3. G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
4. G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
5. • Founded 1985 in Germany
• 300 employees world wide
• Offices in 13 countries: Germany (HQ),
USA, Canada, Japan, China, UK,
France, Italy, Spain, BeNeLux, Poland and
Russia
• Sales Partners in more than 90 countries
• G Data solutions globally available
G Data Overview
6. The IT-Security Pioneer
1987 First AntiVirus world wide
1990 First AV with graphical user interface
1995 First AV Hardware Protection
1999 First Linux based BootScan
2005 First AV with Cloud Security
2007 First Silent Firewall
2008 First Fingerprinting for top performance
7. Member of the ITSMIG association
Under the patronage of
8. G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
9. • DoubleScan: 2 independent Scanning
Engines
for unique 99+ Warantee
• Fastest reaction time on new threats
• Fingerprinting prevents from unnecessary
scans to save performance
• Whitelisting of known files prevents from
False Positives
Reactive Protection
90%
92%
94%
96%
98%
100% Jan08
Mar08
May08
Jul08
Sep08
Nov08
Jan09
Mar09
May09
Jul09
Sep09
Nov09
Jan10
Mar10
May10
Jul10
G Data
Kaspersky
Symantec
Mc Afee
Trend Micro
Reactive detection
(Source: AV-Test)
0
100
200
300
400
500
600
G Data
Kaspersky
Symantec
Mc Afee
Trend Micro
Average reaction time on new threats
(Source: Computer BILD)
7h 11min
9h 19min
55min19min
3h 20min
10. • Proactive Protection with Behaviour
Blocking
and several heuristics methods
• OutbreakShield: Mail based cloud security
detects mass mailings such as virus
outbreaks or spam attacks using statistical
methodology
• Web based Cloud Security: server based
URL
black lists for real time protection
Real Time Protection
McAfee
Symantec
Kaspersky
F-Secure
MSForefront
AVG
Trustport
Sophos
Redstone
Avira
GData
80,00%
85,00%
90,00%
95,00%
100,00%
40,00% 50,00% 60,00% 70,00% 80,00% 90,00% 100,00%
ReactiveDetectionvs. Proactive Detection
(Source:VirusBulletin)
ReactiveDetectionRate
Proactive Detection Rate
16. GfK TrendSetter - Germany
Computer-Software
Period : 11. - 17. October 2010 (Week 41)
GfK-TOP 10
NON-GAMES
Rank
Previous Current
Week Week Title Brand
1 1 OFFICE HOME AND STUDENT 2010 MICROSOFT
4 2 INTERNET SECURITY 2011 3 USER 25th ANNIVERSARY VERSION G DATA
3 3 INTERNET SECURITY 2011 KASPERSKY LAB
6 4 WINDOWS 7 HOME PREMIUM 64-BIT SB-VERSION MICROSOFT
5 5 INTERNET SECURITY 2011 UPDATE KASPERSKY LAB
8 6 INTERNET SECURITY 2011 3 USER UPDATE KASPERSKY LAB
10 7 WINDOWS 7 HOME PREMIUM 32-BIT SB-VERSION MICROSOFT
7 8 NORTON INTERNET SECURITY 2011 3 USER SYMANTEC
9 9 NORTON INTERNET SECURITY 2011 SYMANTEC
2 10 ANTI-VIRUS 2011 3 USER LIMITED EDITION KASPERSKY LAB
18. Management
Server
AntiVirus
Client
Firewall and
AntiSpam Client
Mail
Security
Remote control: installation, virus scans, updates,
settings
Fully automated virus scans and updates (pull-push)
Fully invisible malware protection – no client
interaction
For Windows and Linux
2 way Firewall: Invisible protection against hacker
attacks
AntiSpam: Content independent real time protection
Mail server independent mail gateway
Protection against malware, spam and
phishing
19. G Data Overview1
G Data‘s Unique Technologies2
G Data Solutions3
New: G Data EndpointProtection4
22. Web 2.0 platforms (blogs, forum entries)
Social networks (Facebook, MySpace, Twitter)
Manipulated hot topic search results
Links in instant messengers and chats
Phishing through online auctions
File sharing and file hosting
Modern Sources of attack
23. Web 2.0 platforms (blogs, forum entries)
Social networks (Facebook, MySpace, Twitter)
Manipulated hot topic search results
Links in instant messengers and chats
Phishing through online auctions
File sharing and file hosting
Modern Souces of attack
27. Security risks
Infiltration of new malware
IT infrastructure damage due to
unauthorised software
Loss / theft of sensitive data
28. Legal risks (German Law)
Joint responsibility for copyright
infringements (pirate copies, MP3…)
If trade secrets are published
If personal data is made accessible to
the public
29. ESSENTIAL: the policy
Written definition of the content and
extent of private Internet use
Use of software to ensure adherence
to the policy
30. AntiVirus / Firewall / AntiSpam
PolicyManager:
Device control
Application control
Content Filter
Internet use control
G Data EndpointProtection
31. USB mass storage devices / hard
disks
CD- / DVD- / floppy drives
Can be certified by administrator
Device control
32. Whitelist or blacklist
Many applications predefined (file
sharing, games, Messenger, etc.)
Application control
36. Device control
Application
control
Web / URL filter
Internet use
control
Symantec
Endpoint
Protection
Sophos
Endpoint
Security &
Control
Kaspersky
Antivirus 6.0
McAfee
Protection
for Endpoint
Trend Micro
Worry Free
Business
Security
G Data
Endpoint
Protection
Only
Whitelist
Only
Whitelist
Only
Blacklist
37. Best protection against malware,
hackers and spam
Legal security for usage of
corporate PCs
Significant improve of productivity
Easy administration thanks to
unique all-in-one solution
G Data EndpointProtection advantages