You’re likely to suffer personal and financial damage if criminal hackers gain access to your data and devices. Your private bank, e-mail, and social media accounts can be hacked and your money, private data, and identity stolen.
Advertisers have a vested interest in learning more about your online behavior. Large digital corporations exploit this and earn a lot of money by selling the data you willingly disclose while you are online, for example by using a certain web browser.
State institutions and intelligence agencies are very interested in monitoring even ordinary people. If they invade too much of your privacy, your data may end up being misused in ways you can’t control.
of respondents say that a third-party has accessed one of their online accounts within the last 12 months (2020, sources: BSI, ProPK).
You can use G DATA VPN on up to 10 devices of your choice (Windows, macOS, Android, iOS) with just one license.
Europe (535 Locations)
Nordamerika (1.242 Locations)
Asien (79 Locations)
Ozeanien (73 Locations)
Südamerika (26 Locations)
Afrika (6 Locations)
If you already own a G DATA product:
If you own a valid G DATA product, you will receive a 50-percent discount on G DATA VPN. Log into My G DATA and add your VPN license to your subscription using the “VPN” button. The term is the same as that of your existing G DATA product.
Important: If the remaining term of your main G DATA product is less than one month, you will need to extend it by a further 12 months before you can add VPN.
If you don’t already own a G DATA product:
If you opt for a G DATA antivirus solution (Antivirus PC, Antivirus Mac, Internet Security, Total Security), you can add the VPN with just one click. The bundle includes a 50-percent discount on our VPN software.
The encryption is based on 256-bit AES encryption (available protocols depending on the client: IKEv2protocol, OpenVPN, IPSec). This means it corresponds to the highest possible encryption level and is considered fully secure and invulnerable to attack. Organizations that use this type of encryption include U.S. government agencies, which use it to encrypt top secret files and documents.