Certificate FAQs Request Quote Request Support

G Data Antivirus Review 2022 – Truth Behind the Hype

G Data Antivirus Review: Quick Expert Summary

G DATA may not be the most well-known provider in the industry, but the German company has been around for over 30 years since it invented the first antivirus program. ‘s software has remained the same three decades later.

You want to find out the truth behind all the hype? This video will provide more information on G Data.

Security

During my evaluation, I tested two G DATA products: G DATA Antivirus & G DATA Internet Security. Both include antivirus protection. only the latter has firewall protection, parental control and a cloud backup feature. However, both products include real time system protectionwhich monitors every read and write operation on the system.

This low-level tool is very useful and can be used to access the entire system. To test the speed of detection, I downloaded a virus and received an email notification shortly after completing the download from Google Drive. The idle scan tool is an excellent addition to the real-time protection. It initiates a systemwide scan when there is no activity.

Deep Scanning With Low System Overhead

A startup and memory scanner checks for malicious programs running during system boots. A rootkit scanner scans for those that are loaded before system boot. All of these scans are also possible to be scheduled to run at predetermined times. This comprehensive list of virus scanning options offers a wide range of options.

G Data Antivirus Review: Quick Expert Summary

G DATA is known for being a system performance hog. However, I didn’t find this to be true during my testing. The program used only 5.8% of my CPU while running a system scan. The program used 5.8% of my CPU while running a system scan. It was also less resource-intensive than the task manager program. As it indexes my folders, I didn’t notice any lag.

Solid Independent Lab Ratings

Four rating agencies have given high ratings in terms of independent test scores. G DATA was rated favorably because of its low false positive detection rate and its malware-crushing capabilities .

Features

G DATA Internet Security has many additional features that make it a complete solution to protect you from online threats. The parental control tool does a great job of locking down certain websites and URLs.

The autostart manger is an interesting addition that lets you take more control over which programs start and when (you can add programs in an “autostart without delay” list, which I haven’t seen anywhere else). It also comes with a keylogger protection program, which is essential for cybersecurity. It was possible to set the protection to run on different programs than many other programs that I tested. This is useful in the event of a program that needs to capture your keyboard input. This program could be added to the exception list.

Features G Data Antivirus Review 2022 Truth Behind The Hype Best Antivirus By Ssg: Trusted Antivirus Store &Amp; Antivirus Reviews In The Europe

The firewall utility gives you complete control of inbound and outbound firewall settings. However, the BankGuard utility adds additional protection to your browser when you access online banking websites.

I was especially impressed that the program could pick up on my weak WiFi password which I used to connect via a public hotspot. This feature allows you to read WiFi passphrases and prompts the user to change if they are not secure. A strong password is crucial for security-conscious home-owners.

Ease of use

It was simple to download, install, and use G DATA Antivirus & Internet Security. Although the program has many features, they are easily nested within advanced menus. Although upgrading from Antivirus to Internet Security required reinstalling, was able to get to grips with all the new features quickly because they share the same user interface.

Ease Of Use G Data Antivirus Review 2022 Truth Behind The Hype Best Antivirus By Ssg: Trusted Antivirus Store &Amp; Antivirus Reviews In The Europe

Support

G DATA provides an online assistance center in the form a Q&A page, a ticketing system to receive personal assistance from an expert and an international phone number. Although the knowledge base contains a few resources, it isn’t the most complete I have seen. I would like to have seen more international numbers, pre-sales support tools and live chat. The support I received was prompt and courteous. Within an hour, I received an email response from support via ticket that addressed my query about parental control.

Pricing

Prices for Internet Security and Antivirus are tiedred according to the protection period. This is sufficient to provide security for many families. It is a strong value for money. It is also very affordable to purchase a single device plan.

G Data recommends that you “trust in German Sicherheit (security),” as you can see from the logo. You can trust the company or not, but it has been protecting your data for decades. G Data Internet Security has all you would expect from a security suite: antivirus, firewall parental controls, spam filtering and more. The components’ quality is varied, and has not improved in the past few years.

