Gdata.at - SEO Checker

Overview of the SEO Check
Meta information
89% 
Page quality
87% 
Page structure
58% 
Link structure
0% 
Server
100% 
External factors
100% 
SEO Score
Response time
0.08 s
File size
112.90 kB
Words
2521
Media files
114
Number of links
239 internal / 45 external

Task list of SEO Improvements

Meta specifications

Title
(Critically important)
IT-Sicherheit Made in Germany | G DATA
The length of the page title is perfect. (367 pixels out of 580 max pixel length)
There are no duplicate words in the title
Meta description
(Critically important)
Digitale Sicherheit für Ihr Unternehmen und für Sie zuhause. Managed EDR ✓ Awareness Trainings ✓ Endpoint Security ✓ Antivirus ✓ Jetzt entdecken!
The length of the meta description is perfect. (932 pixels out of 1000 max pixel length)
Crawlability
(Critically important)
There are no problems in accessing the website.
Canonical URL
(Important)
https://www.gdata.at/
There is a valid canonical link specified.
Language
(Somewhat important)
Language detected in text: de
Language defined in HTML: de-at
Language defined in HTTP-Equiv meta tag: de
Server location: United States of America
There are different language information within the page markup.
The following language is defined by HTML: de
Alternate/Hreflang Links
(Somewhat important)
The alternate link to the page itself is missing.
An URL is specified multiple times in alternate links.
Other meta tags
(Somewhat important)
There is no rel next meta tag on this page.
There is no rel prev meta tag on this page.
Domain
(Somewhat important)
The domain is no subdomain.
The domain length is good.
The domain does not contain non-latin characters.
Page URL
(Somewhat important)
No parameters were found in the URL.
No session ID was found in the URL.
The URL does not have too many subdirectories.
Charset encoding
(Somewhat important)
The charset encoding (UTF-8) is set correctly.
Doctype
(Nice to have)
The doctype HTML 5 is set correctly.
The doctype is placed at first in the HTML code.
Favicon
(Nice to have)
No favicon is linked in the HTML code.

Meta tags

NameValue
generatorTYPO3 CMS
descriptionDigitale Sicherheit für Ihr Unternehmen und für Sie zuhause. Managed EDR ✓ Awareness Trainings ✓ Endpoint Security ✓ Antivirus ✓ Jetzt entdecken!
viewportwidth=device-width, initial-scale=1
application-nameG DATA | Trust in German Sicherheit
apple-mobile-web-app-capableyes
msapplication-navbutton-color#1e1e1e
yandex-verification4cf0234eb3af74fb
dc.titleIT-Sicherheit Made in Germany | G DATA
date2024-07-24T10:55:04
dc.date2024-07-24T10:55:04
copyrightG DATA CyberDefense AG, 2024. All rights reserved.
authorG DATA CyberDefense AG
DC.authorG DATA CyberDefense AG
langde-at
twitter:cardsummary
twitter:titleIT-Sicherheit Made in Germany | G DATA
twitter:descriptionDigitale Sicherheit für Ihr Unternehmen und für Sie zuhause. Managed EDR ✓ Awareness Trainings ✓ Endpoint Security ✓ Antivirus ✓ Jetzt entdecken!
twitter:imagehttps://www.gdata.at/fileadmin/web/de/images/content/Startseite_2024/G_DATA_OGTag_Cyberdefence_1200x630.png
twitter:image:alt[Translate to Österreich:]
og:titleIT-Sicherheit Made in Germany | G DATA
og:descriptionDigitale Sicherheit für Ihr Unternehmen und für Sie zuhause. Managed EDR ✓ Awareness Trainings ✓ Endpoint Security ✓ Antivirus ✓ Jetzt entdecken!
og:imagehttps://www.gdata.at/fileadmin/web/de/images/content/Startseite_2024/G_DATA_OGTag_Cyberdefence_1200x630.png
og:image:urlhttps://www.gdata.at/fileadmin/web/de/images/content/Startseite_2024/G_DATA_OGTag_Cyberdefence_1200x630.png
og:image:width1200
og:image:height630
og:image:alt[Translate to Österreich:]
x-ua-compatibleIE=edge
content-languagede
charsetutf-8

Test up to 1.000 webpages of gdata.at with our free plan!

Try For Free
No trial. It's just free!

