Skip links

Author: Nicole Magney, Public Policy & Communications Manager

Lock Blog Featured Image

Building Digital Resilience in the Wake of SolarWinds

New Year, New Certifications At Acronis SCS, we have kicked off 2021 with some exciting news: our hardened backup software officially earned its Federal Information Processing Standards (FIPS) 140-2 validation. To earn this certification, our backup software for federal government and utilities completed rigorous testing
Careers Secondary 1 Acronis SCS

The Org Highlights Acronis SCS’ Commitment to Diversity

The Org Highlights Acronis SCS' Commitment to Diversity At Acronis SCS, our dedication to diversity "means more than just hiring diverse people. It also means they’re fully supported as they integrate themselves into the company." Click below to learn more about our commitment to welcoming
Careers Secondary 1 Acronis SCS

Customers We Serve

At Acronis SCS, the US public sector is our #1 priority - in fact, it's our only priority. Click to gain a better understanding of the customers we serve across the federal, state and local, education, healthcare, and nonprofit sectors. Download One-Pager
Spurring Growth Blog Featured Image

Why Arizona?

With a business model laser-focused on serving the US public sector's cyber protection needs, why did Acronis SCS choose to put down roots in Arizona? The answer is threefold. With impressive defense and tech infrastructure in place, access to the nation's top talent, and a
usmc image

Optimally Balanced Orientation of Graphs

This research paper - published by IEEE and co-authored by Joe Barr (Joe Barr), Faisal Abu-Khzam (Lebanese American University), and Peter Shaw (Nanjing University) - explores how to optimally balance graph orientations. Read the Paper
Acronis SCS State and Local Industry Spotlight

Combinatorial Code Classification & Vulnerability Rating

This research paper - published by IEEE and co-authored by Joe Barr and Tyler Thatcher (Acronis SCS), Peter Shaw (Nanjing University), Faisal Abu-Khzam (Lebanese American University), and Sheng Yu and Heng Yin (University of California - Riverside) - uses an empirical analysis of source code