecurity and improving IT resiliency. The CyberLynx acquisition will strengthen Acronis’ services offering, further enhancing Acronis’ ability to be an active partner in improving client organisation’s security posture with training and consulting solutions.”

“Adding CyberLynx to our portfolio helps Acronis provide security evaluations services to our partners, empowering them to improve their clients’ protection,” said Serguei “SB” Beloussov, Acronis’ Founder and CEO. “Working with our security team and global network of Cyber Protection Operation Centres, we will assist MSPs as they transition to MSSPs delivering training in incident response, penetration testing, and forensic analysis.”