Just under $80 per year is a common price for a three-license security suite subscription–Bitdefender, Kaspersky, and Trend Micro match that price. Six G Data licenses are available for the same amount of money. You can choose the number of licenses that you need, starting at one for $39.95 and ending at 10 for $111.95. G Data is cheaper than many of its competitors.

The main window of this product features the bold G Data color scheme. A red banner holds a row icons at the top. The icons are the same as for standalone antivirus. They include icons for Security Center and Virus Protection. The suite also includes icons for Firewall and Backup as well as Parental Control.

Antivirus and Antivirus Shared

This suite provides you exactly the same antivirus protection and other features as G Data Antivirus. Here are my conclusions. You can read my full review of the antivirus for more details.

Chart of Lab Test ResultsMalware Protection Results
Chart showing Phishing Protection Results

G Data is included in reports and tests from two of the four antivirus laboratories I follow. G Data was awarded AA certification in the attack simulations by SE Labs (Opens in a new tab). This is the second highest level of five possible. This is a good result, however, in the most recent test, over 60% of products received AAA certification.

G Data did not perform as well in the three-part testing conducted by AV-Test Institute (Opens in a new tab). It received 5.5 out of six points in each category for usability, protection, and performance. This 16.5-point score is not great, as only six other products scored lower. Nearly all of the products scored 17.5 points or perfect 18 points, earning them the title of Top Product.

My aggregate lab score algorithm shows that the best products receive top marks from all four labs. Avira Internet Security Suite was tested by all four labs and scored 9.9 out of 10 points. Norton received 9.8 points and Kaspersky 9.7. Bitdefender Internet Security was only tested by three labs in the most recent reports. However, it scored 10 points with perfect scores in all three tests.

G Data scans the computer in the background by default. This happens even if the computer is not being used. After installing antivirus protection, I recommend a complete scan of your entire computer. A full G Data scan took me three times longer than the average in my previous test. A full scan took just a few minutes, which is a bit less than the average. A repeat scan took only 14 minutes.

G Data scored 9.8 points out of 10 in my malware protection test. It detected 98.9% of the samples. Webroot scored the best against the current sample set, scoring a perfect 10.

G Data performed well in my malicious URL blocking testing, which used a feed of URLs that researchers at MRG–Effitas (Opens in a new tab). It blocked all access to the malware-hosting URL, and prevented almost 99 percent of malware downloads. McAfee and Sophos scored even higher, with a 100% score in their most recent tests.

G Data uses real-time analysis in conjunction with cloud-blacklist lookups to help users avoid fraudulent websites and phishing sites that attempt to steal login credentials. Although it did better than my previous test, it still only detected 90% of verified frauds. Trend Micro Internet Security and Kaspersky both scored 100 percent in their most recent tests. Ten other products scored higher than G Data.

Other shared features

G Data provides exploit protection in its standalone antivirus. Firewalls are often associated with it. It detected and blocked 71% of the exploits I tried, which is better than many. Norton stopped all exploits during its most recent test.

G Data offers a standalone antivirus that includes a spam filter. However, not everyone requires it. It can filter IMAP and POP3 email and tagging spam. It diverts spam to an unread folder for Outlook users. Users who use a different email client need to create a rule to handle marked spam messages. G Data has many filters that distinguish spam mail from legitimate mail. However, most users should keep these settings at their default settings unless they wish to whitelist trusted correspondents.

Hands-on testing proved that G Data’s keylogger protection works. A keylogger sample captured keystrokes in Notepad (which doesn’t have protection), but nothing when I entered the browser.

In testing, the ransomware protection part didn’t perform as well. I disabled all layers but Anti-Ransomware to simulate a ransomware attack. G Data successfully captured four of the eight real-world ransomware samples that were encrypting my test system’s files. After they had done their harm, it caught two more and completely missed the other two.

BankGuard, like Bitdefender’s SafePay feature and Kaspersky Internet Security’s Safe Money feature, protects your browsers against man-in the-middle attacks as well as other data-stealing threats. It does this invisible, unlike the other two. AutoStart Manager allows you to reversibly stop programs from starting at startup or allow them to launch after a delay. These bonus features are available in both the standalone antivirus and this suite.

