Antivirus software has a long history alongside computer viruses. Many people today believe that the first computer virus was a self-replicating program named Creeper that was created in 1971. Reaper soon appeared; strictly speaking, it is a virus as well and was created to get rid of Creeper. However, true all-purpose antivirus tools weren’t developed until the 1980s. The German security business G Data claims that its antiviral was the first, debuting in 1985, and it has a distinguished and lengthy history. Trust in German Sicherheit (Security), the company’s motto, and G Data Antivirus goes far beyond the essentials for those who do.
WHAT IS THE PRICE OF G DATA ANTIVIRUS? A single antivirus license typically costs just about $40. Some of the antivirus programs matching that pricing are Webroot, ESET NOD32 Antivirus, and Bitdefender. G Data costs $39.95 for three licenses, saving you $10 on a single license. You can purchase licenses to install G Data on five devices for an additional $10.
(Opens in a new window)
You manage your G Data licenses through an online console, just like many contemporary security product lines. Your online account is made after you complete the initial installation. To safeguard other devices, simply connect into the account after that.
PREMIUM LAB RESULTS G Data tests with two of the four independent labs I monitor, though not the same two as when I last examined it. G Data was then incorporated by SE Labs (Opens in a new window) into its reports. Researchers from this lab record actual web-based malware attacks and utilize a replay system to present every antivirus with the same attack. Five levels of certification are available for products: AAA, AA, A, B, and C. Every product examined in the most recent report from this lab received a AAA rating.
COMPARED PRODUCTS BitDefender Antivirus Plus, images 2 and 3. (Opens in a new window)
Webroot Security Anywhere Antivirus (IMG2IMG3)
Very good AVG ANTIVIRUS PLUS (Opens in a new window)
Excellent ESET NOD32 antivirus, img2 (Opens in a new window)
Nice View It
AV-Test Institute (Opens in a new window) tests antiviral software from three different angles and awards up to six points for each of the three criteria—Protection, Performance, and Usability. G Data receives the maximum points in each of the three categories for a perfect score of 18. Twelve additional solutions, including Trend Micro, Norton AntiVirus Plus, and McAfee, have scores that are comparable to G Data’s.
AV-Comparatives (Opens in a new window) does not score in a numerical manner. Instead, a product that achieves the bare minimum of success is certified as Standard, while those that surpass the bare minimum can be certified as Advanced or Advanced . G Data administers one of each Standard, Advanced, and Advanced certificates in the three tests I take. With Advanced in each of the three tests, Avast, AVG, and Bitdefender dominate the competition.
I employ an algorithm that generates an overall result by mapping the available lab data onto a scale from 0 to 10. For me to calculate an overall score, I need findings from at least two labs, yet more than half of the goods I track have just one or no results.
The combined total of G Data’s two lab results is 9.3, which is the same as the current average. In tests from three labs, AVG and Bitdefender receive flawless scores of 10. Avira Free Security had the highest rating (9.8) among the select few products that were examined by all four laboratories.
STARTING OUT WITH G DATA G Data installation isn’t nearly as quick and easy as many similar apps, but it’s still not difficult. When you register for online management, a lot of personal information is requested, although not all of the forms are required. And a step that is becoming less prevalent is the need to reboot after the installation is finished.
The primary window of G Data hasn’t undergone much alteration in recent years. It still has icons for choosing Security Center, Virus Protection, and Autostart Manager across the top of the screen (more about the last one later). It’s just red; it’s not red for danger or red like a stoplight. The fact that the entire banner becomes gray when another program is running is still a little startling to me.
The status of the product’s numerous protective features is shown in several groups throughout the remaining areas of the main window. An icon with a green checkmark denotes that a feature is fully operational. The icon transforms into a yellow exclamation point when a component is only partially disabled. The icon for a fully disabled feature is gray. You want to see those green checkmarks everywhere, of course.
As always, right after installation, you want to do a complete system scan. On the Virus protection page, click Check computer to launch that scan. The applications’ on-access and idle-time scans should, in theory, detect any new intrusions once the initial scan is complete. Nevertheless, you might wish to plan a routine scan. G Data gives you the option to schedule scans for every system starting, or on an hourly, daily, weekly, or monthly basis.
On a clean test system, a full G Data scan took 94 minutes, which is slightly longer than the current standard of 69 minutes. Many antivirus systems make use of the initial scan to streamline the procedure by employing tactics like tagging well-known safe programs so that subsequent scans can avoid them. A second G Data scan didn’t run much faster during testing.
In my tests, I saw that G Data replaced the majority of risky URLs with a red warning message that claimed “contaminated code” without naming any specific virus. It only occasionally named malware by name. My G Data contact indicated that while the more general warning shows that the URL matched G Data’s cloud database of potentially harmful URLs, the appearance of a name indicates that G Data’s signature-based detection detected the threat.
(Source: PCMag) G Data substitutes a red warning page for insecure HTTP frauds in the browser, similar to its warning for a page that has malware. In contrast, if the phishing page employs HTTPS security, as more and more of them do, the browser will simply display an error while G Data pops up a window to explain what happened.
