G Date in the test: How does G Data Internet Security deals?


G Data is a German supplier of security solutions that have been successfully represented on the market for more than 30 years and has been the first company to publish the protection of viruses in real time in 2005. Its latest version will be offered again in 2020 together with other protection programs as a powerful internet security package. Here you can find out what features they contain the security of G Data Internet and if the program could also convince in our test.

Can I also protect my smartphone with the safety of G Data Internet?

The protection package also exists as a mobile version for iOS and Android devices, which you can download on the manufacturer’s website or through the respective shop.

Is Internet security also suitable for use in the company?

Internet security and protection mechanisms included have been designed exclusively for private users. For the professional area, G Data offers corresponding solutions with Endpoint security products.

Is there the security of G Data Internet as a trial version?

On the one hand, the manufacturer offers a test license, but after recording with the manufacturer, it is possible to test the safety of the Internet for free for 30 days. Unfortunately, both did not work in our test.

1. G Data Security Internet in the test: installation and putting in service

For our test, we downloaded the configuration package of G Data Internet Security by the manufacturer. With a double click on the executable file, the assistant begins, which leads us through the installation. This can be done with standard or user -defined settings. We choose the first option and confirm our selection with «Further“. The entire process lasts about 5 minutes and works automatically. Only in the last step we must provide information on the license used.

G Data offers a 30 -day trial version for its Internet safety that we want to use for this purpose. To do this, we must register for free with the manufacturer and then receive the key via e -mail. Unfortunately, what seems simple in theory has not worked in practice. If you click on the «Active Test version» option, we only receive an error messageSo we surround ourselves spontaneously and temporarily use a complete version without an active license. After activating it, we have to restart our computer, so we can finally start.

2. User interface and user comfort

After starting the application, we land in the safety center, a sort of piloting cabin that shows the most important information on the state of the safety of G data Internet. In addition to the information on the current affairs of the virus signatures, you can also turn on and off the individual protection modules or renew the license. Check the other functions via the buttons in the line of the menu at the top.

Fortunately, the manufacturer completely dispenses the user interface and is based on useless frills and is based on a clear and clear design. This also makes very easy for users who have not yet worked with a G-Data product.

Tipp: If, as a user of G Data Antivirus, you want to update to Internet security, it is not necessary to reinstall it. The two programs share a common user interface.

3. The most important functions of G security given to an overview

3.1. Reliable virus protection

With two parallel scanners with behavioral tests such as the integrated protection of exploit and anti-pam, it is said that the antivirus from data G has a particularly high identification rate. The memory and the start -up scanner guarantee that no harmful programs will be performed at the start of the system. The rootkit scanner, on the other hand, tests all the applications that land in the system boat at startup. In addition, the tool also allows scans controlled by time and, if desired, includes the media for change and autostart in the review.

G Internet Security Rootkit Scanner in Aktion

We wanted to have an idea of ​​the identification rate of the antivirus and therefore infected our test calculator with an entire series of more or less known malware. The result convinced us: the virus scanner was able to find all the mistreats and eliminate (or put it in quarantine).

3.2. Learning -Firewall

The GaT Internet Security Firewall offers complete surveillance for all incoming and outgoing connections. You can determine if they act independently and learn or to consult you when you block and share requests from the Internet.

  • I am Self-cilot-Modello The firewall works completely independently and maintains all the dangers far from your PC. We recommend this setting for less experienced users.
  • On the manual control You can adapt the firewall protection to your individual needs.

During the daily use of the computer, the firewall gradually learns which programs use and which they represent a security risk. You can also use access control to determine those who want to allow the use of USB sticks, burners, rigid disks or other (external) devices on the computer.

3.3. More performance thanks to Autostart Manager

The Autostart manager is a very practical additional function with which you can check which applications you want to start when. Usually these are uploaded directly to the start of the system, but adding to the car start list, for example, it is possible to set a delay or start certain programs depending on the system or use of the hard drive. This accelerates the start of the system and at the same time benefits the overall performance of the PC.