Page quality

Content
(Critically important)
This page contains 2521 words. That's ok.
32.6% of the text are stop words.
Keywords used in the page title are also used in the page content. That's good!
Words from the H1 heading are used in the page content.
The page contains a listing, which indicates a good text layout.
28 paragraphs were found on this page.
The text content is perfect.
No placeholders texts or images were found.
There are no duplicates on the site.
The average number of words per sentence of 16.35 words is good.
Frames
(Critically important)
This page does not use a frameset.
Mobile optimization
(Somewhat important)
A viewport "width=device-width, initial-scale=1" is provided.
At least one Apple touch icon is specified.
Bold and strong tags
(Somewhat important)
The usage of strong and bold tags is perfect. We recommend the use of up to 50 tags for this page.
Image SEO
(Somewhat important)
45 images have no alt attribute. The content of alt attributes is used by search engines.
Social Networks
(Nice to have)
There are only a few social sharing widgets on the page. Make your website popular in social networks with social sharing widgets.
Additional markup
(Nice to have)
No additional page markup was found.
HTTPS
(Somewhat important)
This website uses HTTPS to protect privacy and integrity of the exchanged data.
All included files are also transferred via HTTPS.

Media list

URLAlt attributeTitle
...sources/Public/Images/logo-for-light.svgG DATA Logo
...esources/Public/Images/nm/icons/shop.svgG DATA Shop
...esources/Public/Images/nm/logo-trust.svgG DATA Logo
...urces/Public/Images/nm/logo-trust-xl.svgG DATA Logo
...s/Public/Images/nm/icons/mobile-menu.svgMobile Menu
...sources/Public/Images/nm/images/mxdr.jpgNo alt attribute provided
...esources/Public/Images/nm/images/cda.jpgNo alt attribute provided
...sources/Public/Images/nm/images/adan.jpgNo alt attribute provided
...rces/Public/Images/nm/icons/security.svgsecurity icon
...rces/Public/Images/nm/images/es-left.jpgNo alt attribute provided
...ces/Public/Images/nm/images/es-right.jpgNo alt attribute provided
...rces/Public/Images/nm/icons/security.svgsecurity icon
...ces/Public/Images/nm/images/oem-left.jpgNo alt attribute provided
...ublic/Images/nm/images/oem-right-top.jpgNo alt attribute provided
...ic/Images/nm/images/oem-right-bottom.jpgNo alt attribute provided
...rces/Public/Images/nm/icons/security.svgsecurity icon
...blic/Images/nm/images/expertise-left.jpgNo alt attribute provided
...Images/nm/images/expertise-right-top.jpgNo alt attribute provided
...ges/nm/images/expertise-right-bottom.jpgNo alt attribute provided
...rces/Public/Images/nm/icons/security.svgsecurity icon
...Public/Images/nm/images/partner-left.jpgNo alt attribute provided
...c/Images/nm/images/partner-right-top.jpgNo alt attribute provided
...mages/nm/images/partner-right-bottom.jpgNo alt attribute provided
...rces/Public/Images/nm/icons/security.svgsecurity icon
...Public/Images/nm/images/support-left.jpgNo alt attribute provided
...Images/nm/images/expertise-right-top.jpgNo alt attribute provided
...mages/nm/images/support-right-bottom.jpgNo alt attribute provided
...rces/Public/Images/nm/icons/security.svgsecurity icon
...s/Public/Images/nm/images/gdata-left.jpgNo alt attribute provided
...lic/Images/nm/images/gdata-right-top.jpgNo alt attribute provided
.../Images/nm/images/gdata_right_bottom.jpgNo alt attribute provided
...rces/Public/Images/nm/icons/security.svgsecurity icon
...s/Public/Images/nm/images/products-1.jpgNo alt attribute provided
...s/Public/Images/nm/images/products-2.jpgNo alt attribute provided
...s/Public/Images/nm/images/products-3.jpgNo alt attribute provided
...rces/Public/Images/nm/icons/security.svgsecurity icon
...sources/Public/Images/logo-for-light.svgG DATA Logo
...s/Resources/Public/Images/nm/icons/x.svgMenü schließen
.../Public/Images/nm/icons/chevron-down.svgMenü schließen
