Business Solutions
Partner
Antivirus
Best protection for all devices
On the way
Our story
Newsroom
The innermost protective circle of our Layered Security concept protects the heart of every corporate network: the clients on which employees work with sensitive data on a daily basis, where they enter access data and open attachments from e-mails. Endpoint Security includes all the technologies that protect these clients directly from threats and exploiting vulnerabilities. This includes proactive protection against malware, including an effective client firewall and efficient patch management to prevent vulnerabilities in installed programs from becoming an attacker's gateway.
If malware was intercepted by its signature on the outer defense rings, it could not cause any damage yet. Only when the code contained in the code is actually executed and gets computing time in the processor can it unfold its potential. Once a malware has overcome all levels and is activated on the client, it encounters behavior-based detection. This is the last line of defense. Only when it's taken is the attacker at the target.
G DATA business solutions have numerous next-generation technologies such as
They are able to identify and stop unknown malware by its behavior before damage occurs. The software is then added to the signature list of malicious programs so that the outer defense rings can intervene at an early stage during the next attack.
By means of our brand new DeepRay® technology, we're changing the rules in the fight against cybercrime: Thanks to artificial intelligence and machine learning, DeepRay® immediately unmasks camouflaged malware. This innovative analysis method significantly improves your protection against cyber attacks.
Extortion Trojans are currently keeping the corporate world particularly busy. Once a computer is connected to it, the so-called Ransomware encrypts the local files - usually also those on other clients and servers in the network. The attackers then demand a ransom for decrypting the data. Prominent variants such as Petya, WannaCry or Locky could thus cause damage amounting to millions.
Our new Anti-Ransomware module protects against these perfidious attacks: It detects when a program wants to encrypt many files in a short time and stops the process early.
For many vulnerabilities in software, there are already updates that fill these gaps. The problem: These patches often don't reach the clients fast enough. After the infection with the extortion Trojan horse "WannaCry", the disaster for hundreds of thousands of IT managers - see info box. But how do you keep track of the software and patches used in your company? The solution: G DATA's centralized Patch Management. Reduce the size of your clients' attack area and prevent many cyber attacks that exploit known vulnerabilities.
The blackmailer Trojan "WannaCry" spread all over the world on May 12, 2017 and attacked corporate networks. In Germany, operations in numerous hospitals were at a standstill, and the Deutsche Bahn scoreboards only showed the message of blackmailers instead of the current departure times. Production and workflows in global companies such as the French car manufacturer Renault were massively affected by the attack.
The Trojan horse could spread so rapidly due to a known vulnerability in the Windows operating system alone. This gap was already closed two months before the outbreak. The infection could have been avoided if the patch released by Microsoft had been installed on the affected systems in time.
infected systems
countries concerned
Antivirus Business | Client Security Business | Endpoint Protection Business | Managed Endpoint Security |
---|
Endpoint Security | ||||
Virus monitor with CloseGap hybrid technology | ||||
Anti-Ransomware | ||||
Behaviour monitoring of files | ||||
Protection against security vulnerabilities in installed software | ||||
Online banking and browser protection | ||||
Protection against malware and phishing when surfing | ||||
Protection against manipulated USB devices | ||||
DeepRay AI technology | ||||
Light Agent for virtual machines | ||||
Firewall | ||||
Patch Management | ||||
= optional modules |
Request an offer now | Request an offer now | Request an offer now | Request an offer now |