3.4. Backup for greater data security

With the automatic backup function, maximum security is created and you protect you in a simple and effective way from the loss of sensitive data. G Data Internet Security stores your photos, videos or documents protected on your computer or in a safe cloud (e.g. Dropbox, Driveonweb or Google Drive). This is why no further installations are needed.

Good to know: If you register for the Backup function of the G DATA software, you will receive 5 GB of free storage space on Driveonweb.

3.5. Further functions of G Data Internet Security

  • On the Infantile You can block access to certain categories of websites or URLs defined manually and therefore protect the offspring from dangerous and not for children.
  • THE Anti-Rannsomware feature Feel the blackmail trojans before they can take their data as hostage.
  • THE Performance-WNT Delete useless files and voices of obsolete cache and therefore increases computer performance without too many efforts while the Cleaner browser Fuccanti additional components and bar of Google Chrome tools, Mozilla Firefox or Internet Explorer removed.
  • THE G Data Bank Guard It ensures that your browser shows only authentic content and make online banking online and shopping on the internet a safe question.
  • THE Keylogger-Protestration Connections to read the keyboard input.
  • Thanks to Passwortmanagers You must never remember complicated passwords. The function can also be integrated into the browser and automatically fills the registration data on request.

In addition to a large online aid in the form of FAQ and numerous suggestions, G Data also offers the possibility of requesting help from a support employee through a ticket system. Telephone support provides only an international number, but we are looking for a live chat function in vain.

For our test we opened a ticket and -mail to which it was replied within an hour. With the instructions contained therein, we have been able to completely solve our problem. Quick and competent: there is certainly nothing to complain about to support G. data

The safety of G Data Internet is also available as a mobile version for Android and iOS, which can also be used for free in the light version. The tool reliably protects the smartphone or tablet from malware of all kinds and also offers numerous other useful functions.

For example, check the authorizations of your apps and recognize if they are safe or you may even be secretly spied on. If you are a victim of theft or lose the device, you can delete it with the help of the mobile security of the G data and, if necessary, delete all the data stored at a distance.

6. G Data Internet Security IM Test: Preis

The price for the safety of G data Internet depends on the term and the number of devices. The license for a device currently costs 39.95 euros to a one -year period, which in our opinion represents a fair price performance ratio. A maximum of 10 devices can be protected by license. For detailed costs on costs, consult the G. data website

Anyone who operates for the safety of G Data Internet gets an all -round carefree package at a fair price. Above all, the simple management and the excellent recognition rate have completely convinced us. The integrated protection of the child is also very practical. If you need even more backup and optimization functions, the total security of G. is most likely recommended

latest posts published

Quo vadis Windows Mobile? – Microsoft’s last chance with Windows 10 Mobile

After Microsoft successfully introduced Windows 10 on desktop systems and tablets in the summer of ...

Outlook alternative: four practical programs compared

Almost everyone is familiar with Microsoft Outlook. The email program is part of the standard ...

Instructions: Permanently delete downloads – WinTotal.de

Delete Downloads: A keyword that comes to mind of every PC user when looking at ...

How to choose the best laptop

How do I choose the best laptop? Who makes the best laptops: Asus, Acer, Lenovo, ...

Why is brand authenticity important and how can you achieve it?

In a world where consumers are bombarded with thousands of advertising messages daily, standing out ...

Niche marketing – Media consultancy agency

Small and medium-sized businesses face the challenge of standing out. Mass marketing may work for ...

Create the perfect holiday video yourself on your PC

It's never been easier for laypeople to shoot and edit professional videos. What we mean ...

How to choose the right e-commerce platform for your business

If you plan to start an online business or migrate your existing business to a ...

Hardware and software investments: find the right business loan in simple steps

Liquidity plays an important role in many businesses and also when starting new businesses. But ...

This is what lies behind the attack on software weaknesses

Zero-day exploits are attacks originating from the Internet that Exploit software vulnerabilities, for which there ...

Leave a Reply

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *