7
GERMAN# SICHERHEIT YOUR LIFE IS ONLINE. IT SECURITY SOFTWARE SOLUTIONS FOR HOME USERS: NOT JUST SAFE BUT SICHER.

YOUR LIFE IS · 2014. 10. 23. · Behavior monitoring n n n Instant protection when emailing n n n Saves resources n n n Hourly updates n n n 24-hour Service Center n n n Protection

  • Upload
    others

  • View
    30

  • Download
    0

Embed Size (px)

Citation preview

Page 1: YOUR LIFE IS · 2014. 10. 23. · Behavior monitoring n n n Instant protection when emailing n n n Saves resources n n n Hourly updates n n n 24-hour Service Center n n n Protection

GERMAN#SICHERHEIT

YOUR LIFE IS ONLINE.

IT SECURITY SOFTWARE SOLUTIONS FOR HOME USERS: NOT JUST SAFE BUT SICHER.

Page 2: YOUR LIFE IS · 2014. 10. 23. · Behavior monitoring n n n Instant protection when emailing n n n Saves resources n n n Hourly updates n n n 24-hour Service Center n n n Protection

2 3

As more and more of your life is lived online, new opportunities are opening up for cyber-criminals to attack. Unless you are well protected, your money, your privacy and your peace of mind are at risk.

To cyber-criminals, the worldwide shopping and communication plat-form provided by the Internet is a huge source of interest and income. There is also a big trend towards online banking, which can make access to your finances even easier.

Cyber-attacks are increasingly inno-vative and technologically sophisti-cated, and the variety of malware used never ceases to expand, so keeping ahead of the criminals is difficult. Industrial espionage is a favorite activity for cyber-criminals but personal identity theft and other ways exploiting home users are proving to be very profitable too.

Manipulation by cyber-criminals has spread to a growing number

of websites of all types, including those for news, sport, betting and even children’s activities. The theme of the website is no indicator of whether it is likely to be harmless or infected, and one visit to a site is enough to infect your computer, so you are in danger whenever you surf the Internet.

Meanwhile, the growth in use of smartphones to access the Internet has created yet another potential route for the spread of malware.

CYBER-CRIME: IT COULD HAPPEN TO YOU

There are many potential gateways for malware, all of which can be used to launch cyber-attacks:

OPENING THE DOOR TO MALWARE

Route number one: • Websites and the Internet

• Software • USB sticks

• Adware • Captured web servers

• Email • Bluetooth • DNS hijacking

• Attachments • Chat

• Manipulated search results • Instant messaging

MALWARE: THE LIST GROWS

Malware is a general term for ‘mali-cious software’, created to steal information (and money), to gain control of computers for criminal purposes or simply to disrupt computer operations. The long list of malware types, which includes viruses, worms, Trojans (or Trojan horses), spyware and adware, is growing all the time.

Much of the threat today comes from worms and Trojans. A Trojan is a program which looks legitimate but hides malware inside. When the user agrees to run it, the malware is installed. Worms, by contrast, spread infection automa-tically, without any approval from the user.

HOW CAN YOU PROTECT YOURSELF?

With both IT and cyber-crime technology advancing at such a blistering pace, how can you keep up to date, stay safe and maintain your trust in the digital world?

The most important and effective way of defending your web-enabled home computer or laptop is to use security software. As well as virus protection, the software should include a spam filter, firewall and real-time protection against online threats. In addition to this, there are a number of other sensible precautions you can take.

When offered updates to your ope-rating system, software and apps, you should accept them. They will help to close any security holes that criminals might otherwise exploit.

Beware of spam and remove any suspicious email immediately to the digital recycle bin. Never be tempted to open embedded links or file attachments that come with such an email.

For every online account, including social networking and email, set a different password. Make it secure by using non-logical combinations of numbers and both upper and lower case letters.

Back up your important data regularly, so it can be restored after a system crash or infection. Com-prehensive security solutions often contain a backup module.

Teach your children how to use the Internet safely. Access to sites fea-turing drugs, violence and sex can be blocked using parental controls.

When using social networks, do not accept a friend request unless you actually know the person sending it. Beware of short URLs, as they may lead to malware traps, and try to avoid clicking on URLs from strangers. Be careful not to reveal too much about yourself publicly or via your profile - particularly details such as your address and mobile number.