How We Test Security Software

Basic Firewall

Modern Windows versions include a firewall that blocks simple outside attacks and puts the system’s ports into stealth mode. G Data is a security suite that can replace Windows Firewall. It does a good job of handling these tasks. It stopped all my Web-based attacks and port scans, and stole all the ports.

G Data Best Antivirus By Ssg: Trusted Antivirus Store &Amp; Antivirus Reviews In The Europe

The firewall’s basic settings page has a slider that allows you to choose between five security levels: Maximum (High), Standard (Standard), Low (Low) and Disabled. The firewall’s basic settings page has three other pages. G Data disables them by default. They contain more detailed settings and are automatically updated as you change security level. You can select custom settings to gain access to these pages if you are a firewall expert or a rare individual. You probably aren’t so leave the firewall at its default Standard setting.

G Data, like most suites, keeps track of which programs are connecting to your network. Advanced firewall systems such as Norton’s can automatically set permissions for millions known programs. They also monitor unknown programs to identify any suspicious activity and suppress any. Old-fashioned firewalls rely on uninformed users to determine how to handle unknown program. Users will often blindly click Allow or Block. This is a bad plan.

G Data’s firewall is similar to Bitdefender’s. It runs in autopilot mode and you won’t be able to see any queries. However, it’s unclear if this does more than just block unsolicited incoming connection requests. To see the program control part in action, I disabled autopilot. Autopilot will be temporarily turned off if you launch a full-screen app. This is to ensure that your movie or game doesn’t get interrupted.

To test it, I launched a program that would not be known by G Data. It was a small browser that I had written myself. G Data displayed a screen with information about the port, protocol and IP address. I had four options: allow access once or allow it all, block access once or block access always. It also appeared for many Windows internal components and programs that should have been trusted such as Chrome or Firefox.

G Data Firefox Best Antivirus By Ssg: Trusted Antivirus Store &Amp; Antivirus Reviews In The Europe

Firewall pop-ups are also displayed for all user accounts and not just administrators. Playing games with your child could cause you to lose access to your browser or other essential Windows components. Open the Application Radar window on the main firewall page to unblock the application.

It’s not worth it to have firewall protection that can be disabled by malicious code. I therefore always look for potential weak points. Although I was unable to disable G Data, I could tweak the Registry. However, it did not protect its Registry data from being changed like Bitdefender or McAfee Total Protection. It protected all its processes from termination by Task Manager. I received an “Access denied” message.

G Data has made an improvement in its protection of Windows services that were previously disabled. Although I was able to terminate the backup service, all other services related to security, such as antivirus and firewall, resisted my attempts to alter them.

The personal firewall component protects against outside attacks and prevents programs from using your Internet connection in inappropriate ways. But that’s all. It now protects its most critical services from malware interference.

Cloud Storage Backup

Click the Backup icon in the upper right corner of the window to get started with G Data’s backup software. Next, click on New task. This will trigger a popup explaining that this product only offers cloud backup. Additional features like local backups or backing up to optical media require a G Data Total Security upgrade.

You create a backup job using cloud backups. This involves defining what you want to back up, where it should be stored, when it should be done, and how. A confusing folder and file tree is used for the first step of what to back up. Redundancy is the problem. Let’s say you first check the tree item using your username. This will select all of your user data to backup. You’ll notice that your music, documents, and other data are not backed up if you disable the Libraries option below. To ensure you have everything, I recommend you carefully review all your options before you proceed.

G Data Backup Best Antivirus By Ssg: Trusted Antivirus Store &Amp; Antivirus Reviews In The Europe

Next, choose where to store your backup files. However, the only option for a backup target is cloud. The program warned me that the cloud had been chosen as the target but that no login was required to continue. I clicked the cloud icon to open a menu which allowed me to choose between Dropbox and Google Drive. I selected Dropbox and logged in to G Data, giving it permissions to access my own folder.

Kaspersky Total Security offers backup storage on Dropbox. However, this is only one of many options. Kaspersky allows you to back up files to any network, local, or removable drive.

