How security should be: G DATA Antivirus reliably protects your PC against viruses - and your personal data during online banking transactions and shopping trips. So you no longer have to worry about the most common threats. New in this version of Antivirus is comprehensive exploit protection. This also safeguards your PC against malware that targets and exploits security vulnerabilities in your installed software.
G DATA Internet Security offers the best protection against viruses, keyloggers and Trojans, plus a powerful firewall. You get the best protection against every danger on the Internet, such as phishing, spam and spyware. Whether you want to send emails, use online banking services or just surf. This version includes comprehensive exploit protection. In addition to virus protection, this also safeguards your PC against malware that targets and exploits security vulnerabilities in your installed software.
Security doesnt get any better! G DATA Total Protection not only reliably protects you against viruses, Trojans, spyware and hacking - thanks to the numerous extras such as encryption of your personal data or reliable device control, you are also completely safe from every other threat. New in this version is comprehensive exploit protection. This also safeguards your PC against malware that targets and exploits security vulnerabilities in your installed software.
G DATA Antivirus for Mac offers special protection against viruses and phishing attempts for your Mac running OS X®. Not only does it proactively protect against Mac viruses, it also provides additional protection for your Windows PCs that are connected to your network. Integrated phishing protection also blocks websites that try to spy on data.
Award-winning virus protection and a powerful firewall provides the ultimate protection against malware, hacker attacks and data loss
.
MOBILE
G DATA Mobile Internet Security – Android
G DATA Internet Security offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely to prevent unauthorized access.
The setup includes all functions and additional modules of our business software. The features and modules you have bought are activated according to your registration number or login
It has never been easier to save a business card, to send a pre-formulated SMS or to receive an URL of an exiting event: QR codes pass concentrated information wrapped up in little black and white rectangles. But beside useful links and vCards sometimes malware and malicious downloads hide behind these codes. With the G DATA QR codes are not only handy but safe. The encoded informations will only be used, if the scanner has checked and approved it. The G DATA QR Code Scanner is simply secure – and free of advertising.
The G DATA QR Code Scanner is available for G DATA Mobile Internet Security full and light version. Get it now – it´s free.
Clean up removes Adware, tool bars and plug-ins from your browser as well as other "Potentially Unwanted Programs (PUP)", which cannot be uninstalled in a regular way. It just takes a few clicks – no installation required. For more information about "Potentially Unwanted Programs (PUP)", watch our video or download the whitepaper that our G DATA experts have compiled for you.
The G DATA boot medium is a practical aid for detecting viruses that have already embedded themselves on your computer prior to installing the antivirus software. In the current version the boot medium is also capable of restoring all backups created with G DATA solutions (only available in the Total Protection solution). The download file is an ISO file, i.e. it must either be burnt to a CD/DVD or be mounted via a virtual drive so it can be used from a USB stick for example. You can download the boot medium in the "Tools" download area.
The G DATA FakeAVCleaner “System Tool” removes FakeAV of the “System Tool” type and related types. Note that the G DATA FakeAVCleaner “System Tool” has to be executed with the Windows user account that is infected. As the FakeAV “System Tool” shuts down all user-initiated programs which do not have any kind of ‘reserved’ name, like explorer.exe, winlogon.exe or svchost.exe and many more, the file name for the G DATA FakeAVCleaner is svchost.exe.
This version is for G DATA products of generation 2011 and later. This tool enables you to work with files that have been placed in quarantine. These quarantined files have the extension *.q and can be found on the client in the folder "C:Program filesCommon filesG DATAAVKScannerQBase" or on the server in "C:Program filesG DATAAVK ManagementServerQBase". You can for example place infected mail archives into a new folder and continue working.
You need this tool to completely uninstall your G DATA security solution (e.g. to reinstall it). AntiVirus Cleaner deletes from your system all remains of the program which were not removed by a simple uninstall.
The G DATA USB Keyboard Guard is an add-on that protects you from the most likely form of USB attack: USB devices pretending to be keyboards. If a new keyboard is detected by the system, access is initially denied and a pop-up is displayed. You can then check in your own time whether this really is a keyboard, and either grant or deny access permanently. You can download the software for free.
The MonActivity tool enables you to monitor the activity of the AVK-guard in the background. This can be helpful to analyze performance problems. You can run this tool in real time during "normal" activity, and then try to reproduce the problem. Or you can run it for half an hour with the hitlist function and then refresh the view to see if a specific process pops up all the time. Defining an exception for a specific type of files might solve the problem in that case.
The MonActivity tool enables you to monitor the activity of the AVK-guard in the background. This can be helpful to analyze performance problems. You can run this tool in real time during "normal" activity, and then try to reproduce the problem. Or you can run it for half an hour with the hitlist function and then refresh the view to see if a specific process pops up all the time. Defining an exception for a specific type of files might solve the problem in that case.