Posts Tagged ‘G Data CloseGap’

G Data TotalProtection 2014G Data TotalProtection 2014 – anti-virus protection with hybrid technology G Data CloseGap. Additional features: security settings, backup, secure online banking and device management.

G Data TotalProtection 2014 is a new complex solution for comprehensive protection. Integrated technology CloseGap offers reliable protection against all types of malware and Internet threats.

Active Hybrid protection blocks specific threat and does not slow down your computer, effectively combining proactive, cloud and signature detection methods. (more…)

G Data InternetSecurity 2014G Data InternetSecurity 2014 – comprehensive antivirus with new hybrid technology, G Data CloseGap and automatic protection against network and online threats.

Additional Features: Parental control, secure Internet banking.

G Data InternetSecurity 2014 uses a new technology CloseGap, which provides effective immediate protection from viruses, hacking, spam and other Internet threats.

Active hybrid protection provides effective interaction proactive, cloud and signature-based methods to detect malware and online threats c high speed, and also covers the specific region-specific threats. (more…)

G Data Antivirus 2014 boxG Data AntiVirus 2014: New anti-virus solution

G Data AntiVirus 2014 – with two powerful antivirus engines and hybrid technology G Data CloseGap for effective interaction proactive, cloud and signature-based method to detect malware and online threats.

G Data Antivirus 2014 offers instant protection from online threats, using a combination of different technologies: antivirus engine Bitdefender, maximum security with the latest developments of the company G Data CloseGap and regular hourly updates of virus signatures.

G Data Antivirus 2014 includes an improved component of a secure Internet banking G Data BankGuard effective protection for financial transactions online. Thanks to proactive protection in real time, users will be protected from the latest Internet threats and malicious programs. (more…)