Instead of relying on your memory to perform the backup job every now and again, you can schedule a complete backup to run daily or weekly. A partial backup, which only saves changes, can be run on a separate schedule. This takes much less time. You might schedule a complete backup once a month and a partial one every other day.

Are you familiar with the differences between partial and incremental backups? Few people do. You can choose differential to have each partial backup contain all of the updated data since the previous full backup. Only the changes from the most recent backup, whether full or incremental, are included in incremental backups. Although incremental backups are less frequent, they all depend on each other, so it is possible for an incremental backup to become corrupt.

Although there are many settings that can be applied to backups, most users will only need to use a handful. You can choose to exclude files such as temporary files or thumbs.db files which Windows places in picture folders. This will save space. You can also increase the compression settings if you have limited cloud storage.

This is it. You’re done with creating backup jobs. Well, almost. G Data required a Windows account and password to be able to run backups, regardless of who is logged into it. This is not a requirement for other backup systems.

You can create as many jobs you want. You could, for example, run a weekly backup, but keep your most important files archived daily. You might also prefer backing up to Dropbox or Google Drive.

It is easy to restore backed up files. Select the backup set you wish to restore from a list. You can choose to restore all or some files, or only certain files, and then choose whether to restore to the original or new location. Restored files will overwrite any files already in the destination by default. You can opt to overwrite only files that are different in size, last modified times, or if the backup copy is older.

Some security suites do not require you to use third-party cloud storage. Norton 360 Deluxe subscriptions include 50GB hosted online backup. The three tiers combined Norton and Lifelock offer 100GB and 250GB respectively.

Webroot SecureAnywhere Internet Security Complete isn’t quite as comprehensive as Norton. It offers 25GB as a default storage, with the option of purchasing more. This is still more than what you get from G Data. To make this system more user-friendly, I would like to see it simplified and streamlined.

Poor Parental Control

The parental control system in this suite handles content filtering and scheduling time for Internet or computer use. But that’s it. It doesn’t have any advanced features and it doesn’t work well with the parts that are there.

The content filter blocks websites that match five of the following categories by default: hackers, drugs, violence, extremists, and porn. The sixth option blocks websites that use secure connections. Why? G Data cannot filter HTTPS sites. You can’t block secure websites. This would mean you could block PCMag, Wikipedia and many other websites that use HTTPS. If you leave this option unchecked, it means that you are allowing through any porn or unwanted website that uses HTTPS (and there is plenty). This is just one of the many flaws in this component.

G Data Parent Control Best Antivirus By Ssg: Trusted Antivirus Store &Amp; Antivirus Reviews In The Europe

Although parents can create new categories, they are not likely to do so. G Data can detect content categories by simply looking for keywords in the URL or page text. As you will see, this simple analysis leads to poor filtering.

Parents have the option to limit the time that the child spends on the internet, the computer or both. If enabled, the default is to use the computer for 1.5 hours per day, 10.5 hour per week, 45 hours per month, and so on. A weekly schedule can be defined in one-hour increments for the time the child can access the Internet or the computer. This feature makes it simple to set blocked and allowed times.

G Data’s time-scheduler was able to work independently of the system clock when I tested it. This is a good thing, as the scheduler used to have no teeth. I could not find a way to bypass the daily limit even then.

The keyword-based content filter is too restrictive and lax. The filter was too strict for photo-based sites that have banned words in their URLs or page text. It did not block any photo-based naughty websites. Sites that were completely innocent got the boot. It blocks all Blogspot blogs because it found the word “pot” in the URL. It was set to block the “pcm”, which I found blocked PCMag.com. It’s useless.

G Data Website Block Best Antivirus By Ssg: Trusted Antivirus Store &Amp; Antivirus Reviews In The Europe

It would be reasonable to assume that the Hackers category would prevent secure anonymizing proxy sites, but it does not. Connecting to one of these sites allowed me to bypass the filter completely. This hack is sure to be discovered by your teenager.

G Data reports the websites that it has blocked for each user. It also provides a date/time stamp as well as an explanation. I was able to confirm that the app blocked blogspot.com pages because of the embedded word pot.

