Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Battlefield
Software Comparison
GData Internet Security vs GData Total Security
Message
<blockquote data-quote="Trident" data-source="post: 1039907" data-attributes="member: 99014"><p>Yes, GData, apart from Bitdefender claims to be using the following:</p><p>[SPOILER="Cloud"]</p><p>The Cloud SDK gives you unique access to our comprehensive malware databases, continuously updated by our analysis systems. You can use the Cloud SDK to query the latest threats or current malware in real time by querying sha256 hash sums or URLs.</p><p></p><h4>Features:</h4> <ul> <li data-xf-list-type="ul">Easy access to in-depth analysis results and extensive databases</li> <li data-xf-list-type="ul">Real-time protection</li> </ul><p>[/SPOILER]</p><p>[SPOILER="DeepRay"]</p><p>Our DeepRay® technology changes the rules of the game by reliably detecting even packaged malware. Supported by machine learning, DeepRay® works particularly effectively to detect potentially harmful or suspicious artifacts in process memory. In this way, DeepRay® can detect even the most sophisticated malware threats, such as “living off the land” attacks.</p><p></p><h4>Features:</h4> <ul> <li data-xf-list-type="ul">Advanced in-memory analysis heuristics</li> <li data-xf-list-type="ul">IOC in-memory scanning (Yara)</li> <li data-xf-list-type="ul">Custom rules (Yara)</li> <li data-xf-list-type="ul">Particularly resource-efficient thanks to machine learning support</li> </ul><p>[/SPOILER]</p><p>[SPOILER="BEAST"]</p><p>BEAST protects you from new and previously unknown malicious software. Unlike traditional behavioral analyses, BEAST records all system behavior in a graph, and therefore provides a holistic view. This allows BEAST to accurately detect malicious processes and stop them immediately. BEAST perfectly complements existing systems and helps them by easily remediating the complete infection chain through powerful graph analysis.</p><p></p><h4>Features:</h4> <ul> <li data-xf-list-type="ul">Holistic behavior detection</li> <li data-xf-list-type="ul">Behavior graph allows detection of new previously unknown malware</li> <li data-xf-list-type="ul">Easily remediate the complete infection chain through powerful graph analysis</li> </ul><p>[/SPOILER]</p><p>[SPOILER="Anti-Malware Next Gen"]</p><p>Use our Anti-malware Next-gen SDK to detect known and unknown malware without a signature with machine learning technologies. Efficient feature extraction and classification optimized for current CPUs make our technology extremely fast and lightweight.</p><p></p><h4>Features:</h4> <ul> <li data-xf-list-type="ul">Malware detection with machine learning and without signatures</li> <li data-xf-list-type="ul">Fast and lightweight classification</li> <li data-xf-list-type="ul">Cross-platform (Windows, Linux, macOS)</li> </ul><p>[/SPOILER]</p><p>[SPOILER="Anti-Ransomware"]</p><p>Ransomware is one of the most aggressive forms of malware that encrypts and/or destroys valuable customer data. Small and medium-sized businesses are often infected by targeted attacks where the ransomware used is specifically designed for the attacked target. Our anti-ransomware technology is a detection system for file system anomalies that detects suspicious behavior and stops and removes ransomware as soon as it interacts with the file system.</p><p></p><h4>Features:</h4> <ul> <li data-xf-list-type="ul">Proactive protection against ransomware</li> <li data-xf-list-type="ul">File system anomaly detection</li> </ul><p>[/SPOILER]</p><p>[SPOILER="AMSI"]</p><p>Malicious Office VBA macros are one of the major infection routes for malware. For this reason, it is particularly important to have protection in this area. Our AMSI SDK helps strengthen your security solution against threats from Office VBA macros, Powershell, VBScript, or JavaScript in a particularly easy way.</p><p></p><h4>Features:</h4> <ul> <li data-xf-list-type="ul">Easy connectivity to protect against malicious Office VBA macros</li> <li data-xf-list-type="ul">Easy connectivity to protect against malicious scripts such as Powershell, VBScript, or JavaScript</li> </ul><p>[/SPOILER]</p><p>[SPOILER="Tamper Protection"]</p><p>You can secure the integrity of your system with our tamper protection. Our technology instantly detects and removes malicious changes on your system’s memory, therefore protecting it against highly dangerous threats such as user mode rootkits.</p><p></p><h4>Features:</h4> <ul> <li data-xf-list-type="ul">Protect against user mode rootkits</li> <li data-xf-list-type="ul">Monitor system integrity</li> </ul><p>[/SPOILER]</p><p>[SPOILER="Browser-Protection"]</p><p>Patented BankGuard technology detects and removes malicious memory modifications in browsers to protect banking and other financial activities from man-in-the-browser attacks.</p><p></p><h4>Features:</h4> <ul> <li data-xf-list-type="ul">Protect against man-in-the-browser attacks</li> <li data-xf-list-type="ul">Patented BankGuard technology</li> </ul><p>[/SPOILER]</p><p>[SPOILER="Exploit Protection"]</p><p>Thanks to our ExploitProtection, you can protect yourself from unknown zero-day – or unpatched day one exploits. Attackers still regularly discover new vulnerabilities and exploit them to infect systems.</p><p></p><h4>Features:</h4> <ul> <li data-xf-list-type="ul">Protect against infection through security vulnerabilities</li> <li data-xf-list-type="ul">Prevent the execution of exploits</li> </ul><p>[/SPOILER]</p><p>Source: G Data Official Website for OEM (frequently you can learn a lot by looking at what they offer to OEMs, for home users they won’t provide detailed explanations).</p><p>[URL unfurl="true"]https://www.gdatasoftware.com/oem/anti-malware-sdks[/URL]</p><p></p><p>But then Bitdefender provides all these modules as well. Bitdefender offers more modern experience, features such as Bitdefender Central and others.</p><p>G Data’s outdated approach runs from the website (like trying to find a changelog) all the way to every corner of the software.</p><p></p><p>Bugs have been reported around the web for both.</p><p>Bitdefender is normally quite quick to provide the relevant fixes.</p></blockquote><p></p>
