Feeds

Acronis: We're snatching Symantec market share

We're coming to get you, backup!

High performance access to file storage

Why can't backup SW vendors import customers' backup data from competing leggy products, such as BackupExec? After all Microsoft developed Excel to import Lotus Notes spreadsheets. Why isn't this kind of attack marketing happening in backup?

It is probably forbidden. Backup formats are proprietary, like ours. It's also because Backup software has lots of extensions and APIs that are unique. The effort would be huge and simply hasn't been undertaken.

What is the revenue picture at Acronis?

We don't communicate revenue details. Our funding is by private investors and a few Venture Capitalists but it is not VC-dominated and there is no VC push for a crystallisation.

We are extremely international, with three regions; Europe, the USA, and Asia, with each representing significant revenues.

So what do we think? Acronis is extremely close-mouthed about its financial performance and simply won't talk publicly about its size and how that is changing over the years. A press release (in German) from a company that appointed an ex-Acronis CEO Walter Scott as its CEO, mentions Acronis earning $120m in 2008, a big jump from the $20m three years earlier.

Replacement Acronis CEO Jason Donahue confirmed that revenues at that time were "Well north of $100m". He said they had grown by 20 per cent from calendar 2007 to 2008, with the final 2008 quarter being the firm's highest-grossing quarter ever. ®

Bootnote

Privately-owned Acronis was founded 2001 by Serguei Beloussov, Max Tsypliaev, and Ilya Zubarev. It was officially incorporated in 2002 in San Francisco, but it its head quarters are in Boston, with the actual code written in Russia.

Acronis says it has no one large home market and has been international from day one, selling its products in 90 countries, from offices in 18 countries, and supporting fourteen languages. It says it is one of the few companies its size that can compete globally.

Acronis has an OEM channel with three categories. There are HDD OEMs like Netgear, Seagate, and Iomega. Seagate, for example, ships Acronis software with external hard drives.

A second and smaller category is PC manufacturers, and third is vertical market OEMs shipping Acronis software with medical devices, point-of-sale products and printers. Oce, recently bought by Canon, is one of the largest of these.

High performance access to file storage

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.