G DATA Company Profile

Company Information
G DATA Software, Inc.
1075 Peachtree Street NE, Suite 3650
Atlanta, Georgia, 30309
(404) 965-3582
Follow G DATA

As a specialist in internet security and pioneer in the field of virus protection, the company, founded in Bochum in 1985, developed the first antivirus program more than 20 years ago and celebrated its 25th birthday in 2010.

Consequently G DATA is amongst the eldest security software companies in the world. Over more than five years, no other European security software provider has won national and international tests and awards more frequently than G DATA. When it comes to quality, G DATA is a world leader, combining the world’s best security technologies in its antivirus products. Examples of this are its DoubleScan technology, including the new CloseGap technology, and OutbreakShield instant protection. G DATA security solutions are available worldwide in more than 90 countries.


Mobile Malware Report for Q1 2015
G DATA’s latest malware report finds almost 5,000 new mobile malware strains appear every day.


G DATA in the News

Malware Raises Security Risks in Supply Chain
Security experts are increasingly worried about the security of the supply chain with reports of more than 20 incidents where rogue retailers have managed to pre-install malware on new Android phones.


G DATA on the Web

Risk management: Baseline management and control
Learn how baseline management and control plays an important role in implementing insider threat controls in this Management Guide.
IT risk management - Wikipedia
IT risk management is the application of risk management methods to information technology in order to manage IT risk, i.e.: The business risk associated with the use ...
Risk Management - Chapter 2 - InfoSec Resources
Managing security is managing risk. As explained in Chapter 1, Security ensures the confidentiality, integrity, and availability of information assets through the ...
What is risk management? - Definition from
Risk management is a process to identify and control threats to a company's assets, including corporate data, customers' PII and intellectual property.
Third Party Security Risk Management - KLC Consulting
Vendor Security Management Process n sess r ues Verify & Inventory Vendors Classify Risk of Each Vendor by Relationship & Data handled Create Questionnaire
Insider vs. Outsider Data Security Threats: What’s the ...
47 data security experts compare the risks of insider threats vs. outsider threats. The risk of insider threats compared to outsider threats is an ongoing debate ...
CISSP Domain - Information Security Governance and Risk ...
Today let’s take a look at the CISSP Domain that deals with Information Security Governance and Risk Management. When we speak about IS Governance we’re talking ...
More about G DATA

Latest G DATA Tweets

G DATA on Facebook