Page 3: YOUR LIFE IS · 2014. 10. 23. · Behavior monitoring n n n Instant protection when emailing n n n Saves resources n n n Hourly updates n n n 24-hour Service Center n n n Protection

4 5

SECURITY SOFTWARE - YOUR BEST DEFENSE

This solution gives essential protec-tion for your PC against malware, and ensures security for your personal data while you bank and shop online. It means, quite simply, that the most common threats need no longer be a worry.

Its latest version includes com-prehensive exploit protection which safeguards your PC against malware that targets and exploits security vulnerabilities in your installed software.

Your best possible protection against cyber-crime and malware is high-quality security software, and for total peace of mind you can step up to the typically German standards of the latest solutions from G DATA.

Easy to install and operate, these products offer excellent perfor-mance and comprehensive protec-tion for computers, laptops, tablets and mobiles operating on Windows, Mac OS and Android platforms.

G DATA security can protect your data and identity from any attack on these devices or on your home ser-ver. The software’s reliable, proven protective mechanisms will defend you against Trojans, worms, back-doors and all other cyber threats.

ANTIVIRUS INTERNET SECURITY TOTAL SECURITY

NEW: CloseGap technology n n n

NEW: AutostartManager n n n

NEW: Intuitive user inter-face

n n n

Secure banking & shop-ping

n n n

Behavior monitoring n n n

Instant protection when emailing

n n n

Saves resources n n n

Hourly updates n n n

24-hour Service Center n n n

Protection against hacking n n

AntiSpam against adver-tising

n n

Parental controls n n

NEW: Device control n

Backup & data safe n

System tuning n

There are optional modules for backing up and for child security, as well as an advanced browser protection function that prevents manipulation during online banking.

G DATA protection runs constantly in the background, without slowing down your operations, so nothing should trouble you.

G DATA ANTIVIRUS

Includes one 12-month license with hourly virus signature updates, software updates, and version upgrades.

System requirements (32 bit / 64 bit): Windows 8.x / 8 / 7 / Vista, at least 1 GB RAM, (32 bit): Windows XP (SP2 or higher), at least 512 MB RAM, optional DVD-ROM drive

*"Best virus detection" in every Stiftung Warentest comparison test from 2005-2014. Tested version: G Data InternetSecurity

BUY IT NOW. Visit www.gdata-software.com and protect yourself today.

For the ultimate in PC security, G DATA TOTAL SECURITY combines every benefit of G DATA ANTIVIRUS and G DATA INTERNET SECURITY but adds

Best protection against viruses and other online risks

Using detection technologies that work in parallel, leaving no opportunity for even the latest threats

Behavior monitoring of files

Offering protection against unknown malware through proactive detection and cloud connection

Instant protection for your email

Scanning incoming messages immediately for malicious attachments and other suspicious content, before they can damage your system

Protection against security vulnerabili-ties in your software

With brand new exploit protection reliably safeguarding your computer against security weaknesses in installed applications -from the text editor to thebrowser plug-in

Secure online bank-ing and shopping

Safeguarding your browser against manipulation and data theft, using patented BankGuard technology and new keylogger protection

First-hand premium support

From our own team, working in close co-operation with the development team at G DATA’s Bochum headquarters to meet your needs directly and quickly.

Page 4: YOUR LIFE IS · 2014. 10. 23. · Behavior monitoring n n n Instant protection when emailing n n n Saves resources n n n Hourly updates n n n 24-hour Service Center n n n Protection

6 7

G DATA INTERNET SECURITY G DATA TOTAL SECURITY

G DATA INTERNET SECURITY brings all the security benefits of G DATA ANTIVIRUS to your PC but also includes:

Online banking and shopping security

still safeguarding your browser against manipulation and data theft, using pat-ented BankGuard technology and new keylogger protection, but now working together with a powerful firewall

Protection against hacking via a secure firewall

monitoring all incoming and outgoing connections for suspicious behavior and reliably protecting you against hackers and attacks on your network

AntiSpam to stop advertisement and phishing emails: not only blocking annoy-ing spam email but automatically removing dangerous phishing links

Protection for your children with age-appropriate surfing

Protection for your children with age-appropriate surfing: using integrated pro-tection to block inappropriate websites and – via time-controlled computer and Internet use – to prevent excessive surfing and gaming.

For the ultimate in PC security, G DATA TOTAL SECURITY combines every benefit of G DATA ANTIVIRUS and G DATA INTERNET SECURITY but adds

Secure backups in the Cloud

a backup module enabling automated backups of your files in the Cloud (via Dropbox or Google Drive, for example) in addition to password-protected local backups

Access control for USB sticks, hard disks and other accessories

allowing definition of who is allowed to use media and devices such as USB sticks, storage cards and burners on your PC

Protection of your data via strong encryption

securing confidential information and files against unauthorized access with a password

Combining the best possible protection against viruses, Trojans and hackers with a reliable firewall, G DATA INTERNET SECURITY will reliably secure your computer and personal data.

