Sumažinta kaina G DATA Client Security Business + Exchange Mail Security

G DATA Client Security Business + Exchange Mail Security

B1005ESD121
Nauja licencija


Tipas: Trukmė:

Nuolaida:

 54,30 EUR

271,50 EUR


1 metai


G DATA Client Security Business + Exchange Mail Security - Aprašymas

 View Datasheet Compare solutions

What is Endpoint Security?

  The innermost protective circle of our Layered Security concept protects the heart of every corporate network: the clients on which employees work with sensitive data on a daily basis, where they enter access data and open attachments from e-mails. Endpoint Security includes all the technologies that protect these clients directly from threats and exploiting vulnerabilities. This includes proactive protection against malware, including an effective client firewall and efficient patch management to prevent vulnerabilities in installed programs from becoming an attacker's gateway.
 

 Reliable detection of known malware

Most attacks on corporate networks are carried out with known malware that attempts to penetrate the outer defence layers every second. Classical detection of malware using signatures is closely linked to behavior-based detection and plays a key role in the Layered Security concept for early detection of threats. This is not only why it is indispensable in modern security solutions. In addition to the virus scanner on the clients, the protection technologies also rely on signatures that work at the network borders in the Layered Security concept - for example, the e-mail filter or the URL blocker. This allows them to detect malicious files on the network before they reach the clients.

G DATA regularly delivers a new signature list via update, so that the computers in the network are protected against known malware in a timely manner. The signature of an unknown malware that has been stopped by behavior-based detection is immediately communicated to all protection technologies so that they can next time stop the malware directly at the outer layers.

What are signatures?

All files or programs have a unique "fingerprint": the so-called signature. If a file or program is classified as malicious, it will be listed on a black list. During a virus scan, the signatures of files are compared with this list - this happens very quickly and is done regularly in the background. If the anti-virus software finds a file signature on the blacklist, it will be detected as malicious and quarantined.

 Next Generation Proactive Technologies

If malware was intercepted by its signature on the outer defense rings, it could not cause any damage yet. Only when the code contained in the code is actually executed and gets computing time in the processor can it unfold its potential. Once a malware has overcome all levels and is activated on the client, it encounters behavior-based detection. This is the last line of defense. Only when it's taken is the attacker at the target.

G DATA business solutions have numerous next-generation technologies such as

  • heuristic algorithms
  • Exploit Protection
  • BankGuard
  • Keylogger Protection
  • Behavior Blocking

They are able to identify and stop unknown malware by its behavior before damage occurs. The software is then added to the signature list of malicious programs so that the outer defense rings can intervene at an early stage during the next attack.

 

Ransomware: A new challenge for companies

Extortion Trojans are currently keeping the corporate world particularly busy. Once a computer is connected to it, the so-called Ransomware encrypts the local files - usually also those on other clients and servers in the network. The attackers then demand a ransom for decrypting the data. Prominent variants such as Petya, WannaCry or Locky could thus cause damage amounting to millions.

Our new Anti-Ransomware module protects against these perfidious attacks: It detects when a program wants to encrypt many files in a short time and stops the process early.

Firewall


In addition to malware detection methods, our firewall checks client communication with the corporate network and the Internet. This means that no malware can reach the computers in your network via these connections, no one can gain access to your data, and no malware can establish a connection to the Internet.

In times of "Bring Your Own Device" (BYOD) and consumerization, the client firewall is more important than ever: When employees use your company's devices in another network - for example, an unsecured WLAN in a café - our firewall ensures outside the company that attackers do not gain unnoticed access to the device.

Patches

For many vulnerabilities in software, there are already updates that fill these gaps. The problem: These patches often don't reach the clients fast enough. After the infection with the extortion Trojan horse "WannaCry", the disaster for hundreds of thousands of IT managers - see info box. But how do you keep track of the software and patches used in your company? The solution: G DATA's centralized Patch Management. Reduce the size of your clients' attack area and prevent many cyber attacks that exploit known vulnerabilities.

G DATA Patch Management

  • Pre-tested updates from the world's largest patch directory
  • Inventory of installed software on the clients
  • Implementation in test environments
  • Rollback orders as required
  • Reports

The "WannaCry" case

 

The blackmailer Trojan "WannaCry" spread all over the world on May 12, 2017 and attacked corporate networks. In Germany, operations in numerous hospitals were at a standstill, and the Deutsche Bahn scoreboards only showed the message of blackmailers instead of the current departure times. Production and workflows in global companies such as the French car manufacturer Renault were massively affected by the attack.

The Trojan horse could spread so rapidly due to a known vulnerability in the Windows operating system alone. This gap was already closed two months before the outbreak. The infection could have been avoided if the patch released by Microsoft had been installed on the affected systems in time.

Managed Endpoint Security

 

Outsource your IT security and benefit from all the advantages of our Endpoint Protection Business: Your G DATA partner will take care of all the tasks for you - from rolling out the software on your endpoints to configuring the firewall and adopting your Active Directory policies.

