Basic protection with Next Generation technologies

new generation 2018
Product Boxshot
30-Day Money Back Guarantee
29.95 GBP 39.95 GBP 34.95 GBP 44.95 GBP 49.95 GBP 54.95 GBP 74.95 GBP 64.95 GBP 84.95 GBP 94.95 GBP
incl. VAT
Money Back Guarantee

The protective shield for your PC

Virus scanner

Put your trust in the highest detection rates with technologies working in parallel.

How it works 

Behavior monitoring

Protect yourself against even unknown malware. G DATA Antivirus detects this from its conspicuous behaviour.

Information on behaviour analysis 

Email scanning

Scans incoming email and attachments for suspicious content. Dangers are detected before anything has happened.

Exploit protection

Protects your computer against criminals exploiting security holes in Office applications and PDF readers, for example.

How Exploit Protection works 

G DATA BankGuard

Our patented technology secures your browser against manipulation by data thieves – for secure online banking and shopping.


No opportunity for extortion Trojans – we stop criminals encrypting your files.

More about our technology 

USB Keyboard Guard

Protects you against manipulated USB devices that pretend to be keyboards, even though they look like USB sticks or external hard drives.

Update Management

Specify when and where your PC loads updates. This helps you avoid additional costs, by logging into a third-party WLAN for example.

G DATA AV Box from 29.95 £
more info
G DATA IS Box from 34.95 £
more info
G DATA TS Box from 39.95 £
more info
Protection against ransomware and cyber criminals
Full PC performance with
high security
virus signature updates
Antivirus with award winning Doublescan technology
BankGuard provides secure online banking and shopping
Phishing protection
through email scanning
Anti-Spam filters
unwanted admails
Exploit-Protection protects against software vulnerability attacks
Automatic scanning of USB sticks and harddisks
English hotline at local rates
24 hours / 365 days
Intelligent Firewall blocks hacker attacks
Parental controls for age-appropriate PC usage
Cloud Backup on
German servers
Automatic Backup on local or external medium
Passwordmanager for secure access data
Device Control blocks unauthorised devices
from 29.95 £
more info
from 34.95 £
more info
from 39.95 £
more info

The intelligent technologies behind Antivirus

Sophisticated virus scanner

Virus scanners work with signatures. Antivirus experts use these to determine the characteristics of each new malware strain. The scanner can use such a signature to categorise files on your computer as malicious.
At the core of all G DATA solutions for Windows computers is our CloseGap technology. Two scan engines work together in perfect harmony to guarantee maximum security.
On average, G DATA SecurityLabs experts record 0 new signature variants every second.
  Together they scan your system for widely distributed malware and dig up new or localised threats. The intelligent technologies complement each other and work exactly where they are needed – without impairing the speed of your PC.

Is a file behaving suspiciously?

Not all malware distributed by cyber criminals is known to antivirus providers. We work with proactive technologies so these can be found as well. Our Behaviour Blocker detects malware from its behaviour.
“These days every top antivirus product needs proactive technologies.” – G DATA PC Malware Report H2/2015
What happens after you have double-clicked a file? Are unwanted processes launched in the background? Our behaviour analysis stops unnoticed downloads, for example, before they pose a risk.

Security holes as gateways

Besides phishing sites, the majority of attacks from the Internet take place via drive-by infections. Primed websites first spy on the computer’s configuration for attackable applications, such as add-ons in your browser. If a suitable hole is discovered, a matching exploit is sent to the computer. As with personalised advertising, this is precisely tailored. The malicious code exploits the security hole so it can download and execute additional malware in the future – ransomware or banking Trojans, for example.
What does G DATA do about this?

We offer protection against exploits via internally developed technology. The main thing to understand is that numerous small processes run consecutively in a program. Each process reacts to the one before, and so on.
“As ever, Flash remains the most significant attack vector for exploit kits.”– G DATA PC Malware Report H2/2015
  Exploits are data that provoke erroneous reactions in this sequence. The program then runs differently than it actually should do. To detect this, Exploit Protection runs memory tests and checks the runtimes of the individual program sequences. This means it can safeguard your computer from even previously unknown exploits.

System requirements

  • Microsoft Windows 10 / 8.x / 7: min. 2 GB of RAM
  • All of the functions in the G DATA solutions are supported on 32 and 64 bit systems
  • An Internet connection is required to install the software and for virus signature and software updates

Do you need security for another platform?