Page tree
Skip to end of metadata
Go to start of metadata

G DATA Business Solutions Reference Guide

G DATA provides high-end malware protection for SMB and enterprise networks. The solutions are based on central configuration and administration and provide as much automation as possible, while allowing extensive customization. All clients, whether workstations, notebooks, file servers, or mobile clients, are administered centrally. Client processes run invisibly in the background and automatic internet updates enable extremely fast response times. G DATA supports various administration approaches, whether security functions need to be configured to function autonomously, or full control over the software’s actions needs to be maintained. This document will support informed decision making about the deployment of G DATA business solutions and will provide recommendations and optimal settings to protect SMB and enterprise networks.

The process of providing network and client security can be divided in three parts. Ideally, security is kept in mind right from the start, before deploying any hardware or software. However, even existing networks can and should profit from a well-wrought security policy. The planning stage helps administrators think about the needs and wishes of the end user, the physical possibilities of hardware, the optimal layout of the enterprise network, and the layers of security that will be added to all nodes. With a high-level network layout in mind, an informed decision can be made about the G DATA security solution that will be deployed.

With the basics arranged, administrators can move on to the actual deployment of their G DATA business solution of choice. Whether it is an SMB network with fewer than 50 clients, or an enterprise deployment with over 1000 clients, the installation of G DATA software can be streamlined and adapted to each situation. To enable swift client deployment, G DATA solutions support several client installation scenarios, ranging from automated remote installations using Active Directory to local client deployment.

After deploying server(s) and clients, the final phase is initiated. Using the newly built client-server infrastructure, administrators can configure client protection, as well as mail server security, backups, patch management, security policies, and much more. This document will assist in effectively configuring G DATA software for optimal security without sacrificing performance.

  • No labels