# G Data Endpoint Protection Reviews
**Vendor:** G Data Software  
**Category:** [Endpoint Detection &amp; Response (EDR) Software](https://www.g2.com/categories/endpoint-detection-response-edr)  
**Average Rating:** 3.5/5.0  
**Total Reviews:** 2
## About G Data Endpoint Protection
G Data Endpoint Protection helps protect clients directly from threats and exploiting vulnerabilities, including proactive protection against malware, including an effective client firewall and efficient patch management to prevent vulnerabilities in installed programs from becoming an attacker&#39;s gateway.



## G Data Endpoint Protection Pros & Cons
**What users like:**

- Users value the **centralized management** of G Data Endpoint Protection for its efficiency and streamlined security operations. (1 reviews)
- Users value the **effective incident response** of G Data Endpoint Protection, appreciating its multi-layered threat detection and centralized management. (1 reviews)
- Users appreciate G Data Endpoint Protection&#39;s **robust threat detection** and effective ransomware protection, enhancing overall security management. (1 reviews)
- Users praise the **robust threat detection** of G Data Endpoint Protection, effectively guarding against various advanced malware threats. (1 reviews)

**What users dislike:**

- Users find the **user interface outdated** and clunky, making navigation and setup frustrating at times. (1 reviews)
- Users report **system instability** with G Data Endpoint Protection, including sporadic keyboard blocking and a clunky interface. (1 reviews)

## G Data Endpoint Protection Reviews
  ### 1. G Data Endpoint Protection - An IT Administrator's Perspective

**Rating:** 2.5/5.0 stars

**Reviewed by:** Mariusz S. | IT Admin, Small-Business (50 or fewer emp.)

**Reviewed Date:** July 06, 2025

**What do you like best about G Data Endpoint Protection?**

From a security standpoint, G Data Endpoint Protection truly shines in its robust, multi-layered threat detection capabilities. The dual-engine scanning technology is exceptionally effective, providing a formidable barrier against a wide spectrum of malware, including the increasingly prevalent ransomware and sophisticated zero-day exploits. This high detection rate significantly reduces the number of security incidents that demand my direct intervention, which is invaluable for a busy IT department. The centralized management console is also a key strength, allowing for efficient deployment of security policies, real-time threat monitoring, and comprehensive reporting across all endpoints. Its ability to manage firewall rules, push updates, and control device access from a single interface streamlines our security operations considerably. Furthermore, I've found its ransomware protection to be particularly effective, often stopping attacks in their tracks that might bypass less advanced solutions.

**What do you dislike about G Data Endpoint Protection?**

While the core security functionality is strong, there are aspects of G Data Endpoint Protection that, from an IT administrator's perspective, feel outdated and can occasionally hinder productivity. My primary concern is the user interface (UI) of the management console, which unfortunately feels quite archaic. In an era where modern software boasts sleek, intuitive designs, G Data's interface can be clunky and less user-friendly than contemporary alternatives. Navigating certain sections and finding specific settings sometimes requires more effort than it should, impacting overall efficiency, especially during initial setup or when troubleshooting.

Another frustrating issue I've encountered intermittently is the unexplained blocking of the computer keyboard. This sporadic problem has affected several machines in our environment, leading to user frustration and requiring reboots or troubleshooting steps to resolve. While not a constant issue, its occurrence is disruptive and points to a need for greater stability and refinement in device interaction.

**What problems is G Data Endpoint Protection solving and how is that benefiting you?**

Advanced Threats (Malware, Ransomware): Effective protection minimizes security incidents, reduces downtime, and safeguards data, giving me peace of mind.

Decentralized Security Management: The central console simplifies policy deployment and monitoring, ensuring consistent security and saving my time.

Unauthorized Access & Data Leakage: Device control (e.g., USB) prevents data loss and malware introduction, strengthening data security.

Email & Web-Based Threats: Mail protection and web filtering block phishing attempts and malicious sites, reducing user infection risks.

Lack of Security Status Visibility: Real-time reporting and monitoring provide full insight into protection status, enabling swift threat response.

  ### 2. Cyber Security at it finest

**Rating:** 4.5/5.0 stars

**Reviewed by:** Verified User in Human Resources | Mid-Market (51-1000 emp.)

**Reviewed Date:** August 05, 2022

**What do you like best about G Data Endpoint Protection?**

It Straight forward interface, it simple enought to setup,without extra steps.

**What do you dislike about G Data Endpoint Protection?**

No complaints at the time of writing this review.

**What problems is G Data Endpoint Protection solving and how is that benefiting you?**

Its ensuring corporate data confidentiality.



- [View G Data Endpoint Protection pricing details and edition comparison](https://www.g2.com/products/g-data-endpoint-protection/reviews?section=pricing&secure%5Bexpires_at%5D=2026-05-17+19%3A33%3A40+-0500&secure%5Bsession_id%5D=ddaf43e4-f915-4769-9354-b1e4b225005c&secure%5Btoken%5D=af9eca6a368e2d3791849b545de1f29cbb39df6c348859acdaabc7c9282f4d2b&format=llm_user)

## G Data Endpoint Protection Features
**Services - Endpoint Detection & Response (EDR) **
- Managed Services

**System Control**
- Device Control
- Web Control
- Application Control
- Asset Management
- System Isolation

**Vulnerability Prevention**
- Endpoint Intelligence
- Firewall
- Malware Detection

**Security Management**
- Incident Reports
- Security Validation
- Compliance 

## Top G Data Endpoint Protection Alternatives
  - [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews) - 4.7/5.0 (783 reviews)
  - [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews) - 4.6/5.0 (935 reviews)
  - [Acronis Cyber Protect Cloud](https://www.g2.com/products/acronis-cyber-protect-cloud/reviews) - 4.7/5.0 (1,268 reviews)

