G Data Software EndpointProtection Business review

G Data Software is new to the UK and heralds its entry with its latest endpoint security software. It looks very good value but how well does it perform? We review it to find out.

Protection can start straight away as all new clients are placed in a root group with a default policy to determine what each component will do. This can be fine-tuned by creating new groups with their own security policy and moving selected systems into them where they will take on the new instructions.

Advertisement - Article continues below

The main window in the EPB console provides a row of tabbed folders where you view the status of groups and clients, configure policies and run on demand or scheduled anti-virus scans. If you wish, you can allow users to access specific functions of the local client, change its settings or run their own scans.

During general daily usage we found the client's dual scanning engines had a negligible hit on resources with the Windows Task Manager showing very low or zero CPU usage. Full systems scans were a different matter as even on a dual 3GHz X5560 Xeon system we saw CPU usage hovering between 20-25 per cent.

There are ways of reducing this impact as you can set the client to use a single scanning engine and only allow systems scans to be run by administrators from the EPB console. The other obvious option is to schedule full system scans for outside normal working hours.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Device control options are provided for floppy disks, optical media, removable storage and cameras. Compared with products such as DeviceLock these are fairly basic but you can block users from each category, allow read only or read/write access and enforce device white lists.

The RuleSpace web filtering service provides over 60 URL categories to block or allow and performed very well during testing. We blocked games, gambling and social networking and found our test clients were unable to access any sites under these categories.

Featured Resources

How inkjet can transform your business

Get more out of your business by investing in the right printing technology

Download now

Journey to a modern workplace with Office 365: which tools and when?

A guide to how Office 365 builds a modern workplace

Download now

Modernise and transform your sales organisation

Learn how a modernised sales process can drive your business

Download now

Your guide to managing cloud transformation risk

Realise the benefits. Mitigate the risks

Download now

Most Popular

Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
Security

The top ten password-cracking techniques used by hackers

10 Feb 2020
Visit/operating-systems/microsoft-windows/354739/windows-7-bug-blocks-users-from-shutting-down-their-pcs
Microsoft Windows

Windows 7 bug blocks users from shutting down their PCs

10 Feb 2020
Visit/hardware/354723/coronavirus-starts-to-take-its-toll-on-the-tech-industry
Hardware

Coronavirus starts to take its toll on the tech industry

6 Feb 2020