G DATA is a 30 year pioneer of IT security solutions.  G DATA provides high quality, comprehensive and cost-effective solutions for companies of all sizes.


Always there for you
G DATA customer support is available 24/7/365, with support teams and the G DATA SecurityLab working hand-in-hand at the same location

Independent tests prove
that G DATA IT security solutions provide best attack detection rates for effectively combating Trojans, malware and even unknown viruses

30 years of experience working for you
G DATA developed the world’s first antivirus software, and we have remained pioneers in innovation for IT security ever since

Award-winning innovation
G DATA won the IPACSO EU Research Institute award as the “Most innovative Cyber Security Company” in 2014

IT Security made in Germany
A dedicated team of IT security experts monitor new cyber threats worldwide and develop solutions to proactively fight cyber crime

G DATA Endpoint Protecion protects you in various ways: maximum security through active hybrid protection using CloseGap technology, and the best reaction times to current threats. The optional PatchManagement module integrates perfectly into any company-specific update policy. The new AntiSpam function in the Exchange plug-in, support for additional Linux distributions and protection against malicious USB devices bythe integrated USB Keyboard Guard now offer even more security for your company.

Comprehensive Protection

G DATA Endpoint Protection can be readily deployed in companies of any size that need to manage complex network topologies or simply do not wish to compromise on network security. Along with antivirus, firewall and antispam modules, this extensive IT security solution provides sophisticated functions for managing group policies – for example for controlling how programs and devices are used.

  • Antivirus with CloseGap
  • BankGuard
  • Behavior Blocker
  • Antispam and antivirus protection
  • Firewall
  • Policy Management
Policy Management

The integrated PolicyManager is a cost-efficient way to enforce corporate policies. With the clear overview provided by Group Policy Deployment, you can secure the most vulnerable targets for malware attack – such as USB sticks, websites and unknown applications – and set time limits for using the Internet so as to raise productivity.

  • Device Management
  • Application Management
  • Browsing filter
  • Web use control
The integrated firewall in G DATA Client Security works inconspicuously in the background, and is the perfect extension to antivirus protection. Your entire network enjoys optimal protection against hacker attacks, enabling you to enforce your corporate and communications policies.


  • Central management
  • Works inconspicuously in the background
  • Onsite/offsite rule set
  • Easy-to-understand reporting
Simple Administration

The G DATA Administrator is part of every G DATA security solution.  Using an intuitive design, it gives IT administrators a smart, quick way to deploy the software to clients and to configure and monitor the entire network. This makes it easy to manage and apply group policies without having to deal with each client individually.

  • Report Manager
  • Simplified installation overview
  • Remote management
  • Active Directory connection
  • Mobile Device Management
  • Software and hardware inventory
Simple Deployment
No matter the number of locations that you have, the G DATA Client can be easily deployed through the G DATA Administrator.  It doesn’t matter how complex your network might be, every G DATA security solution can be deployed to clients across the network, and thanks to the Active Directory connection, you can apply existing rules and policies with ease, even when your network is highly heterogeneous.You can also manage multiple locations easily using the built in Subnet Server capability, which allows local systems to update from a local server, while still being centrally managed from the main location’s Management Server.
Mobile Device Management

G DATA Security Solutions equip you for the challenges of BYOD (Bring Your Own Device) scenarios. With fully integrated Mobile Device Management (MDM), IT administrators can centrally manage Android and iOS devices.  Depending on the mobile operating system, you can equip devices with mobile antivirus and antitheft safeguards, blacklist undesirable apps – and much more.

System Requirements
G DATA Client (32/64 Bit)

  • Windows 8.1, 8, 7, Vista XP for 32-bit only
  • Server 2003, 2008/R2 or 2012/R2
  • At least 1 GB RAM (4 GB Recommended)
G DATA ManagementServer (32/64Bit)

  • Windows 8.1, 8, 7, Vista XP for 32-bit only
  • Server 2003, 2008/R2 or 2012/R2
  • At least 1 GB RAM (4 GB Recommended)

An Internet connection is required for signature & software updates

Patch Management

The optional PatchManagement module makes it easy to keep the software installed on your clients up to date at all times. It’s the smart, efficient way to prevent attacks in Windows and third-party software.

Mail Security + Client Backup

Additional security for your vital business data and e-mail with mail server protection that can be installed as a proxy scanner or Exchange plugin and a client backup system that can perform regular, automated backups of your network’s systems.

Ready to get started?

You can download the installation software for the G DATA Endpoint Protection while you wait for your trial key.

Information Sheet

Need Pricing?

Have questions?

Our dedicated account manager team is always ready to help you with any questions that you might have.

Call (239) 649-7836 or you can send us an email.

Contronex is a 25 year distribution partner for world-class IT security solutions manufacturers. Integrity, reliability and commitment to service are our key attributes.  Our team provides value to our customers with highly trained specialists and responsive service professionals.  Contact us today to discuss how we can safeguard your data.