.../Public/Images/nm/icons/chevron-down.svgMenü schließen
.../Public/Images/nm/icons/chevron-down.svgMenü schließen
.../Public/Images/nm/icons/chevron-down.svgMenü schließen
.../Public/Images/nm/icons/chevron-down.svgMenü schließen
.../Public/Images/nm/icons/chevron-down.svgMenü schließen
.../Public/Images/nm/icons/chevron-down.svgMenü schließen
.../Public/Images/nm/icons/chevron-down.svgMenü schließen
.../d/G_DATA_Home_Background_6ac4e198ef.pngBlick auf mehrere Computermonitore
...content/Startseite_2024/hero-image-1.pngNIS 2 Schriftzug
...ocessed_/c/f/hero-image-1_8d3f2285da.pngNIS 2 Schriftzug
...serkachel_MXDR_MA-9250_V1_b6adcab5e9.jpgNo alt attribute provided
...serkachel_MXDR_MA-9250_V1_da94bf0490.jpgNo alt attribute provided
...te-Teaserkachel-SAiZ-2024_5e41dcebda.pngNo alt attribute provided
...te-Teaserkachel-SAiZ-2024_4debaa138b.pngNo alt attribute provided
...urces/Public/Images/nm/icons/message.svgicon
...rces/Public/Images/nm/icons/security.svgsecurity icon
...ources/Public/Images/nm/icons/camera.svgicon
...tent/Startseite_2024/happy-user-blue.pngNo alt attribute provided
..._Andreas_Luening_1180x800_321796a797.pngNo alt attribute provided
...s/Public/Images/nm/icons/shield-tick.svgicon
...Resources/Public/Images/nm/icons/eye.svgicon
...s/Public/Images/nm/icons/speedometer.svgicon
...urces/Public/Images/nm/icons/support.svgicon
...ources/Public/Images/nm/icons/marker.svgicon
...ources/Public/Images/nm/icons/wrench.svgicon
...r-Security-Awareness-Trainings-mobil.pngNo alt attribute provided
...-Header-Security-Awareness-Trainings.pngNo alt attribute provided
...CDA-Header-Phishing-Simulation-mobil.pngNo alt attribute provided
...tent/Startseite_2024/happy-user-navy.pngNo alt attribute provided
...Header-Trainingsreihe-Phishing-mobil.pngNo alt attribute provided
...e-CDA-Header-Trainingsreihe-Phishing.pngNo alt attribute provided
...eite-CDA-Header-Unterweisungen-mobil.pngNo alt attribute provided
...Startseite-CDA-Header-Unterweisungen.pngNo alt attribute provided
.../G_DATA_Home_Case_Studies_Background.pngNo alt attribute provided
..._Stadtwerke_Kamp-Lintfort_c68a685f03.pngNo alt attribute provided
..._Stadtwerke_Kamp-Lintfort_58fb4bd0e5.pngNo alt attribute provided
.../d/6/Case_Study_Jagenberg_a9356fc850.pngMaschine
.../d/6/Case_Study_Jagenberg_b5cbce021f.pngMaschine
...d_/8/1/Case_Study_Edelrid_99b77ffe79.pngKletterer mit Seil
...d_/8/1/Case_Study_Edelrid_c044d386ac.pngKletterer mit Seil
.../d/7/Case_Study_Westfalen_845bcd91dd.pngTankstelle
.../d/7/Case_Study_Westfalen_ad51f9e0fa.pngTankstelle
...essed_/a/3/Case_Study_RUB_496cadd12e.pngUniversitätsgebäude
...essed_/a/3/Case_Study_RUB_6abe4e476c.pngUniversitätsgebäude
...sed_/e/c/Case_Study_Kruft_550d240a19.pngAutohaus Gebäude
...sed_/e/c/Case_Study_Kruft_2017898dcf.pngAutohaus Gebäude
..._/b/7/Case_Study_Eickhoff_f89e66bdfa.pngArbeiter beim Gießen von heißem Eisen
..._/b/7/Case_Study_Eickhoff_a716783394.pngArbeiter beim Gießen von heißem Eisen
...d_/8/a/Case_Studies_FTAPI_e2017d0a89.pngMitarbeiter von FTAPI
...d_/8/a/Case_Studies_FTAPI_ea50af9cd1.pngMitarbeiter von FTAPI
.../awards/ITSMIG_Logo_GDATA_2016_Small.pngLogo "IT Security made in Germany"
...d_Connect-Best-Trust-2023_616e4b4db4.pngNo alt attribute provided
...rd_Comenius-Medaille-2023_143feb6a5e.pngNo alt attribute provided
..._AV-comparatives_dec_2022_40dd343975.pngNo alt attribute provided
...eite_Award_BrandEins_2022_ecb1c1ec5c.pngNo alt attribute provided
...ite_Award_PCM-AV-Software_5597639614.pngNo alt attribute provided
...sources/Public/Images/logo-for-light.svgG DATA Logo

Page structure

H1 heading
(Critically important)
Schützen Sie Ihr Unternehmen mit IT-Sicherheit Made in Germany.
The H1 heading is perfect.
Headings
(Important)
The structure of headings is missing one or more levels. Do not skip heading levels.
There are 39 headings on the page. The amount of headings should be in a more proper relation to the amount of text.