It frees you to send emails, use online banking services or simply

surf, safe from all threats on the Internet.

This new version includes com-prehensive exploit protection which safeguards your PC against malware that targets and exploits security vulnerabilities in your installed software.

This complete, worry-free package ensures maximum protection against viruses, Trojans, hacking and – thanks to numerous extras such as encryption of personal data and reliable device control – safety from every other threat. Internet operations and personal data

are totally safeguarded. Security doesn‘t get any better than this!

For the latest version, G DATA has added comprehensive exploit protection which safeguards your PC against malware that targets and exploits security vulnerabilities in your installed software.

Includes one 12-month license with hourly virus signature updates, software updates, and version upgrades.

System requirements (32 bit / 64 bit): Windows 8.x / 8 / 7 / Vista, at least 1 GB RAM, (32 bit): Windows XP (SP2 or higher), at least 512 MB RAM, optional DVD-ROM drive

*"Best virus detection" in every Stiftung Warentest comparison test from 2005-2014. Tested version: G Data InternetSecurity

CloseGap, © 2013-14 G Data Software AG. Microsoft®, Windows®, Windows Vista™, Windows® 8 and Windows® 7 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Includes one 12-month license with hourly virus signature updates, software updates, and version upgrades.

System requirements (32 bit / 64 bit): Windows 8.x / 8 / 7 / Vista, at least 1 GB RAM, (32 bit): Windows XP (SP2 or higher), at least 512 MB RAM, optional DVD-ROM drive

*"Best virus detection" in every Stiftung Warentest comparison test from 2005-2014. Tested version: G Data InternetSecurity

FIND OUT HOW G DATA TOTAL SECURITY CAN WORK FOR YOU. Visit www.gdata-software.com to arrange a free trial.

DON’T BE CAUGHT OUT BY CYBER-CRIMINALS. Call 404 - 965 358 2 today for advice and a customized quote.

Page 5: YOUR LIFE IS · 2014. 10. 23. · Behavior monitoring n n n Instant protection when emailing n n n Saves resources n n n Hourly updates n n n 24-hour Service Center n n n Protection

8 9

G DATA ANTIVIRUS FOR MAC G DATA INTERNET SECURITY FOR ANDROID

Comprehensive security for your Mac and its network

Multiple award-win-ning protection against viruses

covering even those that are no risk to your Mac but which pose a threat to Win-dows PCs in your network

Phishing protection fending off spy attacks on the Internet and protecting your bank and credit card data from spying

Updates and hotline helping protect you against new threats and assisting you in case of problems

Network protection detecting attempts to use your Mac as a gateway to your Windows devices, so your network stays safe

Scheduled scans setting up regular scans, which can be run when you are not using the device, to keep your system permanently free from viruses.

Giving comprehensive and instant protection against viruses, Trojans and other malware, this solution is designed for a Mac running OS X®. Its integrated phishing protection also blocks websites that try to spy on data.

As well as proactively countering Mac viruses, the G DATA product provides additional protection for any Windows PCs connected to your network. Heterogeneous net-works consisting of Windows and Mac devices are often found today in households as well as offices.

This product provides security on the go for Android smartphones or tablets, protecting comprehen-sively against malware, intrusive apps and phishing attacks. It allows you to locate lost devices or to wipe their content remotely to prevent unauthorized access.

The all-new phishing and web protection feature uses latest cloud technology to detect and wipe out even the most current threats. All this is combined in a modern and intuitive interface, so you can stay focused on your real tasks as you move.

Includes a 12-month licence including virus signature updates and software updates.

With service hotline.

System requirements:

Intel Mac with OS X (10.4.6 or above), 1 GB RAM, 200 MB RAM available disk space, min. monitor resolution 1024 x 640.

Mac and OS X are trademarks of Apple Inc., registered in the U.S. and other countries.

Contains a 12-month-license including

regular virus signature updates, software updates, version upgrades and cloud access.

System requirements

Mobile device (smartphone/tablet) run-ning Android OS 2.1 and above, 14 MB free memory

Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions.

KEEPING TABLETS AND SMART-PHONES SECURE

Installing a security solution is impor-tant for smartphones and tablets, just as it is for laptops and computers. A good security app will offer compre-hensive protection against malware and malicious apps.

