G Data Software EndpointProtection Business review

G Data Software is new to the UK and heralds its entry with its latest endpoint security software. It looks very good value but how well does it perform? We review it to find out.

Price
£3,150

Despite the large number of established names already in the UK data security market, German company G Data Software thinks there's room for one more. For the past 25 years it has focused primarily on personal and business anti-virus solutions but it now makes the move into endpoint security.

On review we have its new EndpointProtection Business (EPB) software which, naturally, offers G Data's anti-virus measures but partners this with removable device and application controls. There's much more as you also get a client firewall, web content filtering, internet access management and even anti-spam.

G Data hasn't developed its own anti-virus solution but partners with a range of well known names in this field. EPB offers dual scanning engines which come courtesy of Bitdefender and Avast! so viruses will have a tough time.

Web filtering is handled by RuleSpace whilst spam gets put through the grinder by Commtouch. The latter is a very good choice as we've found it delivers excellent scores when testing other products that use this service.

The EPB environment consists of a central server, a management console and client agents for Windows 2000 and upwards. The server component can also run on systems running Windows XP and onwards and you also get a useful web browser console.

Installation and deployment on a Windows Server 2008 R2 system proved to be simple and the routine offers to load the server and the console. If you're using EPB in response to a virus outbreak you can create a bootable disk which provides local scanning tools to check and clean systems prior to loading EPB on them.

For client testing we used a selection of PCs and VMware VMs to present Windows XP, Vista and 7 to EPB. On first contact with the console it runs a network discovery, places all systems in its left pane ready to receive the client and assigns icons to identify workstation and server OSes.

Featured Resources

Four cyber security essentials that your board of directors wants to know

The insights to help you deliver what they need

Download now

Data: A resource much too valuable to leave unprotected

Protect your data to protect your company

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

Most Popular

macOS Big Sur is bricking some older MacBooks
operating systems

macOS Big Sur is bricking some older MacBooks

16 Nov 2020
46 million Animal Jam accounts leaked after comms software breach
Security

46 million Animal Jam accounts leaked after comms software breach

13 Nov 2020
How computing has revolutionised Formula 1
Sponsored

How computing has revolutionised Formula 1

11 Nov 2020