Heading structure

Heading levelContent
H1 Schützen Sie Ihr Unternehmen mit IT-Sicherheit Made in Germany.
H3 Rund um die Uhr. Expertenschutz aus Deutschland.
H3 G DATA 365 | MXDR
H3 Wir erkennen und stoppen Cyberangriffe für Sie.
H3 G DATA academy Sicheres Verhalten ganz einfach lernen.
H3 Security Awareness Trainings
H3 Holen Sie alle Mitarbeitenden in Ihr Security-Team
H3 Phishing Simulation
H3 Testen Sie Ihre Mitarbeitenden im echten Arbeitsalltag.
H3 Trainingsreihe Phishing
H3 Für klare Sicht im Phishing-Strudel
H3 Betriebliche Unterweisungen
H3 Ihre Kurse zu Erste Hilfe, Compliance, Datenschutz und mehr
H3 G DATA Lösungen im Einsatz
H3 Digitale Sicherheit für alle Unternehmen
H3 Industrie und Wirtschaft
H3 Betreiber kritischer Infrastrukturen (KRITIS)
H3 Groß-, Einzel-, und Versandhandel
H3 Handwerksbetriebe
H3 Finanz- und Versicherungswesen
H3 Logistik und Transport
H3 Telekommunikationsunternehmen
H3 Tourismus
H3 IT-Dienstleister
H3 Medien und Kultur
H3 Pharmaunternehmen
H3 (Hoch-)Schulen
H3 Krankenhäuser und Arztpraxen
H3 Steuerberater und Rechtsanwälte
H3 Verwaltung und Versorgung
H3 Technologieunternehmen
H3 IT-Sicherheit aus Deutschland für höchsten Datenschutz.
H3 Maximaler Schutz
H3 Persönliche Betreuung
H3 Im Notfall an Ihrer Seite
H5 Beliebt
H5 Kooperationen
H5 G DATA
H5 Service
Some internal link anchor texts are too long.
Some anchor texts are used more than once.
1 links don't have an anchor text.
The number of internal links is ok.
All internal links are not using dynamic parameters.
There are too many external links (45) on this page.
LinkAttributesAnchor text
https://www.gdata.at/IMG-ALT G DATA Logo
https://www.gdata.at/mygdataNew window MY G DATA
https://www.gdata.at/shopShop
IMG-ALT G DATA Shop
/ueber-g-data/it-security-made...Text duplicate IMG-ALT G DATA Logo
/business/security-services/mxdrG DATA 365 MXDR Wir erkennen und stoppen Cyberangriffe für Sie – rund um die Uhr.
/business/security-services/se...Security Awareness Trainings Holen Sie alle Mitarbeitenden in Ihr Security-Team.
/business/security-services/g-...Advanced Analytics Gut beraten durch IT-Security-Spezialisten
/business/security-services/mxdrMXDR
/business/security-services/se...Security Awareness Trainings
/business/security-services/se...Phishing Simulation
/business/security-services/se...Trainingsreihe Phishing
/business/security-services/se...Awareness Games
/business/security-services/se...Unterweisungen
/business/security-services/ve...Verdict-as-a-Service
/business/security-services/g-...Advanced Analytics
/business/security-services/in...Incident Response Retainer
/business/security-services/it...IT Security Assessment
/business/security-services/it...IT Security Consulting
/business/security-services/pa...Passwort Audit
/business/security-services/pe...Penetration Tests
/business/webinareWebinare
/business/case-studiesCase Studies
/business/endpoint-securityLösungen Endpoint Security Software Schützen Sie Ihr Unternehmen mit IT Security Made in Germany.
/business/premium-serviceFür Sie da Premium Service & Support Vertrauen Sie auf persönliche und passgenaue Betreuung.
/business/endpoint-securityEndpoint Security Software
/business/vm-securityVM Security
/business/endpoint-security/mo...Mobile Device Management
/business/server-gateway-securityE-Mail & Proxy Server Schutz On-Premise
/business/365-mail-protectionE-Mail-Schutz für Exchange Online
/business/managed-endpoint-sec...Hosted Endpoint Security
/business/premium-servicePremium Service & Support
/business/endpoint-security/ko...Kostenlos testen
https://www.gdata.at/downloadsDownloads
/business/webinareText duplicate Webinare
/business/case-studiesText duplicate Case Studies
https://www.gdata.at/oemIntegrationen OEM-Lösungen Steigern Sie Ihren Gewinn – mit Next-Gen Technologien von G DATA.
/oem/verdict-as-a-serviceVerdict-as-a-Service Sicherheit für Daten in der Cloud
/oem/anti-malware-sdksAnti-Malware SDKs Starke Technologien – einfach integriert
https://www.gdata.at/oemOEM-Lösungen
/oem/anti-malware-sdksAnti-Malware SDKs
/oem/threat-analysisThreat Analysis
/oem/threat-intelligenceThreat Intelligence
/oem/verdict-as-a-serviceText duplicate Verdict-as-a-Service
/business/case-studiesText duplicate Case Studies
/business/webinareText duplicate Webinare
/cybersicherheit-in-zahlenMagazin 2023/24 Cybersicherheit in Zahlen Wir machen Komplexes verständlich. Jetzt kostenfrei erhalten.
https://www.gdata.de/help/de/h...New window External Subdomain Knowledge Base Online-Hilfe
https://www.gdata.at/ratgeberRatgeber IT-Sicherheit Wissenswertes, Tipps & Tricks
/ueber-g-data/auszeichnungenAuszeichnungen
/business/case-studiesText duplicate Case Studies
/cybersicherheit-in-zahlenCybersicherheit in Zahlen
https://www.gdata.at/blogSecurity Blog
/ueber-g-data/it-security-made...Gütesiegel
https://www.gdata.de/help/de/h...External Subdomain Knowledge Base
