G-Data InternetSecurity 2010
Overall, G-Data InternetSecurity 2010 conforms to our idea of a traditional security suite by offering protection that is solid on the basics
- Inexpensive, excellent malware protection
- Noisy pop-up alerts for signature file updates
In our comparative reviews, G-Data InternetSecurity 2010 was the best all-around suite, offering both protection — it can to detect and block traditional malware while deploying superior heuristics to stop newer threats — and several additional security features for one low price.
Price$ 29.95 (AUD)
Note: Pricing for this product is in US$.
It may not be the first internet security suite that springs to mind, but G-Data InternetSecurity 2010 (one-year, one-user licence: US$29; one-year, three-user licence: $39) is among the best we've seen at malware detection and removal.
In a number of categories G-Data InternetSecurity 2010 scored the best test results and offered more protection features than many other suites. And it's a good value for its price.
G-Data InternetSecurity 2010 uses a combination of Avast and BitDefender antivirus engines, and in AV-Test.org's extensive malware-detection tests that combination worked.
G-Data had the highest detection rate of all the products tested, identifying on average 99 percent of the 722,372 collected samples of Trojan horses, worms, password-stealers, and other nasties.
G-Data InternetSecurity 2010 identified and removed 100 percent of the files and Registry changes that malware had put in place, but it failed to scrub the Registry for any remaining traces of the test infections.
It did detect 100 percent of the inactive rootkits - stealth malware used to hide infections from PC users and security software alike - but G-Data InternetSecurity 2010 removed only 77 percent of rootkits, a result that was the second lowest of the products tested.
G-Data does get credit for having the fewest false positives in heuristics; it misidentified only 1 file out of 5,000 test files.
G-Data achieved its best scores with behaviour-based detection of malware. In overall behavioral detection G-Data InternetSecurity 2010 produced a warning 80 percent of the time; detected and blocked 47 percent of malware samples; and removed 13 percent.
The suite scored particularly well when it came to proactively identifying unknown malware for which it lacked a signature. Here, G-Data InternetSecurity 2010 scored well above average.
In tests with 2-week-old signature files, G-Data InternetSecurity 2010 identified 56 percent of samples. And on four-week-old signature files it identified 49 percent-among the best of any product tested in this round.
According to AV-Test, G-Data responds the quickest to new widespread malware attacks, typically in less than 2 hours. As a result G-Data produced the second highest signature updates per month (551 in January 2009, 506 in February 2009, and 642 in March 2009), averaging 18 per day, bested only by Norton with over 200 per day.
AV-Test detected short on-demand scan times of 17 seconds for a 741 MB file, and on-access scans of 73 seconds compared with only 41 seconds to copy the same file on a system without antivirus installed.
G-Data does scan incoming email and IM messages, and provides its own antispam tool. For antiphishing, G-Data InternetSecurity 2010 does not use a browser toolbar, but nonetheless relies upon the information from Netcraft to identify and block phishing sites.
G-Data is perhaps too cautious on the web, though. It falsely warned that one program installed on our desktop was a potential security threat: the xb-Browser, which allows you to browse the web anonymously.
Overall, G-Data InternetSecurity 2010 conforms more to our idea of a traditional security suite by offering protection that is solid on the basics. Its interface is the most advanced we've seen, allowing sophisticated users to drill down to fine-tune each setting, but at the same time, it won't alienate casual users. And parental controls come within the interface.
The file data shredder exists as a separate icon on the desktop, which makes sense, since that way, you don't have to open G-Data to securely delete a file. One nitpick: the signature file updates, announced with a pop-up, need to happen in the background in a future release, or, like CheckPoint ZoneAlarm Extreme Security 8.0, with a change in the task tray icon.
Join the newsletter!
Apple iPhone X
Panasonic OLED 4K Ultra HD TV - TH-77EZ1000U
Bang and Olufsen BeoVision 14
Panasonic OLED 4K Ultra HD TV - TH-55EZ950U
SanDisk MicroSDXC™ for Nintendo® Switch™
Breitling Superocean Heritage Chronographe 44
Nespresso Creatista Coffee Machine
Dyson Supersonic™ Hair Dryer Fuchsia/Iron
WD MY PASSPORT™ Gaming Storage
WD MY PASSPORT™ X Gaming Storage
Toys for Boys
Xbox One X
WD MY CLOUD™ HOME Personal Cloud Storage
Toffee Bags Commuter Satchel
Dearear Endear In-ear Wireless Earphones
PETKIG Go Smart Dog Leash
Panasonic Hi-Fi - SC-UA7GS-K
Amazon Echo Bluetooth Speaker
Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K
iRobot Roomba 980 Vaccum Cleaning Robot
Panasonic Portable Splashproof Fun - RF-D20U
Razer DeathAdder Expert Ergonomic Gaming Mouse
Urbanworx Full HD Action Camera
Ikea NORDMÄRKE Wireless Charging Pad
Kogan Bluetooth Soundbar
Lexon Flip Alarm Clock
Raspberry Pi Starter Kit
Most Popular Reviews
- 1 Hisense takes the fight to home entertainment heavyweights with flagship Series 8 and 9 ULED TVs
- 2 Sony's latest Ultra HD OLED debuts in Australia
- 3 Panasonic Ultra HD OLED TV Review
- 4 D-Link Omna 180 Cam HD DSH-C310 review
- 5 Oppo A77 smartphone: Full in-depth review
Latest News Articles
- D-Link Adds Android Support and Launches Updated App for Omna 180 Cam HD
- Monitoring the home has become more flexible with Uniden’s App Cam Solo
- ESET works with Google to halt dangerous malware
- Cybersecurity is a Shared Responsibility, Warns ESET
- Nest jumps into home security with Nest Secure
PCW Evaluation Team
Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.
The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.
The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.
The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic
I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.
It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.
- Huawei Mate 10 Pro Review
- Hands On: Our first impressions of Sony's a7R III
- Legion Y520 Gaming Laptop review
- Which flagship TV is best? Sony 4K HDR Bravia 2016 versus LG 4K HDR OLED 2016
- 10 Blu-ray movies / Best looking Blu-ray movies
- CCProject AnalystNSW
- FTBusiness Analyst - PEGAOther
- TPPrincipal Data AnalystQLD
- CCAdlib DeveloperVIC
- FTEllipse DeveloperQLD
- FTInfrastructure Solutions ArchitectOther
- FTSenior .NET Engineer - Back-EndNSW
- FTJava DeveloperOther
- TPCapacity PlannerNSW
- CCRecords AnalystNSW
- FTDigital Product OwnerOther
- FTSenior Java DevelopersACT
- FTManager, Digital DeliveryOther
- TPFrontend DeveloperNSW
- FTSenior Solution ArchitectOther
- FTProject Manager - Rail Industry or Survey or Construction bkgrdOther
- TPAppian DeveloperQLD
- FTMultiple Axway rolesOther
- CCBusiness AnalystNSW
- CC2 x Technical Infrastructure SME - VMware / Storage/ BackupNSW
- FTAgile Delivery Project ManagerOther
- TPSAP ABAP DeveloperQLD
- FTTechnical Operations ManagerOther
- TPContracting Specialist - Procurement AssociateNSW
- CCSecurity AnalystQLD