G DATA Antivirus

Viruses, phishing, ransomware? Leave it to us.

29.95 USD Incl. VAT

30-day money back guarantee   24/7 customer support

Stay secure easily with G DATA Antivirus

Virus protection with distinction

Our virus scanner is regularly distinguished with top scores in comparison tests – as confirmed by AV-Test and Virus Bulletin.

Surf without worries

G DATA Antivirus protects you against unnoticed downloads. Dangerous web addresses for phishing sites, for example, are blocked before being accessed.

Secure online banking

The patented BankGuard technology monitors your browser and ensures that only genuine content is displayed to you.

The protective shield for your PC

Our developers have designed all the features of G DATA Antivirus so your PC is secure from every angle. Known and unknown viruses have no chance – your emails, browser and other programs will not be gateways for malware.

Virus scanner

Put your trust in the highest detection rates with technologies working in parallel.

DATA BankGuard

Our patented technology secures your browser against manipulation by data thieves – for secure online banking and shopping.

Behaviour monitoring

Protect yourself against even unknown malware. G DATA Antivirus detects this from its conspicuous behaviour.

Anti-RansomwareNew

No opportunity for extortion Trojans – we stop criminals encrypting your files.

Email check

Scans incoming email and attachments for suspicious content. Dangers are detected before anything has happened.

USB Keyboard Guard

Protects you against manipulated USB devices that pretend to be keyboards, even though they look like USB sticks or external hard drives.

Exploit Protection

Protects your computer against criminals exploiting security holes in Office applications and PDF readers, for example.

Update Management

Specify when and where your PC loads updates. This helps you avoid additional costs, by logging into a third-party WLAN for example.

G DATA Internet Security and G DATA Total Security offer more features.

Compare solutions

Antivirus
from 29.95$
Virus scanner
Behavior monitoring
Email scanning
Exploit protection
G DATA BankGuard
Anti-Ransomware
USB Keyboard Guard
Update administration
 
 
 
 
 
 
 
 
 
Internet Security
from 39.95$
Virus scanner
Behavior monitoring
Email scanning
Exploit protection
G DATA BankGuard
Anti-Ransomware
USB Keyboard Guard
Update administration
Firewall
Anti-Spam
Parental Controls
Cloud-Backup
 
 
 
 
 
Total Security
from 44.95$
Virus scanner
Behavior monitoring
Email scanning
Exploit protection
G DATA BankGuard
Anti-Ransomware
USB Keyboard Guard
Update administration
Firewall
Anti-Spam
Parental Controls
Cloud-Backup
Password manager
Performance-Tuner
Browser Cleaner
Encryption
Access control

The intelligent technologies behind Antivirus

Sophisticated virus scanner

Virus scanners work with signatures. Antivirus experts use these to determine the characteristics of each new malware strain. The scanner can use such a signature to categorise files on your computer as malicious.

At the core of all G DATA solutions for Windows computers is our CloseGap technology. Two scan engines work together in perfect harmony to guarantee maximum security.

Together they scan your system for widely distributed malware and dig up new or localised threats. The intelligent technologies complement each other and work exactly where they are needed – without impairing the speed of your PC.

On average, G DATA SecurityLabs experts record
4.2 new signature variants
every second.

Is a file behaving suspiciously?

Not all malware distributed by cyber criminals is known to antivirus providers. We work with proactive technologies so these can be found as well. Our Behaviour Blocker detects malware from its behavior. What happens after you have double-clicked a file? Are unwanted processes launched in the background? Our behaviour analysis stops unnoticed downloads, for example, before they pose a risk.

 


“These days every top antivirus product needs proactive technologies.”

 G DATA PC Malware Report H2/2015

Security holes as gateways

Besides phishing sites, the majority of attacks from the Internet take place via drive-by infections. Primed websites first spy on the computer’s configuration for attackable applications, such as add-ons in your browser. If a suitable hole is discovered, a matching exploit is sent to the computer. As with personalised advertising, this is precisely tailored. The malicious code exploits the security hole so it can download and execute additional malware in the future – ransomware or banking Trojans, for example.

 

What does G DATA do about this?

We offer protection against exploits via internally developed technology. The main thing to understand is that numerous small processes run consecutively in a program. Each process reacts to the one before, and so on.

  Exploits are data that provoke erroneous reactions in this sequence. The program then runs differently than it actually should do. To detect this, Exploit Protection runs memory tests and checks the runtimes of the individual program sequences. This means it can safeguard your computer from even previously unknown exploits.

 


“As ever, Flash remains the most significant attack vector for exploit kits.”

– G DATA PC Malware Report H2/2015

No opportunity for extortion Trojans

Ransomware is a type of malware – so virus scanners and behaviour monitoring can detect and stop it. We have developed a completely new process to respond even more specifically to the activities of ransomware. G DATA Anti-Ransomware is a proactive technology – encryption Trojans are detected in good time on the basis of features that are typical of malware of this kind.
For example, switching off operating system backups, encrypting a conspicuously large number of files in a short time or changing file extensions (e.g. .docx into . locky). Such processes are stopped immediately, so your pictures, videos, documents and emails cannot be encrypted.

6 times as much
ransomware was discovered on computers worldwide – in 02/2016 compared to 10/2015. (Source: BSI)

System requirements

  • Microsoft Windows 10 / 8.x / 7: min. 2 GB of RAM
  • All of the functions in the G DATA solutions are supported on 32 and 64 bit systems
  • An Internet connection is required to install the software and for virus signature and software updates

Comprehensive instant protection against viruses, Trojans, and other malware for your Mac OS X

G DATA Antivirus for Mac

Security for your mobile devices – get the best protection when you are out and about as well

G DATA Mobile Internet Security

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt

Start typing and press Enter to search