https://www.gdata.at/ratgeberRatgeber IT-Sicherheit
/business/webinareText duplicate Webinare
/business/partner/partner-werdenGemeinsam stärker Partner werden Für langfristigen Geschäftserfolg: Werden Sie G DATA Vertriebspartner.
https://www.gdata.at/oemOEM-Lösungen Steigern Sie Ihren Gewinn
/business/managed-endpoint-sec...Hosted Endpoint Security Schützen Sie Ihre Kunden vor Angriffen
/business/partner/partner-werdenPartner werden
https://partner.gdata.de/New window External Subdomain Partnerportal
/business/partner/fachhaendler...Fachhändler finden
/kooperationen/werbepartner-af...Werbepartner / Affiliates
/business/managed-endpoint-sec...Text duplicate Hosted Endpoint Security
https://www.gdata.at/oemText duplicate OEM-Lösungen
https://www.gdata.at/support/faqHäufig gestellte Fragen FAQ Ihr Wissensschatz, Ihre Lösungen: Entdecken Sie unsere FAQ und finden Sie Antworten, die Sie weiterbringen.
https://www.gdata.de/help/de/h...External Subdomain Text duplicate Knowledge Base Online-Hilfe
https://www.gdata.at/downloadsDownloads & Updates Test- & Vollversionen sowie hilfreiche Tools
https://www.gdata.de/help/de/h...External Subdomain Text duplicate Knowledge Base
https://www.gdata.at/downloadsDownloads & Updates
/sicherheitsluecke-meldenSicherheitslücke melden
https://www.gdata.de/help/de/g...New window External Subdomain Verdächtige Datei, App oder Url einsenden
/support/kontaktKontakt
/ueber-g-data/karriereG DATA Jetzt bewerben Bewirb Dich jetzt und starte Deine Reise voller Chancen und Erfahrungen.
/ueber-g-data/presse-medienNewsroom Presse Center & Blog
/ueber-g-data/auszeichnungenAuszeichnungen Überzeugen Sie sich
https://www.gdata.at/ueber-g-dataErfinder des Antivirus
/ueber-g-data/managementManagement
/ueber-g-data/karriereJob & Karriere
/ueber-g-data/auszeichnungenText duplicate Auszeichnungen
/ueber-g-data/geschichte-und-m...Meilensteine
https://www.gdata.at/kontaktKontakt & Anfahrt
/ueber-g-data/presse-medienNewsroom
/business/case-studiesText duplicate Case Studies
/internet-securityBester Schutz für alle Geräte Internet Security Ihr starker Virenschutz im Internet – für Windows, macOS, Android & iOS
/antivirus-fuer-windowsAntivirus für Windows Basis-Schutz
/total-securityTotal Security Maximale Sicherheit
/antivirus-fuer-windowsAntivirus für Windows
/antivirus-fuer-macAntivirus für Mac
/internet-securityInternet Security
/total-securityTotal Security
/internet-security-3-fuer-1Sonderedition SALE
https://www.gdata.at/pcSoftware vergleichen
/mobile-security-androidMobile Security für Android
/mobile-security-iosMobile Security für iOS
https://msec.gdata.de/New window External Subdomain Mobiles Gerät finden
https://www.gdata.at/vpnG DATA VPN
/id-protectionG DATA ID Protection
https://www.gdata.at/mygdataNew window Lizenz verlängern
/kostenlos-testenText duplicate Kostenlos testen
https://www.gdata.at/downloadsText duplicate Downloads
/support/kontaktText duplicate Kontakt
https://www.gdata.de/help/de/c...New window External Subdomain Online-Hilfe
https://www.gdata.at/newsletterNewsletter
/support/kontakt/technical-bus...Business-Support
https://www.gdata.at/Text duplicate IMG-ALT G DATA Logo
/business/security-services/mxdrText duplicate MXDR
/business/security-services/se...Text duplicate Security Awareness Trainings
/business/security-services/se...Text duplicate Phishing Simulation
/business/security-services/se...Text duplicate Trainingsreihe Phishing
/business/security-services/se...Text duplicate Awareness Games
/business/security-services/se...Text duplicate Unterweisungen
/business/security-services/ve...Text duplicate Verdict-as-a-Service
/business/security-services/g-...Text duplicate Advanced Analytics
/business/security-services/in...Text duplicate Incident Response Retainer
/business/security-services/it...Text duplicate IT Security Assessment
/business/security-services/it...Text duplicate IT Security Consulting
/business/security-services/pa...Text duplicate Passwort Audit
/business/security-services/pe...Text duplicate Penetration Tests
/business/webinareText duplicate Webinare
/business/case-studiesText duplicate Case Studies
/business/endpoint-securityText duplicate Endpoint Security Software
/business/vm-securityText duplicate VM Security
/business/endpoint-security/mo...Text duplicate Mobile Device Management
/business/server-gateway-securityMail Server & Proxy Server Security
/business/365-mail-protectionText duplicate E-Mail-Schutz für Exchange Online
/business/managed-endpoint-sec...Text duplicate Hosted Endpoint Security
/business/premium-serviceText duplicate Premium Service & Support
/business/endpoint-security/ko...Text duplicate Kostenlos testen
https://www.gdata.at/downloadsText duplicate Downloads
/business/webinareText duplicate Webinare
/business/case-studiesText duplicate Case Studies
