G DATA Business Generation 15

Cyber ​​Security News

Share post

G DATA Business Generation 15: Maximum protection for companies in a new design. The German cyber defense provider is launching a new B2B solution portfolio with a revised guard

G DATA CyberDefense has revised its business solutions and once again increased the protective effect: thanks to a new guard with AMSI connection, IT managers in companies benefit not only from outstanding protection against cyber attacks, but also from improved performance and fewer false positives. Administrators also benefit from a completely redesigned user interface. This offers an even better overview of the individual components and the network security status and enables intuitive operation. The powerful G DATA business solution portfolio 15 is available immediately. Companies with a valid license can upgrade to the new version free of charge.

New user interface makes work easier for administrators

“Our new corporate solutions set new standards in IT security and usability. This provides the best possible protection against cyber attacks, without compromising on performance and without any annoying false positives. Our new user interface makes the work of administrators a lot easier, ”says Sascha Levölger, Product Owner B2B Solutions at G DATA CyberDefense.

“With our new business solutions, we are giving our partners a high-performance, high-performance portfolio with which they can perfectly protect companies from cyber threats. As an owner-managed company, we pay special attention to medium-sized companies in order to optimally support their business, ”says Hendrik Flierman, Global Sales Director at G DATA CyberDefense.

New guardian - increased performance

When it comes to cybersecurity, every little thing counts, which is why G DATA worked again on the guard. The result: perfect protection combined with increased performance. G DATA security solutions have already proven this in comparative tests by independent test institutes. AV-Comparatives awarded the coveted “Adavanced +” and “Aproved Business Security” seals, and AV-TEST recognized the security software as a “Top Product”. BEAST and DeepRay clearly identify malicious programs so that no false positives occur - this is shown by independent comparative tests. In addition, thanks to expanded BEAST technology, G DATA business solutions are now able to clean up infected Microsoft Office documents.

In addition, the business solutions from G DATA CyberDefense now also have an AMSI interface (Antimalware Scan Interface), which enables fileless malicious code to be recognized and blocked even better. Malicious programs are not always used as scannable files; the components are only combined into malicious code when they are executed. In these cases the script resides in memory for execution. AMSI enables the code to be checked and blocked in the event of malicious code.

Revised dashboard for easier work

The user interface of the new G DATA business solutions has been completely revised to make the work of administrators even easier: all important information about the network can be seen at a glance in the new dashboard. Thanks to the intuitive operation, IT managers can easily switch between individual groups or clients. In addition, the individual protection modules and their status can be viewed. It quickly becomes clear whether and where there is a need for action.
New: device control now also includes smartphones
The device control in the Policy Manager of G DATA Endpoint Protection now also includes mobile devices. Administrators are able to grant read and write rights, to revoke them or to prohibit their use in general. In this way, you can ensure compliance with company guidelines and, for example, prevent data from unauthorized access to a smartphone. This is possible for all mobile devices that Windows recognizes as "portable devices".

G DATA business solutions 15 at a glance

G DATA Antivirus Business
G DATA Client Security Business
G DATA Endpoint Protection Business
G DATA Managed Endpoint Security

Key functions of G DATA business solutions 15

  • Redesigned guard for more security, more performance and fewer false positives
  • BEAST - behavior-based detection of malware, now also with cleaning function for infected Office documents
  • Integrated DeepRay technology - protection against disguised malware through artificial intelligence and machine learning
  • Comprehensive and resource-saving protection against online threats thanks to "Layered Security" for Windows, Mac and Linux clients
  • Integration of the AMSI interface
  • Security for virtual machines thanks to G DATA VM Security
  • New modern user interface with intuitive operation
  • Multi-client capability in G DATA Endpoint Protection Business and G DATA Managed Endpoint Security - specialist dealers can manage the G DATA security solutions of several customers in a single instance
  • G DATA Startup Wizard makes it easier to activate the protection components after a new installation
  • Policy management in G DATA Endpoint Protection Business now also with device control for mobile devices
  • Optional: Mail Security with mail server-independent and central email protection with virus and spam filter
  • Optional: Patch management module, with which software security gaps can be closed promptly
  • Optional: Linux Web Security Gateway equips the Squid-based Web Gateway with comprehensive protection against viruses and phishing

 

More on this at GData.de

 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more