You should only download apps from trustworthy sources, such as Google Play for Android, and you should con-sider – in view of the authorizations they require – whether you really do need them. Be careful to keep wireless services like WLAN, GPS and Bluetooth deactivated except while you are actu-ally using them. Make sure you acti-vate your device’s password prompt function and replace all standard pass-words with personal ones.

DON’T TAKE RISKS.Call 404 - 965 358 2 for advice or visit www.gdata-software.com to safeguard your devices.

DON’T BE CAUGHT OUT BY CYBER-CRIMINALS. Call 404 - 965 358 2 today for advice and a customized quote.

Comprehensive security for your Android smartphone or tablet

Web and phishing pro-tection

guarding against phishing attacks and websites containing malware, and using state-of-the-art cloud technology to stop even the latest threats

Protection against dan-gerous apps

using app control to check the permission of apps and reveal intrusive spyware

Malware protection tackling the rise of Android malware with the aid of the latest cloud technology, which keeps the software’s Advanced-Scan constantly updated

SMS and call filter preventing spam calls and SMS by adding the sender to a blacklist and blocking whole number ranges, such as premium rate call lines, with wildcards

Protection against theft and loss of device

allowing it to be easily located, locked or wiped via SMS, from any other phone, if lost or stolen

Lock on SIM change preventing use of other SIM cards in your phone and providing notification when the SIM card is replaced

Password-protected apps

blocking unauthorized app launch to reduce costs by, for example, locking video apps or preventing app purchases

Protected contacts moving contacts to a protected area and locking them down with a password so that all related data, messages and call lists are available for your eyes only

Intuitive interface making its functions more user-friendly and allowing instant configuration of features.

Page 6: YOUR LIFE IS · 2014. 10. 23. · Behavior monitoring n n n Instant protection when emailing n n n Saves resources n n n Hourly updates n n n 24-hour Service Center n n n Protection

10 11

As pioneers in the field of antivirus software, we have been developing increasingly effective ways of dealing with digital threats to modern IT devices and systems for over 25 years.

Since its foundation in 1985, G DATA has grown from the brainwave of its two founders into one of the world‘s leading companies in the IT security sector, active in more than 90 countries.

In achieving this, we have never

lost sight of you, our customers. Our software has one primary goal: to give you the peace of mind that comes from comprehensive security, without complicating your life. When we develop new functions, our focus is always on your interests.

Good examples of this include our solutions for secure online banking and shopping, or exploit protection, which effectively safeguard against security vulnerabilities in the soft-ware you use.

When it comes to offering the right solutions, we always think big – whether we are dealing with a home user or a large business. At the same time, we keep our feet firmly on the ground. We still see ourselves as a traditional, mid-size German compa- ny, and we take our responsibilities towards the community very serious ly.

Our development and support team continues to be based in Bochum and we take pride in treating our staff and partners fairly.

ALWAYS THERE FOR YOUIf you have questions concerning any of the products, features and functions we have summarized, please contact our support team any day, at any time. The development and support teams have always worked closely together in Bochum, and with our worldwide partners, to offer you top-quality, first-hand assistance.

THE WINNER - TIME AFTER TIMEG DATA products set the highest security standards globally. In the ‘AV Comparatives’ tests, held twice a year, G DATA has regularly achieved the best virus detection rates of all products compared since 2007.

In comparison tests by ‘Stiftung Warentest’, which have been conducted seven times between 2005 and 2014, G DATA INTERNET SECURITY has consis-tently demonstrated better virus detection than its competitors.

For more information and free trial versions, visit our website at www.gdata-software.com

Call our sales team for tailored advice and a customized offer on 404 - 965 358 2, or contact us at www.gdata-software.com/support.html

To stay on top of security trends and challenges, subscribe to our monthly newsletter on www.germansicherheit.com

WHAT IS THE BEST SOLUTION FOR YOU?

Federal Ministryof Economics andTechnology

Federal Ministryof the Interior

Under the appreciated Patronage of

OCT 2013

APPROVEDCorporateProduct

FOR TRUE ONLINE SAFETY, RELY ON GERMAN SICHERHEIT

Page 7: YOUR LIFE IS · 2014. 10. 23. · Behavior monitoring n n n Instant protection when emailing n n n Saves resources n n n Hourly updates n n n 24-hour Service Center n n n Protection

www.gdata-software.com

G Data Software AG

Königsallee 178 b 44799 Bochum Germany

Contact Phone: 404 - 965 358 2 Email: [email protected]

Orders and technical support Phone: 404 - 965 358 2