Per tutti i dispositivi
La nostra storia
|Antivirus con tecnologia ibrida CloseGap|
|Test comportamentale BEAST|
|Protezione degli exploit|
|Protezione per la navigazione e il phishing basata sul cloud|
|Tecnologia AI DeepRay®|
|Protezione contro i dispositivi USB manipolati|
|Protezione della posta elettronica per Microsoft Outlook|
|Gestione centrale e facile tramite una sola console|
|Visualizza l'interfaccia nel webinar|
|Directory software e hardware|
|Amministrazione semplice (a distanza) con eredità delle linee guida|
|Implementazione possibile anche su server non dedicati|
|Collegamento Active Directory|
|Light Agent per macchine virtuali|
|Controllo dell'utilizzo di Internet e dei contenuti web|
|Controllo dell'applicazione tramite blacklist o whitelist|
|Protezione in tempo reale per dispositivi Android e iOS|
|Navigare in sicurezza|
|Filtro per app, contatti e chiamate|
Protezione speciale per i server
|Samba File Server Security|
|Exchange Mail Security|
|Linux Mail Security|
|Linux Web Security Gateway|
Would you like to try out our solutions for yourself? Request your trial version now with no obligation and free of charge.
Outsource your IT security and benefit from the advantages of our Endpoint Protection. Your G DATA partner will take over all respective tasks for you – from rolling out the antivirus software to configuring the firewall. On-premise or in the cloud as required.
Mobile Device Management (MDM) from G DATA helps you to implement your company’s BYOD strategy consistently. iOS and Android devices are managed like all other clients via the central dashboard.
What is possible with MDM:
Don’t just filter out malware at the endpoint – filter it out upstream at the server or gateway level. All network traffic that passes through mail and proxy servers can be checked there. This ensures that even those endpoints where no antivirus software is installed are protected against new threats and dangers from the Internet.
Vulnerabilities in the operating system and in installed programs are among the most common attack points for cybercriminals. With the additional Patch Management module, you can easily ensure that all clients in the company always use the latest software versions.
Reduce the scope for a malware attack by restricting its executability to specific applications or vendors.
USB sticks, CD/DVD drives, and webcams – decide for yourself which user groups are allowed to access what.
Web content control
Define at endpoint level which pages your employees can surf on based on category. This is particularly useful for devices that leave the company network, since then the rules you have defined via the proxy or a firewall will no longer apply.
Member management, ticket sales, fan shop - the IT infrastructure at VfL Bochum 1848 binds everything together. Hence a security solution needs to be flexible and be set up differently for the individual areas. G DATA Endpoint Protection including Patch Management and Premium Support meets exactly these requirements.
Talk to our experts about the right endpoint protection for your business.
Security Awareness Trainings
Our online trainings sensitize your employees for IT security topics and equip them with recommendations for action in case of emergency.