Uncompromising high-performance protection for your data

Protection for

1 year

2 years

Additional savings when extending the term
All prices include VAT
  • 30-day
    money back guarantee
  • 24/7
    customer support
  • Software and support
    "Made in Germany"


Best G DATA protection for Windows: Our brand new DeepRay® and BEAST technologies use artificial intelligence and behavioral analysis to detect camouflaged and previously unknown malware.


Our Next-Generation-Technologies already recognize by the behavior of programs whether they are planning an attack. So you are always one step ahead of hackers.


Whether it's attacks by ransom blackmailers, security breaches or online banking, you're safe. A good feeling, isn't it?

The protective shield for your PC

Virus scanner

Put your trust in the highest detection rates with technologies working in parallel.

How it works 

Behavior monitoring

Protect yourself against even unknown malware. G DATA Antivirus detects this from its conspicuous behaviour.

Information on behaviour analysis 

Email scanning

Scans incoming email and attachments for suspicious content. Dangers are detected before anything has happened.

Exploit protection

Protects your computer against criminals exploiting security holes in Office applications and PDF readers, for example.

How Exploit Protection works 

G DATA BankGuard

Our patented technology secures your browser against manipulation by data thieves – for secure online banking and shopping.


No opportunity for extortion Trojans – we stop criminals encrypting your files.

More about our technology 

USB Keyboard Guard

Protects you against manipulated USB devices that pretend to be keyboards, even though they look like USB sticks or external hard drives.

Update Management

Specify when and where your PC loads updates. This helps you avoid additional costs, by logging into a third-party WLAN for example.


from 29.95 $


from 39.95 $

more info

from 49.95 $

more info
Protection against online blackmailers and other Internet criminals
Full PC performance with maximum security
Hourly updates for maximum protection
Multiple award-winning protection against viruses and other malware
Online banking and shopping protection
No more advertising e-mails and harmful links and attachments
Protection against security vulnerabilities in programs
Automatic inspection of USB sticks
English hotline at local rates 24 hours / 365 days
Additional protection for macOS, Android and iOS devices
Powerful firewall against hacker attacks
Keep an eye on your children's PC usage
Automatic data backup in a cloud
Encrypt backup copies and store them locally or externally
Never forget a password again thanks to Password Manager
Access control blocks unauthorized devices

from 29.95 $

from 39.95 $

more info

from 49.95 $

more info

The intelligent technologies behind Antivirus

Sophisticated virus scanner

Virus scanners work with signatures. Antivirus experts use these to determine the characteristics of each new malware strain. The scanner can use such a signature to categorise files on your computer as malicious.
At the core of all G DATA solutions for Windows computers is our CloseGap technology. Two scan engines work together in perfect harmony to guarantee maximum security.
On average, the experts at G DATA SecurityLabs record a new malicious code variant every 0 seconds. (Source: G DATA PC Malware Report H1/2018)
 Together they scan your system for widely distributed malware and dig up new or localised threats. The intelligent technologies complement each other and work exactly where they are needed – without impairing the speed of your PC.

Is a file behaving suspiciously?

Not all malware distributed by cyber criminals is known to antivirus providers. We work with proactive technologies so these can be found as well. Our Behaviour Blocker detects malware from its behaviour.
“Users are only comprehensively protected with proactive technologies.” (Source: G DATA PC Malware Report H1/2018)
What happens after you have double-clicked a file? Are unwanted processes launched in the background? Our behaviour analysis stops unnoticed downloads, for example, before they pose a risk.

Security holes as gateways

Besides phishing sites, the majority of attacks from the Internet take place via drive-by infections. Primed websites first spy on the computer’s configuration for attackable applications, such as add-ons in your browser. If a suitable hole is discovered, a matching exploit is sent to the computer. As with personalised advertising, this is precisely tailored. The malicious code exploits the security hole so it can download and execute additional malware in the future – ransomware or banking Trojans, for example.
What does G DATA do about this?

We offer protection against exploits via internally developed technology. The main thing to understand is that numerous small processes run consecutively in a program. Each process reacts to the one before, and so on.
“Adobe's Flash plugin is known to be a chronic security problem.”(Source: G DATA PC Malware Report H1/2018)
 Exploits are data that provoke erroneous reactions in this sequence. The program then runs differently than it actually should do. To detect this, Exploit Protection runs memory tests and checks the runtimes of the individual program sequences. This means it can safeguard your computer from even previously unknown exploits.

No opportunity for extortion Trojans

Ransomware is a type of malware – so virus scanners and behaviour monitoring can detect and stop it. We have developed a completely new process to respond even more specifically to the activities of ransomware. G DATA Anti-Ransomware is a proactive technology – encryption Trojans are detected in good time on the basis of features that are typical of malware of this kind.
For example, switching off operating system backups, encrypting a conspicuously large number of files in a short time or changing file extensions (e.g. .docx into .locky).
Every second Internet user is afraid of Ransomware.
 Such processes are stopped immediately, so your pictures, videos, documents and emails cannot be encrypted.

Security in online banking

G DATA Antivirus also offers efficient protection for your online banking: our patented technology protects your browser against banking Trojans who want to manipulate money transfers, for example.
0 %of all Internet users surveyed consider online banking to be rather dangerous.– Statista 2018
BankGuard detects possible manipulations and replaces them with the original. The virus protection then identifies and deletes the malware.


System requirements

  • Microsoft Windows 11 / 10 / 8.1 / 7 (SP1): min. 2 GB of RAM, CPU with x86- or x64-architecture
  • All of the functions in the G DATA solutions are supported on 32 and 64 bit systems
  • An Internet connection is required to install the software and for virus signature and software updates

Do you want even more security?


Surf securely on all of your devices? No problem with G DATA Internet Security. In addition to the best G DATA protection for Windows, Mac, Android and iOS you can take advantage of other practical features such as:


  • a strong firewall to protect against hacker attacks
  • parental controls to restrict content when children use the PC
  • automatic backup in the cloud


 More about G DATA Internet Security