Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 2 Ratings

Total
ease
features
design
support

Description

G DATA equips you to effectively tackle cyber threats while unlocking numerous opportunities in the digital landscape. Having pioneered the first antivirus software back in 1987, G DATA continues to safeguard its clients from various forms of cybercrime with comprehensive solutions and services that incorporate cutting-edge security software and artificial intelligence. Additionally, they provide online training to promote safe online practices among employees. With customer support available around the clock, G DATA ensures that their support teams collaborate closely with the G DATA SecurityLab, all operating from the same location. Independent assessments verify that G DATA's security solutions excel in detecting attacks, making them highly effective against Trojans, malware, and even previously unidentified viruses. This commitment to customer safety and innovation positions G DATA as a leader in the cybersecurity industry.

Description

As your organization increasingly shifts its operations to a digital landscape, safeguarding every server, laptop, and mobile device within your network becomes essential. The Select tier incorporates a blend of advanced technologies alongside adaptable cloud management and centralized controls for applications, web, and devices, ensuring the protection of your sensitive information at all endpoints. Security solutions are designed to operate without hindering performance, allowing you to maintain productivity even during protective measures. In the event of an attack, the Remediation Engine effectively reverses the majority of harmful actions, enabling users to continue their tasks seamlessly. Offering top-tier security features, including post-execution behavior detection and machine learning technologies, this solution significantly mitigates your risk of attacks while ensuring comprehensive safety for all endpoints, greatly reducing the frequency of necessary updates. Transitioning from third-party endpoint protection is made easy with a straightforward migration process that aims for a flawless switch. Additionally, our quality assurance audit service post-deployment guarantees that your configuration is optimized for peak performance. By investing in such robust security measures, you not only protect your data but also reinforce the trust of your clients and stakeholders.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

ActivePlatform
Axonius
CYREBRO
Jotti
Link
Portnox Security
ThreatConnect Risk Quantifier (RQ)

Integrations

ActivePlatform
Axonius
CYREBRO
Jotti
Link
Portnox Security
ThreatConnect Risk Quantifier (RQ)

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$40.00/one-time/user
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

G Data Software

Country

Germany

Website

www.gdatasoftware.com

Vendor Details

Company Name

Kaspersky Lab

Founded

1997

Country

Russian Federation

Website

usa.kaspersky.com/small-to-medium-business-security/endpoint-select

Product Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Product Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

eScan Reviews

eScan

MicroWorld Technologies

Alternatives