Acronis vs Veeam

NinjaOne

Ratings

Acronis

Veeam

NinjaOne Logo®

Overall

4.7
4.6

4.8

Meets Requirements

9.1
611 responses
9.4
482 responses

9.2

905 responses

Ease of Use

9.1
614 responses
9
485 responses

9.3

912 responses

Ease of Setup

9.1
568 responses
8.7
417 responses

9.4

804 responses

Ease of Admin

9.1
568 responses
9
415 responses

9.5

80 responses

Quality of Support

8.8
598 responses
9
415 responses

9.4

876 responses

Ease of Doing Business with

9.2
569 responses
8.9
425 responses

9.6

808 responses

Product Direction (% positive)

9.3
571 responses
9
467 responses

9.8

897 responses

Based on G2 Spring 2024

Competitors

Acronis

Product Summary

Acronis Cyber Protect Cloud is a cyber protection solution that ensures the security of all business data. It offers backup, disaster recovery, security, automation, and management solutions and can integrate with many other tools. Acronis empowers providers to deliver reliable services with endpoint management, IT security, data backup and recovery, and EDR.

Use Cases

  • Endpoint management:
    Users can monitor, manage, and secure all their endpoints regardless of their locations.
  • Data backup & recovery:
    Acronis enables IT teams to secure and protect critical data using data backup and recovery.
  • IT security:
    IT professionals can proactively protect and secure their IT environments with Acronis EDR.

Shortcomings

  • Web interface issues:
    The software’s web interface can be slow or stop suddenly, causing inconvenience.
  • Unclear error messages:
    The software’s error messages are difficult to decipher, especially when a backup is unsuccessful.
  • Auto-update failure:
    Auto-update on agents does not always succeed.
  • Support knowledge:
    Some users have found that it is difficult to obtain support and troubleshooting help.

Veeam

Product Summary

Veeam is an IT security business that specializes in data protection and ransomware recovery. Veeam focuses on providing data security, data recovery, and data freedom for IT teams regardless of their locations. Veeam users gain access to secure data backup, recovery, and storage services to protect their data anytime, anywhere.

Use Cases

  • Data backup:
    Users are able to streamline their backup processes while still retaining control over their data.
  • Ransomware recovery:
    Veeam helps IT teams recover quickly from ransomware attacks due to its data storage and instant recovery features.
  • Infrastructure monitoring and reporting:
    Veeam provides performance monitoring for backup infrastructure components.

Shortcomings

  • Challenging initial setup:
    New users find that the initial configuration is challenging and time-consuming.
  • Complex interface:
    G2 reviews report that the platform can be difficult to navigate and use to its full potential.
  • Minimal reporting:
    Performance reporting for agents is minimal and might not provide all the necessary information.

NinjaOne

Why your peers choose us over Acronis and Veeam

NinjaOne sets itself apart with its exceptional customer reviews, usability and comprehensive integration options, positioning it ahead of its competitors. The platform’s interface is expertly crafted for both quick adoption and ease of use, vital for dynamic IT environments. This focus on user experience doesn’t compromise its robust feature set, which is designed to boost operational efficiency, an area where many competitors struggle.

In terms of integration, NinjaOne shines by offering extensive compatibility with a wide array of third-party applications, an area where other RMM solutions often have limitations. This makes it a more adaptable choice for varied IT ecosystems. Furthermore, NinjaOne’s scalability and performance consistency, even in large network scenarios, mark it as a superior option. Enhanced by advanced, customizable reporting tools, NinjaOne emerges as a leading choice for IT professionals seeking a dependable, efficientRMM platform.

What they're saying

G2 5-star rating
Software Advice 5-star rating

Watch a Demo of the #1 IT Management Software on G2

This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is for validation purposes and should be left unchanged.

Related resources

×

See NinjaOne in action!

By submitting this form, I accept NinjaOne's privacy policy.