[QUOTE="Trident, post: 1039907, member: 99014"] Yes, GData, apart from Bitdefender claims to be using the following: [SPOILER="Cloud"] The Cloud SDK gives you unique access to our comprehensive malware databases, continuously updated by our analysis systems. You can use the Cloud SDK to query the latest threats or current malware in real time by querying sha256 hash sums or URLs. [HEADING=3]Features:[/HEADING] [LIST] [*]Easy access to in-depth analysis results and extensive databases [*]Real-time protection [/LIST] [/SPOILER] [SPOILER="DeepRay"] Our DeepRay® technology changes the rules of the game by reliably detecting even packaged malware. Supported by machine learning, DeepRay® works particularly effectively to detect potentially harmful or suspicious artifacts in process memory. In this way, DeepRay® can detect even the most sophisticated malware threats, such as “living off the land” attacks. [HEADING=3]Features:[/HEADING] [LIST] [*]Advanced in-memory analysis heuristics [*]IOC in-memory scanning (Yara) [*]Custom rules (Yara) [*]Particularly resource-efficient thanks to machine learning support [/LIST] [/SPOILER] [SPOILER="BEAST"] BEAST protects you from new and previously unknown malicious software. Unlike traditional behavioral analyses, BEAST records all system behavior in a graph, and therefore provides a holistic view. This allows BEAST to accurately detect malicious processes and stop them immediately. BEAST perfectly complements existing systems and helps them by easily remediating the complete infection chain through powerful graph analysis. [HEADING=3]Features:[/HEADING] [LIST] [*]Holistic behavior detection [*]Behavior graph allows detection of new previously unknown malware [*]Easily remediate the complete infection chain through powerful graph analysis [/LIST] [/SPOILER] [SPOILER="Anti-Malware Next Gen"] Use our Anti-malware Next-gen SDK to detect known and unknown malware without a signature with machine learning technologies. Efficient feature extraction and classification optimized for current CPUs make our technology extremely fast and lightweight. [HEADING=3]Features:[/HEADING] [LIST] [*]Malware detection with machine learning and without signatures [*]Fast and lightweight classification [*]Cross-platform (Windows, Linux, macOS) [/LIST] [/SPOILER] [SPOILER="Anti-Ransomware"] Ransomware is one of the most aggressive forms of malware that encrypts and/or destroys valuable customer data. Small and medium-sized businesses are often infected by targeted attacks where the ransomware used is specifically designed for the attacked target. Our anti-ransomware technology is a detection system for file system anomalies that detects suspicious behavior and stops and removes ransomware as soon as it interacts with the file system. [HEADING=3]Features:[/HEADING] [LIST] [*]Proactive protection against ransomware [*]File system anomaly detection [/LIST] [/SPOILER] [SPOILER="AMSI"] Malicious Office VBA macros are one of the major infection routes for malware. For this reason, it is particularly important to have protection in this area. Our AMSI SDK helps strengthen your security solution against threats from Office VBA macros, Powershell, VBScript, or JavaScript in a particularly easy way. [HEADING=3]Features:[/HEADING] [LIST] [*]Easy connectivity to protect against malicious Office VBA macros [*]Easy connectivity to protect against malicious scripts such as Powershell, VBScript, or JavaScript [/LIST] [/SPOILER] [SPOILER="Tamper Protection"] You can secure the integrity of your system with our tamper protection. Our technology instantly detects and removes malicious changes on your system’s memory, therefore protecting it against highly dangerous threats such as user mode rootkits. [HEADING=3]Features:[/HEADING] [LIST] [*]Protect against user mode rootkits [*]Monitor system integrity [/LIST] [/SPOILER] [SPOILER="Browser-Protection"] Patented BankGuard technology detects and removes malicious memory modifications in browsers to protect banking and other financial activities from man-in-the-browser attacks. [HEADING=3]Features:[/HEADING] [LIST] [*]Protect against man-in-the-browser attacks [*]Patented BankGuard technology [/LIST] [/SPOILER] [SPOILER="Exploit Protection"] Thanks to our ExploitProtection, you can protect yourself from unknown zero-day – or unpatched day one exploits. Attackers still regularly discover new vulnerabilities and exploit them to infect systems. [HEADING=3]Features:[/HEADING] [LIST] [*]Protect against infection through security vulnerabilities [*]Prevent the execution of exploits [/LIST] [/SPOILER] Source: G Data Official Website for OEM (frequently you can learn a lot by looking at what they offer to OEMs, for home users they won’t provide detailed explanations). [URL unfurl="true"]https://www.gdatasoftware.com/oem/anti-malware-sdks[/URL] But then Bitdefender provides all these modules as well. Bitdefender offers more modern experience, features such as Bitdefender Central and others. G Data’s outdated approach runs from the website (like trying to find a changelog) all the way to every corner of the software. Bugs have been reported around the web for both. Bitdefender is normally quite quick to provide the relevant fixes. [/QUOTE]
Insert quotes…
Verification
Post reply
Top