It is not a very useful system. It does nothing more than control screen time and filter websites according to content. The content filter misses dangerous sites and blocks harmless ones. You should look elsewhere if you require parental control for your security suite. Kaspersky Safe Kids is included in Kaspersky Total Security. Norton’s parental control feature is far more powerful than G Data’s.

This parental control system, aside from a minor improvement in time management, has remained unchanged for many years. G Data should make some improvements. Make it work, or get rid.

File Shredder

You might have missed a new icon that the G Data installer has added to your desktop if it is cluttered with too many icons. G Data Shredder can be used to securely delete files beyond what is possible for forensic recovery. Many file encryption utilities include a shredder so that you can completely wipe out all the plain-text files in your encrypted files.

You can’t delete a file to permanently remove it, whether you are doing so for security reasons. Anyone can retrieve it from the Recycle Bin. Even if the Bin is not used, data from the file remains on the disk until it is re-used. Forensic recovery software can often bring it back.

G Data’s shredder allows you to permanently delete files by overwriting them before deletion. It only makes one pass and overwrites the file data with random bits. Software-based recovery can be defeated by this one pass. Hardware-based recovery systems might be brought in by the Feds or the Mafia if they are looking over your computer. Even so, it is common knowledge that even the most powerful hardware systems cannot get anything back after seven overwrites. G Data allows you to choose up 99 overwrites. You’re just wasting your time if you choose more than seven.

After you have configured the shredder you can drag files and folders onto its icon to secure deletion. The right-click menu will also have a Shred option.

New Performance Impact

If you feel that your security software is slowing down performance, it’s likely you will turn it off instead of getting fragged by lag. Although there was once a time when security suites were too heavy, it’s long gone and they have learned their lesson. Modern suites have minimal impact on performance.

They were still a challenge so I tested them by running multiple test scripts on a physical computer. Then, I installed the suite and averaged multiple script runs. Comparing the scores before and after allows me to see the effect that the suite had on boot times, copying files between drives, as well as putting large files into ZIP archives.

My test ran into a strange problem at first. Because it is well-suited for command-line operation, I use 7-Zip in my scripts. G Data’s BEAST behavioral detection system found that 7-Zip was malware and placed it in quarantine. I saved the program and began fresh. But I was shocked to see G Data interfere with 7-Zip, a well-known tool.

G Data didn’t slow down any of my test scripts the last time I tested it. It performed very differently this time. Maybe the BEAST system is in need of some tuning? After installing G Data, the boot time test took 31% longer and file move and copy took 52% longer. The zip/unzip test was not affected.

G Data ranks in the bottom half for recent products with an average drag rate of 27 percent. You won’t notice any slowdown, but it is possible to ignore this. ESET and Webroot did not slow down any scripts during their most recent rounds of testing.

Variations in component quality

G Data Internet Security has all you would expect from a security suite, and even a backup system. Although the antivirus performed well during testing, its ransomware-specific protection layer was not as effective. The firewall is basic and has limited parental control. A suite that does all of its job well is better. You might also be better off with a company who is more proactive, considering that virtually all of the issues reported in our reviews have been resolved.

Editors’ Choice products are defined by a distinction between basic suites such as G Data and feature-packed mega-suites. We also distinguish cross-platform multi-device Suites. Our Editors’ Choice products in the basic suites category are Kaspersky Internet Security and Bitdefender Internet Security. They are more expensive than G Data but offer better security.

G DATA Mobile Security Light has a new look!
G DATA Mobile Security Light has received a significant upgrade in functionality. This makes it much easier to use. The best protection for your tablet or smartphone just got better. This is all without affecting the battery life and performance of your device.

Our malware scanner detects all malicious software such as viruses, trojans, or spyware and automatically removes it from your device. The notification assistant allows you to quickly and easily review the permissions for all the apps on your tablet or smartphone. You can also filter out the ones with more rights than they should have.

G DATA Mobile Security Light (July 2019) detects all malicious software and gives you the best protection possible for your tablet or smartphone.

Get a 30-day free full version of G Data Mobile Security or Android!

