Encontre downloads de produtos, manuais e ferramentas


G DATA Internet Security

G DATA Internet Security com antivírus e proteção contra exploração! Proteção contra vírus, spywares, hackers e malwares.

G DATA Total Security

O G DATA Total Security oferece a máxima proteção contra spyware, cavalos de troia, spams e outros malwares! O pacote sem preocupação, com firewall potente e proteção ativa contra exploração

G DATA Antivirus

Surpreenda-se agora mesmo com a proteção contra exploração do G DATA Antivirus! A melhor proteção contra vírus, cavalos de troia spyware, phishing e outros malwares.


G DATA Internet Security Android

G DATA  Internet Security Android oferece proteção contra vírus, aplicativos maliciosos e ameaças ao navegar na internet. Também fornece a possibilidade de localizar o smartphone perdido ou apagar todo o conteúdo à distância, a fim de evitar acesso não autorizado.


G DATA Business V 14.2

The setup includes all functions and additional modules of our business software. The features and modules you have bought are activated according to your registration number or login.


G DATA Meltdown & Spectre Scanner

G DATA Meltdown & Specter Scanner verifica se o seu sistema é vulnerável aos recentes ataques Meltdown e Specter. Após a varredura, você será informado sobre o status de segurança do seu sistema, assim como possíveis contramedidas.

Requisitos do sistema: Windows 10, Windows 8.1, Windows 8, Windows 7 SP1, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012 ou Windows Server 2008 R2 SP1. G DATA Meltdown & Specter Scanner requer o .NET Framework 4 ou superior, que vem pré-instalado com o Windows 8/Windows Server 2012 e os sistemas operacionais mais recentes. Se você usa o Windows 7 SP1 ou o Windows Server 2008 R2 SP1, instale o .NET Framework 4.7.1 de antemão.

G DATA BootMedium

The G DATA boot medium is a practical aid for detecting viruses that have already embedded themselves on your computer prior to installing the antivirus software. In the current version the boot medium is also capable of restoring all backups created with G DATA solutions (only available in the Total Protection solution). The download file is an ISO file, i.e. it must either be burnt to a CD/DVD or be mounted via a virtual drive so it can be used from a USB stick for example. You can download the boot medium in the "Tools" download area.

G DATA FakeAVCleaner "System Tool"

The G DATA FakeAVCleaner “System Tool” removes FakeAV of the “System Tool” type and related types. Note: The G DATA FakeAVCleaner “System Tool” has to be executed with the Windows user account that is infected. As the FakeAV “System Tool” shuts down all user-initiated programs which do not have any kind of ‘reserved’ name, like explorer.exe, winlogon.exe or svchost.exe and many more, the file name for the G DATA FakeAVCleaner is svchost.exe.

Quarantine Generation 2011

This version is for G DATA products of generation 2011 and later. This tool enables you to work with files that have been placed in quarantine. These quarantined files have the extension *.q and can be found on the client in the folder "C:\Program files\Common files\G DATA\AVKScanner\QBase" or on the server in "C:\Program files\G DATA\AVK ManagementServer\QBase". You can for example place infected mail archives into a new folder and continue working.


You need this tool to completely uninstall your G DATA security solution (e.g. to reinstall it). AntiVirus Cleaner deletes from your system all remains of the program which were not removed by a simple uninstall.

G DATA USB Keyboard Guard

The G DATA USB Keyboard Guard is an add-on that protects you from the most likely form of USB attack: USB devices pretending to be keyboards. If a new keyboard is detected by the system, access is initially denied and a pop-up is displayed. You can then check in your own time whether this really is a keyboard, and either grant or deny access permanently. You can download the software for free.

Mon Activity CS

The MonActivity tool enables you to monitor the activity of the AVK-guard in the background. This can be helpful to analyze performance problems. You can run this tool in real time during "normal" activity, and then try to reproduce the problem. Or you can run it for half an hour with the hitlist function and then refresh the view to see if a specific process pops up all the time. Defining an exception for a specific type of files might solve the problem in that case.