https://www.gdata.at/oemText duplicate OEM-Lösungen
/oem/anti-malware-sdksText duplicate Anti-Malware SDKs
/oem/threat-analysisText duplicate Threat Analysis
/oem/threat-intelligenceText duplicate Threat Intelligence
/oem/verdict-as-a-serviceText duplicate Verdict-as-a-Service
/business/kontaktText duplicate Kontakt
/business/case-studiesText duplicate Case Studies
/business/webinareText duplicate Webinare
/ueber-g-data/auszeichnungenText duplicate Auszeichnungen
/business/case-studiesText duplicate Case Studies
/cybersicherheit-in-zahlenText duplicate Cybersicherheit in Zahlen
https://www.gdata.at/blogText duplicate Security Blog
/ueber-g-data/it-security-made...Text duplicate Gütesiegel
https://www.gdata.de/help/de/h...External Subdomain Text duplicate Knowledge Base
https://www.gdata.at/ratgeberText duplicate Ratgeber IT-Sicherheit
/business/webinareText duplicate Webinare
/business/partner/partner-werdenText duplicate Partner werden
https://partner.gdata.de/External Subdomain Text duplicate Partnerportal
/business/partner/fachhaendler...Text duplicate Fachhändler finden
/kooperationen/werbepartner-af...Text duplicate Werbepartner / Affiliates
/business/managed-endpoint-sec...Text duplicate Hosted Endpoint Security
https://www.gdata.at/oemText duplicate OEM-Lösungen
https://www.gdata.de/help/de/h...External Subdomain Text duplicate Knowledge Base
https://www.gdata.at/downloadsText duplicate Downloads & Updates
/sicherheitsluecke-meldenText duplicate Sicherheitslücke melden
https://www.gdata.de/help/de/g...External Subdomain Text duplicate Verdächtige Datei, App oder Url einsenden
/support/kontaktText duplicate Kontakt
https://www.gdata.at/ueber-g-dataText duplicate Erfinder des Antivirus
/ueber-g-data/managementText duplicate Management
/ueber-g-data/karriereText duplicate Job & Karriere
/ueber-g-data/auszeichnungenText duplicate Auszeichnungen
/ueber-g-data/geschichte-und-m...Text duplicate Meilensteine
https://www.gdata.at/kontaktText duplicate Kontakt & Anfahrt
/ueber-g-data/presse-medienText duplicate Newsroom
/business/case-studiesText duplicate Case Studies
/antivirus-fuer-windowsText duplicate Antivirus für Windows
/antivirus-fuer-macText duplicate Antivirus für Mac
/internet-securityText duplicate Internet Security
/total-securityText duplicate Total Security
/internet-security-3-fuer-1Sonderedition
https://www.gdata.at/pcText duplicate Software vergleichen
/mobile-security-androidText duplicate Mobile Security für Android
/mobile-security-iosText duplicate Mobile Security für iOS
https://msec.gdata.de/External Subdomain Text duplicate Mobiles Gerät finden
https://www.gdata.at/vpnText duplicate G DATA VPN
/id-protectionText duplicate G DATA ID Protection
https://www.gdata.at/mygdataText duplicate Lizenz verlängern
/kostenlos-testenText duplicate Kostenlos testen
https://www.gdata.at/downloadsText duplicate Downloads
/support/kontaktText duplicate Kontakt
https://www.gdata.de/help/de/c...External Subdomain Text duplicate Online-Hilfe
https://www.gdata.at/newsletterText duplicate Newsletter
https://www.gdata.at/shopText duplicate Shop
https://www.gdata.at/mygdataText duplicate MY G DATA
/testsieger2024No Text
/business/nis-2-richtlinieNIS-2-Richtlinie Was jetzt für Unternehmen wichtig ist Sind Sie betroffen? Was ist zu tun? Die EU-Richtlinie einfach erklärt.
IMG-ALT NIS 2 Schriftzug
/business/security-services/mxdrG DATA 365 | MXDR Verstärken Sie Ihr Team mit 24/7-Expertenschutz Wir stoppen Cyberangriffe für Sie. Jetzt mehr erfahren.
/whitepaper-security-awareness...Whitepaper Security Awareness in Zahlen 2024 Cybercrime, CISOs & die Perspektive der Mitarbeitenden. Jetzt lesen.
https://presse.gdata.de/External Subdomain Alle News anzeigen
/blog/2024/08/37991-vom-kampf-...Vom Kampf mit den eigenen Werkzeugen
https://www.gdata.at/blogAlle Einträge anzeigen
/business/webinare/webinar-det...Dem Bösen auf der Spur: Wie unser CSIRT Cyberangriffe bewältigt
/business/webinareAlle Webinare anzeigen
https://www.youtube.com/watch?...External Subdomain Video abspielen
/business/security-services/mx...Jetzt unverbindlich testen Zur Testversion
/business/security-services/mx...Service-Level im Überblick Passend für Ihr Unternehmen
/business/security-services/mxdrWie Managed XDR funktioniert Jetzt informieren
/business/security-services/se...Mehr erfahren
/business/security-services/se...Text duplicate Mehr erfahren
/business/security-services/se...Jetzt abtauchen
/business/security-services/se...Text duplicate Mehr erfahren
/fileadmin/web/de/documents/ca...New window Stadtwerke Kamp-Lintfort Mit Managed XDR zu mehr IT-Sicherheit Case Study lesen
/fileadmin/web/de/documents/ca...New window Jagenberg AG Awareness Trainings im Maschinenbau Case Study lesen
IMG-ALT Maschine
/fileadmin/web/de/documents/ca...New window Edelrid Mehr Bewusstsein für Phishing & Malware für über 200 Mitarbeitende Case Study lesen
