Audience

Companies of all sizes searching for a strong cyber defense solution

About G DATA

G DATA prepares you optimally for cyber threats and opens up all possibilities for you in the digital future. G DATA developed the world’s first antivirus software in 1987. Today, we defend our customers against all kinds of cybercrime with end-to-end solutions and services using the most advanced security software and AI technologies and even offering online security awareness training to teach safe behavior to employees. G DATA customer support is available 24/7/365, with support teams and the G DATA SecurityLab working hand-in-hand at the same location. Independent tests prove that G DATA IT security solutions provide best attack detection rates for effectively combating Trojans, malware and even unknown viruses.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

G Data Software
Germany
www.gdatasoftware.com

Videos and Screen Captures

G DATA Screenshot 1
Other Useful Business Software
Gemini 3 and 200+ AI Models on One Platform Icon
Gemini 3 and 200+ AI Models on One Platform

Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

Build generative AI apps with Vertex AI. Switch between models without switching platforms.
Start Free

Product Details

Platforms Supported
Cloud
Windows
Mac
Android
Training
Documentation
Support
24/7 Live Support
Online

G DATA Frequently Asked Questions

Q: What kinds of users and organization types does G DATA work with?
Q: What languages does G DATA support in their product?
Q: What kind of support options does G DATA offer?
Q: Does G DATA have a mobile app?
Q: What type of training does G DATA provide?

G DATA Product Features

Computer Security

Antivirus
Anti Spam
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Endpoint Protection

Device Management
Application Security
Signature Matching
Antivirus
Whitelisting / Blacklisting
Behavioral Analytics
Activity Log
Web Threat Management
Encryption