G Data Software EndpointProtection Business review
G Data Software is new to the UK and heralds its entry with its latest endpoint security software. It looks very good value but how well does it perform? We review it to find out.
Despite the large number of established names already in the UK data security market, German company G Data Software thinks there's room for one more. For the past 25 years it has focused primarily on personal and business anti-virus solutions but it now makes the move into endpoint security.
On review we have its new EndpointProtection Business (EPB) software which, naturally, offers G Data's anti-virus measures but partners this with removable device and application controls. There's much more as you also get a client firewall, web content filtering, internet access management and even anti-spam.
G Data hasn't developed its own anti-virus solution but partners with a range of well known names in this field. EPB offers dual scanning engines which come courtesy of Bitdefender and Avast! so viruses will have a tough time.
Web filtering is handled by RuleSpace whilst spam gets put through the grinder by Commtouch. The latter is a very good choice as we've found it delivers excellent scores when testing other products that use this service.
The EPB environment consists of a central server, a management console and client agents for Windows 2000 and upwards. The server component can also run on systems running Windows XP and onwards and you also get a useful web browser console.
Installation and deployment on a Windows Server 2008 R2 system proved to be simple and the routine offers to load the server and the console. If you're using EPB in response to a virus outbreak you can create a bootable disk which provides local scanning tools to check and clean systems prior to loading EPB on them.
For client testing we used a selection of PCs and VMware VMs to present Windows XP, Vista and 7 to EPB. On first contact with the console it runs a network discovery, places all systems in its left pane ready to receive the client and assigns icons to identify workstation and server OSes.
In This Article
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now