Antivirus Business – Client Security Business – Endpoint Protection Business

Compare G DATA Solutions



Client Security

Endpoint Protection

Antivirus with CloseGap hybrid technology
BEAST behavioral monitoring 
Exploit Protection 
Cloud-based Surfing and Phishing Protection
DeepRay® AI Technology 
Protection against manipulated USB devices
E-mail protection for Microsoft Outlook


Central and easy administration via one console 
Report Manager
Software and hardware directory
Simple (remote) administration with policy inheritance
Deployment also possible on non-dedicated server
Active Directory connection
Multi-client capability
Light Agent for virtual machines 

Policy Management

Web content and Internet usage control
Device Control
Application control through blacklisting or whitelisting

Mobile Devices

Real-time protection for Android and iOS devices
Safe surfing
Anti-theft protection
App filtering

Special Protection for Servers

Samba File Server Security
Exchange Mail Security
Linux Mail Security
Linux Web Security Gateway

Would you like to try out our solutions for yourself? Request your trial version now with no obligation and free of charge.

Protect Android and iOS Devices

Mobile Device Management (MDM) from G DATA helps you to implement your company’s BYOD strategy consistently. iOS and Android devices are managed like all other clients via the central dashboard.

What is possible with MDM:

  • Protect mobile devices against viruses
  • Safe surfing on your smartphone or tablet
  • Assign individual rights
  • Locate your device in case of loss
  • Delete sensitive data remotely

Mobile Device Management, GDPR, and more


Security for the Entire Network

Don’t just filter out malware at the endpoint – filter it out upstream at the server or gateway level. All network traffic that passes through mail and proxy servers can be checked there. This ensures that even those endpoints where no antivirus software is installed are protected against new threats and dangers from the Internet.

Server security for mail and proxy server


Define Rules with the Policy Manager

 Application control

Reduce the scope for a malware attack by restricting its executability to specific applications or vendors.

 Device control

USB sticks, CD/DVD drives, and webcams – decide for yourself which user groups are allowed to access what.

 Web content control

Define at endpoint level which pages your employees can surf on based on category. This is particularly useful for devices that leave the company network, since then the rules you have defined via the proxy or a firewall will no longer apply.

What is IT compliance?


Case Studies

How our customers work successfully with G DATA

Business Konfigurator Plugin