Keep yourself protected with our list of the best security suites
With more malware lurking in the shadows than ever before, it’s critical that you keep yourself safe


G Data’s dark red trim gives it the air of an emergency service, and the interface provides a sober, functional overview of your protection. The first two pages in particular are a hit: it only takes two clicks to check your system status, carry out various types of scan or create a bootable rescue disk.
The third page is for G Data’s proprietary, fully customisable firewall. Would-be sysadmins will appreciate the freedom this gives you to create your own security rules, but it’s fiddly to work with because the necessary controls are spread across three tabs in the main interface and then four more panes in the Settings window.
Next up is what’s advertised as a “cloud backup” feature – but you have to provide the storage yourself, in the form of either a Dropbox or Google Drive account. Doing so might protect your files from ransomware, but there are plenty of free backup tools that can do the same job, and most will go a lot further, with support for multiple backup sets and local destinations.
We’re not blown away by G Data’s parental controls, either. These offer simple web filtering and time limits for local Windows users, but if you want to extend protection to an Android device you’ll need to shell out £12.95 for a separate app. Lastly, perhaps the least useful bit of G Data Internet Security is the Autostart Manager. This shows you all the processes set to run at startup, but gives no hint as to whether they’re trustworthy or not. Wasn’t this supposed to be a security suite?
G Data doesn’t even inspire at the crucial task of stopping malware. It combines a home-grown scanner with one licensed from the much better-appointed Bitdefender suite, which you’d think would give you the best of both worlds – but Bitdefender’s effectiveness clearly isn’t down to its engine alone, as G Data’s two-pronged approach earned it only a 99.6% protection rating, which is no better than the free options.
AV-Test also rated G Data Internet Security one of the slowest security suites around, noting a performance drop-off of around 12% when visiting popular websites and launching applications, along with a steep 29% hit when installing new software. We could live with that if we had to, but there’s no reason to pay more than £40 a year for it – not when our top-rated packages offer broader, slicker protection at lower prices.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Darien began his IT career in the 1990s as a systems engineer, later becoming an IT project manager. His formative experiences included upgrading a major multinational from token-ring networking to Ethernet, and migrating a travelling sales force from Windows 3.1 to Windows 95.
He subsequently spent some years acting as a one-man IT department for a small publishing company, before moving into journalism himself. He is now a regular contributor to IT Pro, specialising in networking and security, and serves as associate editor of PC Pro magazine with particular responsibility for business reviews and features.
You can email Darien at darien@pcpro.co.uk, or follow him on Twitter at @dariengs.
-
Using DeepSeek at work is like ‘printing out and handing over your confidential information’
News Thinking of using DeepSeek at work? Think again. Cybersecurity experts have warned you're putting your enterprise at huge risk.
-
Can cyber group takedowns last?
ITPro Podcast Threat groups can recover from website takeovers or rebrand for new activity – but each successful sting provides researchers with valuable data
-
Millions of Dell laptops are are at risk thanks to a Broadcom chip vulnerability – and more than 100 device models are impacted
News Widely used in high-security environments, the PCs are vulnerable to attacks allowing the theft of sensitive data
-
‘A huge national security risk’: Thousands of government laptops, tablets, and phones are missing and nowhere to be found
News A freedom of information disclosure shows more than 2,000 government-issued phones, tablets, and laptops have been lost or stolen, prompting huge cybersecurity concerns.
-
Busting nine myths about file-based threats
Whitepaper Distinguish the difference between fact and fiction when it comes to preventing file-based threats
-
The Total Economic Impact™ of the Intel vPro® Platform as an endpoint standard
Whitepaper Cost savings and business benefits enabled by the Intel vPro® Platform as an endpotnt standard
-
The Total Economic Impact™ of IBM Security MaaS360 with Watson
Whitepaper Cost savings and business benefits enabled by MaaS360
-
WithSecure Elements EPP and EDR review: Endpoint protection on a plate
Reviews An affordable cloud-managed solution with smart automated remediation services
-
KuppingerCole leadership compass report - Unified endpoint management (UEM) 2023
Whitepaper Get an updated overview of vendors and their product offerings in the UEM market.
-
The Total Economic Impact™ of IBM Security MaaS360 with Watson
Whitepaper Get a framework to evaluate the potential financial impact of the MaaS360 on your organization