Browser and app protection

Various additional protection mechanisms are summarised here.

BankGuard

The G DATA BankGuard protects your data in the browser, i.e. exactly where the banks cannot secure the data traffic. The banks secure the data traffic on the Internet via encrypted connections, but the data is decrypted in the browser and can be manipulated there by an attacker.

The included browser protection against banking Trojans prevents your data in the browser from being manipulated by a Trojan. The G DATA BankGuard proactively checks the authenticity of the network libraries used and thus ensures that your browser has not been manipulated by a Trojan. This technology provides the best possible protection for your banking transactions, even if the Trojan is previously unknown.

In addition, BankGuard has phishing protection. This protection prevents you from being redirected to fake pages. Fake sites usually have the aim of obtaining your access data in order to make transfers or orders in your name.

To use the full protection of your G DATA software, it is recommended to leave the protection switched on. If you want to deactivate the protection, click on BankGuard and then on Deactivate BankGuard. You will then see the BankGuard is displayed with a grey minus sign and the note "Not active".

Bankguard

If BankGuard is displayed with a grey minus and the note "Not active", you have not activated or deactivated it. To activate it, click on the BankGuard and on Activate BankGuard. The BankGuard is immediately active and is displayed with a green tick and the note "Active".

Bankguard eingeschaltet

Keylogger protection

The keylogger protection monitors whether keystrokes are being spied out on your system. This prevents attackers from logging your password entries. This function should always be switched on.

Keyloggerschutz

You can switch the keylogger protection on or off individually for programmes.

Keyloggerschutz Programme

Exploit Protection

A so-called exploit takes advantage of the vulnerabilities of common user software and can, in the worst case, take control of your computer. Exploits can take effect even if applications (such as PDF viewers, browsers, etc.) are regularly updated. Exploit Protection protects against such attacks.

Exploitschutz