G Data Internet Security 2020
Availability: Sold out
Tax Info: Tax included. Shipping calculated at checkout.
Sku: LG-20210013
Vendor: G Data
G DATA - Safe online: G DATA tracks down ransomware and stops the encryption of files. With behavior-based next generation technologies, blackmail Trojans don't stand a chance. Your money stays where it belongs. BankGuard reliably protects you against manipulated websites and other attacks in online banking and shopping. Surf as much as you want. G DATA Internet Security protects you from harmful downloads and phishing sites - also on social networks.
The most important features of G Data Internet Security 2020
firewall
Monitors all incoming and outgoing connections to protect against hackers and spy software - fully automatically or according to your own rules.
cloud backup Optimized
Automatically store your encrypted backups in the cloud - with Dropbox, Google Drive or DriveOnWeb.
Anti ransomware Optimized
Blackmail Trojans don't stand a chance: G Data protects you from criminals encrypting your files.
G DATA BankGuard
G Data's patented technology protects your browser from being manipulated by data thieves - for secure online banking and shopping.
anti spam
Blocks spam such as advertising and phishing emails and keeps your email inbox clean.
child lock
Control your offspring's use of the Internet: Set times and only let your children surf on verified sites.
virus scanner
Trust in the highest recognition rates thanks to technologies working in parallel. You will receive new virus signatures every hour for the best protection against malware.
exploit protection
Protects your computer from criminals exploiting the security gaps in Office applications and PDF readers, for example.
This is how G Data protects your path through the web
With online banking and shopping
The connection between your bank and your computer is usually encrypted. The decryption of the data transmission takes place in your browser: Cyber criminals use banking Trojans to get involved in the process. As soon as you make a transfer, the attackers manipulate the data sent. Your money then no longer goes to the intended recipient, such as an online shop, but ends up in another account.
Of course, G Data virus scanner recognizes banking Trojans based on their characteristics. If this malware already has its own signature, Internet Security renders the malware harmless as soon as it is downloaded. G Data BankGuard technology also protects against as yet unknown dangers: The function ensures that your browser only displays checked and genuine content.
How does BankGuard do that?
Manipulations by banking Trojans take place in certain files in the main memory. G DATA BankGuard automatically detects when an infection attempt is made and replaces the affected memory area with a secure copy.
While receiving and sending emails
In addition to the files on your hard drive and external storage, G Data virus scanner also checks your e-mails for malicious content. This applies to all messages that you receive and send with the e-mail program on your computer. If the scanner doesn't find anything, the G Data anti-spam function also becomes active: the application checks the e-mails for features that are typical of spam. Based on these characteristics, a value is calculated that reflects the probability of spam.
In addition to its own assessment, the OutbreakShield technology compares the results with a database on the Internet - this is where the patterns of viruses and spam e-mails sent in bulk are recorded. In this way, G Data Internet Security closes the gap in real time between the start of a mass mailing and combating it with specially adapted signatures.
While surfing
The virus monitor checks all files coming from the web. It stops infected documents, images, etc. as soon as they are downloaded. Unnoticed downloads no longer pose a threat to you. Internet Security is not only dependent on virus signatures that are updated every hour. In addition to the signature scan, the software works with a cloud solution: In this online storage, properties of current files that contain malicious code are collected. These properties are compared with those of your files - and you will quickly find out whether everything is secure.
And how does G DATA protect against dangerous websites?
Internet addresses are also collected in the cloud: If a URL in the database is known to be a distributor of malicious content, G Data Browser Protection blocks the page. So if cybercriminals try to lure you with phishing links, you have nothing to fear. Incidentally, this also applies to attacks via social networks: links in false posts and advertisements are not opened in the browser.
Regardless of the cloud, G Data web protection examines all data that is sent to your computer to access a website. In this way, it recognizes dangerous content before you open the page.
System requirements:
Processor:
|
At least 1 GHz
|
R.A.M:
|
Min. 2 GB RAM (32 & 64 bit) |
system
|
At least Windows 7 |
Miscellaneous
|
An internet connection is required for the installation as well as for virus signature and software updates |
How is our price determined?
Software licenses are manufactured and delivered for manufacturing computers and systems, for retail or for industrial devices. License cheaper buys large numbers of new software licenses from many distributors that have not been used or installed.
With this type of purchase, the elimination of delivery and storage fees due to the virtual delivery route and the staff involved, we can realize and pass on such low prices.
License cheaper stands for buying new software licenses safely and properly.