IMG-ALT Kletterer mit Seil
/fileadmin/web/de/documents/ca...New window Westfalengruppe Hilfe beim Wiederanlauf der IT nach einer Ransomware-Attacke Case Study lesen
IMG-ALT Tankstelle
/fileadmin/web/de/documents/ca...New window Ruhr-Universität Bochum Vorfallsbewältigung an der Universität Case Study lesen
IMG-ALT Universitätsgebäude
/fileadmin/web/de/documents/ca...New window Autohaus Kruft Sicherer Neuaufbau der kompletten IT-Infrastruktur Case Study lesen
IMG-ALT Autohaus Gebäude
/fileadmin/web/de/documents/ca...New window Eickhoff Maschinenfabrik und Eisengießerei Mittelstand setzt auf IT-Sicherheit aus der Nachbarschaft Case Study lesen
IMG-ALT Arbeiter beim Gießen von heißem Eisen
/fileadmin/web/de/documents/ca...New window FTAPI Erhöhte Sicherheit beim Datenaustausch Case Study lesen
IMG-ALT Mitarbeiter von FTAPI
/business/kontaktUnverbindliche Beratung anfragen
/fileadmin/web/de/documents/ca...Case Study lesen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
/fileadmin/web/de/documents/ca...Text duplicate Case Study lesen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
/fileadmin/web/de/documents/ca...Text duplicate Case Study lesen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
/fileadmin/web/de/documents/ca...Text duplicate Case Study lesen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
/fileadmin/web/de/documents/ca...Text duplicate Case Study lesen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
/fileadmin/web/de/documents/ca...Text duplicate Case Study lesen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
/fileadmin/web/de/documents/ca...Text duplicate Case Study lesen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
/fileadmin/web/de/documents/ca...Text duplicate Case Study lesen
/business/kontaktText duplicate Unverbindliche Beratung anfragen
https://de.linkedin.com/compan...New window External Subdomain A-TITLE G DATA CyberDefense AG auf Linked-In
https://www.facebook.com/gdata...New window External Subdomain A-TITLE G DATA CyberDefense AG auf Facebook
https://www.threads.net/@gdata...New window External Subdomain A-TITLE G DATA CyberDefense AG auf Threads
https://www.instagram.com/gdat...New window External Subdomain A-TITLE G DATA CyberDefense AG auf Instagram
https://www.youtube.com/user/G...New window External Subdomain A-TITLE G DATA CyberDefense AG auf Youtube
https://www.tiktok.com/@g_data...New window External Subdomain A-TITLE G DATA CyberDefense AG auf TikTok
https://feeds.feedblitz.com/gd...New window External Subdomain A-TITLE Erhalten Sie aktuelle Pressemeldung per RSS Feed
https://www.gdata.at/Anchor Österreich
https://www.gdata.be/External Subdomain België
https://fr.gdata.be/External Subdomain Belgique
https://www.gdata.de/External Subdomain Deutschland
https://www.gdata.es/External Subdomain España
https://www.gdata.fr/External Subdomain France
https://www.gdata.it/External Subdomain Italia
https://www.gdata.nl/External Subdomain Nederland
https://www.gdata.at/Subdomain Text duplicate Österreich
https://www.gdata.pl/External Subdomain Polska
https://www.gdata.pt/External Subdomain Portugal
https://www.gdata.ch/External Subdomain Schweiz
https://www.gdatasoftware.co.uk/External Subdomain United Kingdom
https://www.gdata-software.com/External Subdomain Canada
https://www.gdata-software.com/External Subdomain USA
https://latam.gdatasoftware.com/External Subdomain Latin America
https://br.gdatasoftware.com/External Subdomain Brazil
https://www.gdatasoftware.com/External Subdomain Global Website
/kostenlos-testenText duplicate Kostenlos testen
https://www.gdata.at/mygdataProdukt verlängern
https://www.gdata.at/mygdataProdukt wechseln
/support/zugangsdaten-verlegtZugangsdaten verlegt?
/business/partner/partner-werdenText duplicate Partner werden
https://partnerweb.gdatasoftwa...External Subdomain Text duplicate Partnerportal
/kooperationen/werbepartner-af...Text duplicate Werbepartner / Affiliates
/ueber-g-data/karriereText duplicate Job & Karriere
/ueber-g-data/auszeichnungenText duplicate Auszeichnungen
/ueber-g-data/presse-medienPresse Center
https://presse.gdata.de/External Subdomain Alle News
https://www.gdata.at/ratgeberRatgeber / Tipps & Tricks
https://www.gdata.de/help/de/h...External Subdomain FAQ
https://www.gdata.de/blogExternal Subdomain Blog
https://www.gdata.de/help/de/g...External Subdomain Text duplicate Verdächtige Datei, App oder Url einsenden
/sicherheitsluecke-meldenText duplicate Sicherheitslücke melden
https://www.gdata.de/help/de/g...External Subdomain Erkennungsrichtlinien für PUP
/vertraege-hier-kuendigenVerträge hier kündigen
https://www.gdata.at/eulaEULA
https://www.gdata.at/impressumImpressum
https://www.gdata.at/agbAGB
https://www.gdata.at/privacyDatenschutzerklärung
/zahlung-und-versandZahlung und Versand
https://www.gdata.at/kontaktText duplicate Kontakt

