G Data Software EndpointProtection Business review

G Data Software is new to the UK and heralds its entry with its latest endpoint security software. It looks very good value but how well does it perform? We review it to find out.

We weren't impressed with the reporting facilities as these are minimal. The only time EPB logs an attempt to access a blocked web site, device or application is if the user requests access to it from the client's pop up warning window and if not then nothing is reported.

G Data advised us it chose this method due to the regulations imposed in Germany. However, we would want to see what internet resources users are accessing during working hours and those who are persistently trying to use removable media.

Commtouch didn't disappoint during our anti-spam tests with it delivering a near clean sheet. We asked for suspect and confirmed spam to have their subject lines tagged and left our clients downloading live email from multiple accounts for a few days.

At the end of the test we saw Commtouch catch all spam with very few genuine messages being erroneously classed as suspect. The only black mark is EPB provides no reporting on spam activity whatsoever and if you want this you'll have to get the Enterprise version which includes G Data's MailSecurity product.

For the price, EndpointProtection Business offers a good range of security measures. G Data has some high profile names providing the main functions which performed extremely well but look elsewhere if you want detailed reporting on all user activities.

Verdict

G Data delivers highly cost effective endpoint protection with a class act on its guest list. Anti-spam, web filtering and anti-virus measures perform very well and the product is easy to deploy and manage but the minimal reporting is a big weakness.

Requirements Server: Windows XP upwards; Client agent: Windows 2000 upwards.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Most Popular

How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
What is the Raspberry Pi Pico?
Hardware

What is the Raspberry Pi Pico?

21 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021