One license, complete protection
Put your security solution together
Put your security solution together in the way that best suits your life. Combine our award-winning Antivirus programs in a way that matches your preferences and protect all of your devices with just one license – whether it’s a Windows PC, Mac or Android smartphone.
Manage your devices easily
Does your family likes to surf, game, and shop online? It’s difficult enough getting everyone on the same page.All appliances in the household should be secured.
But security doesn’t have to be one of the chapters in that particular book: From now on, you can easily manage all of your family members’ security solutions in your personal My G DATA area. Did you get a new tablet for your birthday? No problem! Add another Mobile Security quickly and easily. You can also renew your license in My G DATA at any time. By the way: G DATA solutions for Windows provide the possibility to set up a child-friendly browser, to share only certain applications and to limit the usage time of the device.How we protect you as you move around the web
When banking and shopping online
The connection between your bank and your computer is usually encrypted. Decryption of the data transfer takes place in your browser. Cyber criminals use banking Trojans to infiltrate this process. As soon as you carry out a transfer, the attackers manipulate the data being sent. Your money no longer goes to the intended recipient, such as an online shop, but ends up in a different account.
Of course, our virus scanner detects banking Trojans on the basis of their characteristics. If the malware already has its own signature, Internet Security renders the malware harmless while it is being downloaded. Our BankGuard technology* also protects you against dangers that are still unknown. The function ensures that your browser only displays checked, genuine content.
How does BankGuard do this?
Manipulations by banking Trojans take place in specific files in the random access memory. G DATA BankGuard automatically detects attempted infections and replaces the affected memory area with a safe copy.
“Our protection technology works completely signature-independent and is built right into the browser.”– Ralf Benzmüller, Executive Speaker G DATA SecurityLabs
How does BankGuard do this?
Manipulations by banking Trojans take place in specific files in the random access memory. G DATA BankGuard automatically detects attempted infections and replaces the affected memory area with a safe copy.
While you send and receive emails
Besides the files on your hard drive and on external storage devices, our virus scanner also checks your emails for malicious content. This applies to all messages you send and receive via the email program on your computer. If the scanner finds nothing, our Anti-Spam function is also activated. The application checks the email for features that are typical of spam. These characteristics are used to calculate a value reflecting the likelihood of it being spam.
In addition to the separate evaluation, the OutbreakShield technology* compares the results to a database on the Internet – patterns of viruses and spam emails sent en masse are collated here. This enables Internet Security to close the gap that exists between the start of a mass mailing and the fight against it in real time, using specially adapted signatures.
In addition to the separate evaluation, the OutbreakShield technology* compares the results to a database on the Internet – patterns of viruses and spam emails sent en masse are collated here.
Germans received 0 million spam mails per day in 2017.(Source: Statista 2018)
When surfing
The virus monitor* checks every file that comes from the web. It stops infected documents, images and the like while they are being downloaded. This means that unnoticed downloads no longer pose a threat to you. When doing so, Internet Security not only relies on hourly updated virus signatures. Besides the signature scan, the software works with a Cloud solution. The properties of current files that contain malware are stored in this online memory. These properties are compared with those in your files – and you quickly find out if everything is OK.
Web addresses are also collated in the Cloud. If a URL is identified in the database as a distributor of malicious content, our browser protection blocks the site.
Regardless of the Cloud*, our web protection checks every file sent to your computer to access a website. This enables dangerous content to be detected before you open the page.
“Two of the most common attacks from the Internet: phishing sites and drive-by infections.” (Source: G DATA SecurityLabs)
So when cyber criminals try to lure you into traps using phishing links, you have nothing to fear. This also applies to attacks via social networks. Links in fake posts and adverts are not opened in the browser. Regardless of the Cloud*, our web protection checks every file sent to your computer to access a website. This enables dangerous content to be detected before you open the page.
* only available on Windows
Awards
System requirements
- Windows 11 / 10 / 8.1 / 7 (SP1): min. 2 GB RAM (32 and 64 bit), CPU with x86- or x64-architecture
- macOS 10.15 and higher, 2 GB RAM
- Android 5 and higher
- an Internet connection is required for the installation as well as for virus signature and software updates