  • Deployment and maintenance by G DATA experts
  • Fast response to problems
  • Compliance with your company guidelines
  • Easy integration into your infrastructure
  • Remote maintenance without downtime

Focus on your core business, cost-efficiently and without disrupting your day-to-day business due to administrative downtime.

 

IT security from the cloud

 

Your G DATA partner can now also set up virtualized management servers for you via the cloud platform Microsoft Azure.
 

TG DATA Exchange Mail Security

Security Plugin for Microsoft Exchange Server

  • Trust in real-time protection: Dangerous e-mails and their attachments are detected on the mail server as soon as they arrive and do not end up in the mailbox of an endpoint.
  • Maintain employee productivity: The anti-spam feature filters out unwanted spam on the server side so your teams can continue to work undisturbed.
  • Blocking e-mail addresses and domains prevents further distractions caused by dangerous, inappropriate or unsolicited content.
G DATA Exchange Mail Security

Why secure your servers?

According to a study by Verizon, more than 99% of malware enters a company's network via e-mail or websites. For example, as a malicious attachment in a spam mail or as an undetected download while surfing. Our solutions filter out these threats at the earliest possible point in time and are already deployed at server and gateway level.

We secure all the network traffic that passes through mail servers, proxy servers or file servers - before it even reaches the endpoint. A further advantage: Private smartphones or guest devices do not become the gateway to malware.


Working together safely

Prevent malware from spreading unnoticed through file sharing on your file servers.


Protection from web threats

Block web pages or the reception of executable files already on the server - for all devices that connect to the network.


No more harmful e-mails

Filter out spam and malicious attachments in e-mails before they reach your employees' mailboxes.

 

 

 


System Requirements

G DATA Management Server
Windows
General requirements
min. 1GB RAM, 1 CPU and 2,5 GB HDD

When using G DATA Management Server with Local Microsoft SQL Database Server:
4 GB RAM, multicore CPU


Supported Operating Systems
Microsoft Server 2016 64bit
Windows 10 32/64 bit
Windows 8.1 / Windows 8 32/64 bit
Windows Server 2012 (R2) 64 bit
Windows Server 2012 64 bit
Windows 7 32/64 bit
Windows Server 2008 (R2) 32/64bit
Windows Vista min. SP1 32/64 bit
Windows Server 2003 32*/64 bit*

* No support for G DATA Mobile Device Management for iOS

G DATA Mail Security Mail Gateway
General:
min. 1GB RAM, 1 CPU and 1GB HDD

Supported Operating Systems

Windows Server 2016 64 bit
Windows 10 32/64 bit
Windows 8.1 / Windows 8 32/64 bit
Windows Server 2012 (R2) 64 bit
Windows 7 32/64 bit
Windows Server 2008 (R2) 32/64 bit
Windows Vista min. SP1 32/64 bit
Windows Server 2003 32/64 bit
Windows XP SP3 32 bit
G DATA Administrator / G DATA Web Administrator / G DATA Mail Security Administrator
Supported Operating Systems

Windows Server 2016 64 bit
Windows 10 32/64 bit
Windows 8.1 / Windows 8 32/64 bit
Windows Server 2012 (R2) 64 bit
Windows 7 32/64 bit
Windows Server 2008 (R2) 32/64 bit
Windows Vista min. SP1 32/64 bit
Windows Server 2003 32/64 bit
Windows XP SP3 32 bit
G DATA Security Client (Microsoft Windows)
Supported Operating Systems

Windows Server 2016 64bit
Windows 10 32/64 bit
Windows 8.1 / Windows 8 32/64 bit
Windows Server 2012 (R2) 64 bit
Windows 7 32/64 bit
Windows Server 2008 (R2) 32/64 bit
Windows Vista min. SP1 32/64 bit
Windows Server 2003 32/64 bit
Windows XP SP3 32 bit
G DATA Mail Security for Exchange

Supported Microsoft Exchange Versions:

Microsoft Exchange Server 2016 64 bit
Microsoft Exchange Server 2010 64 bit
Microsoft Exchange Server 2007 min. SP1 64 bit
Microsoft Exchange Server 2013 64 bit

G DATA Security Client (Linux)
Supported Operating Systems

Debian 7 32/64 bit
Debian 8 32/64 bit
Debian 9 32/64 bit
OpenSUSE Leap 42.1 64 bit
OpenSUSE Leap 42.2 64 bit
SLES 11 SP4 32/64 bit
SLES 12 64 bit
RHEL 5.11 32/64 bit
RHEL 6.6 32/64 bit
RHEL 7.0 64 bit
Ubuntu 14.04.1 32/64 bit
Ubuntu 16.04 32/64 bit
CentOS 5.11 32/64 bit
CentOS 6.6 32/64 bit
CentOS 7.0 64 bit
Fedora 24 32/64 bit
Fedora 25 32/64 bit
G DATA Security Client (Mac)
Supported Operating Systems

Mac OS X 10.7 or newer
Mobile
Supported Operating Systems

Android 4.0 or newer
iOS 7 or newer