In comparison to my previous review, G Data’s phishing detector detected 93 percent of the validated phishing URLs, an improvement. Compared to the other two browsers, it proved to be far more accurate. However, five products—including Bitdefender and F-Secure Anti-Virus—achieved a flawless score of 100 in this test.
RASOMWARE PROTECTION IS MUCH BETTER NOW There are four protective layers available if you pick Real-time protection on the G Data Security Center page: DeepRay, Beast Behavior Monitor, Virus Monitor, and Anti-Ransomware (a machine-learning system). Your files could suffer if a brand-new ransomware attack manages to bypass all three other defenses. Your files are still gone, even if G Data’s experts develop a defense a day or two later. But how effective is that ransomware defense?
I disabled all other defensive layers outside Anti-Ransomware and disconnected the test system from the rest of the network to simulate the impact of G Data’s ransomware defense against a fresh ransomware assault. I then launched my ransomware strains against the test system one by one. It’s not surprising that G Data’s technology didn’t stop my single disk-encrypting ransomware sample as it is built to identify ransomware that encrypts files.
G Data found all but one of the ten ransomware samples that encrypt files. The majority of the remainder were able to encrypt some files before detection began. That makes reasonable because one of the primary behavior triggers is encrypting files. 20 documents to 2,000 auxiliary files were lost, on average. But keep in mind that I had to disable not one, not two, but three layers of malware defense in order to even observe this component in action.
(Credit: PCMag) Addresses or domains can be manually added to the whitelist (never blocked) or the blacklist (always blocked). The Bayesian learning system and other filters can also be adjusted, although most users should just leave these settings as they are.
In addition to spam filtering, G Data also provides what it refers to as Email check. This function scans both incoming and outgoing mail for viruses and potentially harmful links. Real-time protection ought to detect hazardous attachments if you save or open them, just as it ought to do if you click on risky links on the internet. Additionally, your system really shouldn’t be delivering any malware because G Data actively prevents it. But it can’t hurt to have this extra layer of safety.
BONUS ELEMENTS G Data offers you various features that other businesses might reserve for a security package in addition to the typical antivirus features. G Data’s BankGuard function, like Kaspersky’s Safe Money and Safepay in Bitdefender Antivirus Plus, tries to safeguard your financial transactions. SafePay is run by Bitdefender on a different desktop, while Kaspersky marks a protected browser with a brilliant green border. BankGuard, in contrast, protects all of your browsers while operating covertly. Only a Trojan that manages to bypass the antivirus component and tries a man-in-the-browser attack or another data-stealing method will allow you to observe it in operation. I haven’t been able to pass that test.
It was simpler to evaluate the associated keylogger protection feature than BankGuard. I set up a well-known free keylogger, entered some information into Notepad, then into my browsers and back into Notepad again. There were no keystrokes between the two usage of Notepad, according to the keylogger’s keystroke-capture report that I opened.
I used the CORE Impact penetration tool to develop roughly 30 exploits to attack the test system in order to evaluate G Data’s exploit protection. It discovered 51 percent of the exploits, or 31 percent, by utilizing the official CVE number and a few more by using generic detection. That is identical to Bitdefender’s rating; both are higher than the majority.
0 (Credit: PCMag) The option to control the applications that start up automatically when your system boots has long been a feature of G Data. Any software can be made to launch after a delay, which is by default set to two minutes, using its Autostart Manager. You can set the delayed app to never launch, change the time from one to ten minutes, or have G Data activate it when the system’s starting activity has subsided. This control is more sophisticated than the comparable Norton function and more precise than the straightforward on/off switch provided by Windows itself.
A DEVELOPED PRODUCT G Data has been around longer than the majority of security firms, thus it seems sense that G Data Antivirus is an established product. It has elements made especially to defend against ransomware, keyloggers, banking Trojans, spam, and exploits. The software received respectable ratings from the independent testing laboratories in addition to an exceptional result in our hands-on malware prevention test. Additionally, it successfully stopped malware downloads and found all but one ransomware sample. You can’t go wrong if you decide to believe G Data.
We have, however, selected a few additional antiviral programs from the wide range of options for our Editors’ Choice award. Even more security measures are included in Bitdefender Antivirus Plus than in G Data, which constantly receives top ratings from testing labs. You can secure every device in your home with a single McAfee AntiVirus Plus subscription. Additionally, Webroot SecureAnywhere AntiVirus is the smallest and fastest antivirus available thanks to its novel technology, and it even has a rollback feature that may undo ransomware damage.
G Data Security
Pros Outstanding results in our practical malware defense test. shields from banking ransomware, trojans, keyloggers, and exploits Consists of a spam filter Various results from separate lab tests Conclusion G Data Antivirus receives respectable ratings from independent testing laboratories and exceptional results in several of our own tests. In addition to standard antivirus software, it has a spam filter and components for fighting ransomware and other malware kinds.
APPRECIATE WHAT YOU JUST READ? For direct delivery of our top privacy and security stories to your inbox, subscribe to the SecurityWatch newsletter.