Basic protection with Next Generation technologies
Convince yourself now of G DATA Antivirus with exploit protection! The best protection against viruses, Trojans, phishing and other malware.
$29.95 Buy Now
Virus scanners work with signatures. Antivirus experts use these to determine the characteristics of each new malware strain. The scanner can use such a signature to categorise files on your computer as malicious.
At the core of all G DATA solutions for Windows computers is our CloseGap technology. Two scan engines work together in perfect harmony to guarantee maximum security. Together they scan your system for widely distributed malware and dig up new or localised threats. The intelligent technologies complement each other and work exactly where they are needed – without impairing the speed of your PC.
Not all malware distributed by cyber criminals is known to antivirus providers. We work with proactive technologies so these can be found as well. Our Behaviour Blocker detects malware from its behaviour. What happens after you have double-clicked a file? Are unwanted processes launched in the background? Our behaviour analysis stops unnoticed downloads, for example, before they pose a risk.
Besides phishing sites, the majority of attacks from the Internet take place via drive-by infections. Primed websites first spy on the computer’s configuration for attackable applications, such as add-ons in your browser. If a suitable hole is discovered, a matching exploit is sent to the computer. As with personalised advertising, this is precisely tailored. The malicious code exploits the security hole so it can download and execute additional malware in the future – ransomware or banking Trojans, for example.
What does G DATA do about this?
Protection against exploits via internally developed technology. The main thing to understand is that numerous small processes run consecutively in a program. Each process reacts to the one before, and so on. Exploits are data that provoke erroneous reactions in this sequence. The program then runs differently than it actually should do. To detect this, Exploit Protection runs memory tests and checks the runtimes of the individual program sequences. This means it can safeguard your computer from even previously unknown exploits.
Ransomware is a type of malware – so virus scanners and behaviour monitoring can detect and stop it. We have developed a completely new process to respond even more specifically to the activities of ransomware. G DATA Anti-Ransomware is a proactive technology – encryption Trojans are detected in good time on the basis of features that are typical of malware of this kind.
For example, switching off operating system backups, encrypting a conspicuously large number of files in a short time or changing file extensions (e.g. .docx into .locky). Such processes are stopped immediately, so your pictures, videos, documents and emails cannot be encrypted.
Microsoft Windows 10 / 8.x / 7: min. 2 GB of RAM, all of the functions in the G DATA solutions are supported on 32 and 64 bit systems, an Internet connection is required to install the software and for virus signature and software updates