G Data Software EndpointProtection Business review

G Data Software is new to the UK and heralds its entry with its latest endpoint security software. It looks very good value but how well does it perform? We review it to find out.

Price
£3,150

Despite the large number of established names already in the UK data security market, German company G Data Software thinks there's room for one more. For the past 25 years it has focused primarily on personal and business anti-virus solutions but it now makes the move into endpoint security.

On review we have its new EndpointProtection Business (EPB) software which, naturally, offers G Data's anti-virus measures but partners this with removable device and application controls. There's much more as you also get a client firewall, web content filtering, internet access management and even anti-spam.

G Data hasn't developed its own anti-virus solution but partners with a range of well known names in this field. EPB offers dual scanning engines which come courtesy of Bitdefender and Avast! so viruses will have a tough time.

Web filtering is handled by RuleSpace whilst spam gets put through the grinder by Commtouch. The latter is a very good choice as we've found it delivers excellent scores when testing other products that use this service.

Advertisement
Advertisement - Article continues below

The EPB environment consists of a central server, a management console and client agents for Windows 2000 and upwards. The server component can also run on systems running Windows XP and onwards and you also get a useful web browser console.

Installation and deployment on a Windows Server 2008 R2 system proved to be simple and the routine offers to load the server and the console. If you're using EPB in response to a virus outbreak you can create a bootable disk which provides local scanning tools to check and clean systems prior to loading EPB on them.

For client testing we used a selection of PCs and VMware VMs to present Windows XP, Vista and 7 to EPB. On first contact with the console it runs a network discovery, places all systems in its left pane ready to receive the client and assigns icons to identify workstation and server OSes.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/business-strategy/mergers-and-acquisitions/354191/xerox-threatens-hostile-takeover-after-hp-rebuffs
mergers and acquisitions

Xerox threatens hostile takeover after HP rebuffs $30bn takeover

22 Nov 2019
Visit/security/data-breaches/354192/t-mobile-data-breach-affects-more-than-a-million-users
data breaches

T-Mobile data breach affects more than a million users

25 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019
Visit/business-strategy/it-infrastructure/354188/tsb-payment-delays-suggest-second-it-meltdown
IT infrastructure

TSB payment delays suggest second IT meltdown

22 Nov 2019