Integrating Acronis alerts into Google Chronicle provides a centralized platform for monitoring and managing security alerts. This consolidation allows the MSP business to have a unified view of potential threats and incidents across all customer accounts, making it easier to prioritize and respond to security events effectively.
Google Chronicle is designed to provide advanced threat detection and analysis capabilities. Correlating Acronis alerts with other security events and logs in Chronicle can help the MSP identify patterns and potential threats that might go unnoticed when viewed in isolation.
Thanks to the Acronis SIEM Connector, MSPs have the option to choose specific customers for alert transmission to Google Chronicle SIEM, therefore minimizing unnecessary noise and concentrating solely on the incidents that matter most to them. Additionally, MSPs can select from the pool of 170 Acronis alerts, deciding which ones should be featured in the Google Chronicle SIEM reports.
Acronis supports core event format - CEF (Common Event Format), enabling MSPs to work with the data sent by the integration out of the box. Alerts are pre-formatted on Acronis side and don't require MSP to create any additional rules on SIEM side. Integration is setup only by providing server and client certificates