G DATA was present right at the launch of the Microsoft Cloud in Germany — with managed endpoint security specially tailored to the Azure architecture. G DATA Antivirus achieves best values in reactive and proactive detection and defense against malware. Today, we defend our customers against all kinds of cybercrime with end-to-end solutions and services using the most advanced security software and AI technologies and even offering online security awareness training to teach safe behavior to employees.
E-mail or e-crime? Business cloud or business crime? Attachment or attack? Big data or big risk? Please open the file and start the uninstall process. This tool enables you to work with files that have been placed in quarantine. You can for example place infected mail archives into a new folder and continue working.
AntiVirus Cleaner deletes from your system all remains of the program which were not removed by a simple uninstall. If a new keyboard is detected by the system, access is initially denied and a pop-up is displayed. You can then check in your own time whether this really is a keyboard, and either grant or deny access permanently.
You can download the software for free. This can be helpful to analyze performance problems. You can run this tool in real time during "normal" activity, and then try to reproduce the problem. Or you can run it for half an hour with the hitlist function and then refresh the view to see if a specific process pops up all the time.
Defining an exception for a specific type of files might solve the problem in that case. Downloads Find product downloads, manuals and tools. Windows Mobile Mac Business Tools. The Key Features for Android. Surfing and phishing protection Malicious and fraudulent websites are recognized and blocked immediately. This allows you to surf, bank, and shop securely — even on the go. Anti-theft protection If your SIM card is changed without your permission, you can remotely lock or erase the data on your smartphone.
App control App control checks the permissions of your apps and detects if your device is secure or if it is being monitored covertly. Virus scanner Malware-free: Thanks to cloud connectivity, the scanner offers protection against all of the latest threats at all times. Tracking and alarm features Find a lost or stolen device using our online ActionCenter platform. Put your security solution together Put your security solution together in the way that best suits your life.
Manage your devices easily Does your family likes to surf, game, and shop online? All appliances in the household should be secured. When banking and shopping online The connection between your bank and your computer is usually encrypted. Decryption of the data transfer takes place in your browser.
Cyber criminals use banking Trojans to infiltrate this process. As soon as you carry out a transfer, the attackers manipulate the data being sent. Your money no longer goes to the intended recipient, such as an online shop, but ends up in a different account. Of course, our virus scanner detects banking Trojans on the basis of their characteristics.
If the malware already has its own signature, Internet Security renders the malware harmless while it is being downloaded. The function ensures that your browser only displays checked, genuine content. How does BankGuard do this? Manipulations by banking Trojans take place in specific files in the random access memory.
While you send and receive emails Besides the files on your hard drive and on external storage devices, our virus scanner also checks your emails for malicious content.
This applies to all messages you send and receive via the email program on your computer. If the scanner finds nothing, our Anti-Spam function is also activated. The application checks the email for features that are typical of spam. These characteristics are used to calculate a value reflecting the likelihood of it being spam.
0コメント