G DATA Mobile Security Light is available for download. You can get the full version of the software with many premium features. These functions are included in the full version:

Complete Malware scanner with Advanced Scanning
Protect your tablet or smartphone against all types of malicious software, including viruses, trojans, spyware, and stalkerware. Two scanner engines are used to detect all malware, regardless of whether it is installed new or existing software. Your protection against viruses will always be up-to-date thanks to the cloud connection.

Anti-theft Protection
Is your mobile device lost or stolen? Anti-theft protection gives you many options to remotely locate your tablet or smartphone and protect your data from unauthorized access. Our G DATA ActionCenter can help you locate your device and reset it to factory settings. You can also lock it or set off an alarm. You can lock your device automatically if someone inserts a SIM card to it.

Web Protection
With web protection, you can surf the Internet securely at all times. It immediately notifies you if you land on a fraudulent site. Cloud connection ensures web protection recognizes new phishing sites.

App control
App control shows all apps installed on your tablet or smartphone, along with their permissions. This makes it easy to identify and remove sniffer apps. Filters allow you to group apps by rights or to gain access to apps that are protected by G DATA Mobile Security.

You can purchase a license for one-year (EUR15.95) or one-month (EUR1.99, auto renewal until cancelled) via an in-app purchase. After 30 days, the trial period automatically ends. The Light version provides full virus protection and allows you to see the permissions for all apps.

Features of Mobile Security for iOS

Security analysis

Are you considering buying a secondhand iPad or iPhone? G DATA can be used to check your Apple device for possible risks. A security vulnerability can be caused by the previous owner, malicious apps downloaded, or visiting manipulated websites. G DATA Mobile Security iOS allows you to see if your iPhone or iPad is affected.

Protection against Phishing

G DATA Mobile Security provides protection while you surf on the move, whether you are in a café, on the train or at home. The phishing protection feature blocks fraudulent and manipulated sites immediately, protecting your online transactions.

Alert tone

Your iPhone or iPad must be at home somewhere in your living space. But where is it? You don’t know where? Use the G DATA online portal to set a loud alarm tone – even if your device is set to silent – to quickly locate your smartphone or tablet.

QR code scanner

QR codes are all around. They don’t always provide useful links or vCards. Many of these links can also be used as a gateway to malicious downloads and phishing websites. It is difficult to see this at first glance. These codes are practical and secure thanks to the G DATA QR Code scanner. The information contained in these codes can only be called up and used if they have been checked and found to be safe.

Localization

Do not give out your location to anyone. Use G DATA Mobile Security iOS to find your iPhone or iPad online. All while being protected by Germany’s strict privacy policies.

Mobile Security Center

Use our online platform, the G DATA Mobile Security Center. It allows you to centrally manage all your iOS devices.

Source : #safetydetectives
Editor by : BEST Antivirus KBS Team

G DATA Antivirus & Internet Security
Gdataiconlogo Best Antivirus By Ssg: Trusted Antivirus Store &Amp; Antivirus Reviews In The Europe

Name: G DATA Anti-Virus & Anti-Malware

Description: G Data's main window is unchanged in the past few years. It still has a large red banner at the top with icons for Security Center, Virus Protection and Autostart Manager. (more on the latter later). It isn't red to indicate danger or stop--it's just a red color. It is still a bit odd that the entire banner becomes grey when another program is active.

Offer price: From $29.95 To Up

Currency: USD

Operating System: Windows, Windows 7, Windows 8, Windows 10, MAC, Android

Application Category: G Data - Brand Review

Author: BEST Antivirus

  • Security
    (4)
  • Features
    (3.5)
  • Ease of use
    (4)
  • Customer Support
    (4)
  • Price
    (3)
Overall
3.7

Summary

According to G Data’s website, G Data created the first antivirus program in 1985. Yes, the German company is more well-known in Europe than in the USA. Others may point out a different product being the first antivirus. G Data’s history is long and impressive. G Data Antivirus, the company’s entry level product, is far more than the basic protection of antivirus.

Pros

  • Excellent score in our hands-on malware protection test.
  • Protects against banking Trojans, keyloggers, ransomware, and exploits.
  • Includes spam filter.

Cons

  • So-so score in our phishing protection test.
  • Mixed scores in independent lab tests.
  • Ransomware protection only partially effective.