Antivirus Business – Client Security Business – Endpoint Protection Business

Compare G DATA Solutions

Technologies


Antivirus
Business
AVB


Client Security
Business
CSB


Endpoint Protection
Business
EPB

Antivirus with CloseGap hybrid technology
BEAST behavioral monitoring 
Anti-Ransomware 
Exploit Protection 
Cloud-based Surfing and Phishing Protection
DeepRay® AI Technology 
Protection against manipulated USB devices
E-mail protection for Microsoft Outlook
Anti-Spam
Firewall

Administration

Central and easy administration via one console 
Report Manager
Software and hardware directory
Simple (remote) administration with policy inheritance
Deployment also possible on non-dedicated server
Active Directory connection
Multi-client capability
Light Agent for virtual machines 
Patch Management

Policy Management

Web content and Internet usage control
Device Control
Application control through blacklisting or whitelisting

Mobile Devices

Real-time protection for Android and iOS devices
Safe surfing
Anti-theft protection
App, contacts, and call filtering

Special Protection for Servers

Samba File Server Security
Exchange Mail Security
Linux Mail Security
Linux Web Security Gateway

G DATA Antivirus
Business

Simply secure, easy to manage: the basic protection with next-generation technologies reliably secures all endpoints on your network. The management console gives you an overview at all times.

G DATA Client Security
Business

You want even more comfort? Anti-Spam prevents your employees from being burdened by bulk e-mails. In addition, a client firewall monitors all incoming and outgoing connections.

G DATA Endpoint Protection Business

Your all-included, worry-free service package for maximum protection. Policy management is included on top of the Anti-Spam and firewall services: easily enforce your compliance policies with application controls and more.

Would you like to try out our solutions for yourself? Request your trial version now with no obligation and free of charge.

Available as a Managed Service

Outsource your IT security and benefit from the advantages of our Endpoint Protection. Your G DATA partner will take over all respective tasks for you – from rolling out the antivirus software to configuring the firewall. On-premise or in the cloud as required.

Benefits of Managed Endpoint Security

Protect Android and iOS Devices

Mobile Device Management (MDM) from G DATA helps you to implement your company’s BYOD strategy consistently. iOS and Android devices are managed like all other clients via the central dashboard.

What is possible with MDM:

  • Protect mobile devices against viruses
  • Safe surfing on your smartphone or tablet
  • Assign individual rights
  • Locate your device in case of loss
  • Delete sensitive data remotely

Mobile Device Management, GDPR, and more

 

Security for the Entire Network

Don’t just filter out malware at the endpoint – filter it out upstream at the server or gateway level. All network traffic that passes through mail and proxy servers can be checked there. This ensures that even those endpoints where no antivirus software is installed are protected against new threats and dangers from the Internet.

Server security for mail and proxy server

Close all Vulnerabilities

Vulnerabilities in the operating system and in installed programs are among the most common attack points for cybercriminals. With the additional Patch Management module, you can easily ensure that all clients in the company always use the latest software versions.

  • Manage and distribute software patches centrally from one location
  • Check new patches for compatibility in a test environment first
  • See all currently available patches from Microsoft, Adobe, and so on at a glance

Additional module – Patch Management

 

Define Rules with the Policy Manager

 Application control

Reduce the scope for a malware attack by restricting its executability to specific applications or vendors.

 Device control

USB sticks, CD/DVD drives, and webcams – decide for yourself which user groups are allowed to access what.

 Web content control

Define at endpoint level which pages your employees can surf on based on category. This is particularly useful for devices that leave the company network, since then the rules you have defined via the proxy or a firewall will no longer apply.

 

Case Studies

How our customers work successfully with G DATA

Talk to our experts about the right endpoint protection for your business.

Security Awareness Trainings

Make your employees the strongest defense

Our online trainings sensitize your employees for IT security topics and equip them with recommendations for action in case of emergency.

  •  Reduce risk through incorrect behaviour of your employees
  •  Online training when and where you want
  •  Maßgeschneiderter Kursplan

 

Find out now