Prices incl. VAT
- Manufacturer: G Data
- Item no.: 100289-UK
- Status: New
- Run time: 1 year
- Language: All languages
Product information "G Data Internet Security 2017"
Protected by G DATA Internet Security 2017
Our scanner unerringly detects ransomware and stops the encryption. Due to our award-winning antivirus scanner and the proactive behavior monitoring malware stands no chance.
Safe transactions on the Internet
Our browser protection blocks manipulated websites. Thereby, it protects you from fraud - while you are securely shopping online or doing online banking. Our BankGuard technology provides extra safety.
Backup all your files
Save essential files and memories encrypted in the cloud. If you wish, G DATA Internet Security 2017 starts the backup process completely automatized.
The most important features in G DATA Internet Security 2017:
- Firewall: Monitors all incoming and outgoing connections to protect against hackers and spyware – fully automatically or according to your own rules.
- NEW! Cloud backups: Automatically store your encrypted backups in the Cloud – using Dropbox or Google Drive.
- NEW! Anti-Ransomware: No opportunity for extortion Trojans: Internet Security stops criminals encrypting your files.
- G DATA BankGuard: Our patented technology secures your browser against manipulation by data thieves – for secure online banking and shopping.
- Anti-Spam: Stops spam such as advertising and phishing emails and keeps your mailbox clean.
- Parental controls: Control your children’s Internet usage. Specify times and only let your children surf to approved sites.
- Virus scanner: Put your trust in the highest detection rates with technologies working in parallel. Receive new virus signatures every hour, for the best protection against malware.
- Exploit Protection: Protects your computer against criminals exploiting security holes in Office applications and PDF readers, for example.
How we protect you as you move around the web
When banking and shopping online
The connection between your bank and your computer is usually encrypted. Decryption of the data transfer takes place in your browser. Cyber criminals use banking Trojans to infiltrate this process. As soon as you carry out a transfer, the attackers manipulate the data being sent. Your money no longer goes to the intended recipient, such as an online shop, but ends up in a different account.
Of course, our virus scanner detects banking Trojans on the basis of their characteristics. If the malware already has its own signature, G DATA Internet Security 2017 renders the malware harmless while it is being downloaded. Our BankGuard technology also protects you against dangers that are still unknown. The function ensures that your browser only displays checked, genuine content.
How does BankGuard do this?
Manipulations by banking Trojans take place in specific files in the random access memory. G DATA BankGuard automatically detects attempted infections and replaces the affected memory area with a safe copy.
While you send and receive emails
Besides the files on your hard drive and on external storage devices, our virus scanner also checks your emails for malicious content. This applies to all messages you send and receive via the email program on your computer. If the scanner finds nothing, our Anti-Spam function is also activated. The application checks the email for features that are typical of spam. These characteristics are used to calculate a value reflecting the likelihood of it being spam.
In addition to the separate evaluation, the OutbreakShield technology compares the results to a database on the Internet – patterns of viruses and spam emails sent en masse are collated here. This enables Internet Security to close the gap that exists between the start of a mass mailing and the fight against it in real time, using specially adapted signatures.
The virus monitor checks every file that comes from the web. It stops infected documents, images and the like while they are being downloaded. This means that unnoticed downloads no longer pose a threat to you. When doing so, G DATA Internet Security 2017 not only relies on hourly updated virus signatures. Besides the signature scan, the software works with a Cloud solution. The properties of current files that contain malware are stored in this online memory. These properties are compared with those in your files – and you quickly find out if everything is OK.
Web addresses are also collated in the Cloud. If a URL is identified in the database as a distributor of malicious content, our browser protection blocks the site. So when cyber criminals try to lure you into traps using phishing links, you have nothing to fear. This also applies to attacks via social networks. Links in fake posts and adverts are not opened in the browser.
Regardless of the Cloud, our web protection checks every file sent to your computer to access a website. This enables dangerous content to be detected before you open the page.
G Data Internet Security 2017 - System requirements
|Required operating system||
2 GB RAM
All G DATA features and solutions are supported on 32 and 64 bit systems.
An internet connection is needed for installing the software, and as well for virus signature and software updates.
Unfortunately, we have not yet received any reviews for this product.
Simply buy software at Lizengo!
Secure purchase through SSL encryption.
You can download your software immediately after purchase.
Install and activate the software.
If you have any questions, please contact us.
How is our price put together?
Software licences are created and handed over for the manufacture of computers and systems, for retail trade or for industrial equipment. Lizengo purchases, from many distributors, large quantities of new software licences that are either unused or have not been installed.
Through this type of purchasing, the omission of delivery and storage fees due to the virtual delivery channel, as well as the relevant personnel involved, we are able to make and pass on such reasonable prices.
Lizengo stands for the purchasing of new software licences in a reliable and proper manner.