Server configuration

HTTP redirects
(Critically important)
This page redirects to "https://www.gdata.at/"
HTTP header
(Important)
No X-Powered HTTP header is sent.
This page uses GZip for compressed data transmission.
Performance
(Somewhat important)
The page response time is excellent with 0.08 seconds.
The file size of the HTML document is fine (113 kB).

HTTP Response Header

NameValue
servernginx
dateTue, 13 Aug 2024 16:02:55 GMT
content-typetext/html; charset=utf-8
cache-controlmax-age=61448
content-encodinggzip
content-languagede
etagW/"5dc2fb60ae38210071f9fb4fe44c1038"
expiresTue, 13 Aug 2024 22:00:00 GMT
pragmapublic
gd_country_codeIN
strict-transport-securitymax-age=31536000; includeSubDomains
x-frame-optionsSAMEORIGIN
content-security-policyframe-ancestors 'self' *.gdata.de *.gdata.ch *.gdata.fr *.gdata.at *.gdata.nl *.gdata.it *.gdata.be *.gdata.es *.gdata.pt *.gdatasoftware.co.uk *.gdatasoftware.com *.gdata-software.com *.gdata-advancedanalytics.de *.gdata-advancedanalytics.com *.gdata.co.jp *.gdata-china.com *.gdata-hongkong.com *.inventorofantivirus.com; frame-src 'self' gdata.jobbase.io player.captivate.fm gdata.onlyfy.jobs *.gdata.de *.consentmanager.net www.paypal.com *.criteo.com *.criteo.net *.onfastspring.com *.saferpay.com www.youtube-nocookie.com www.google.com www.google.de *.gdata.ch *.gdata.fr *.gdata.at *.gdata.nl *.gdata.it *.gdata.be *.gdata.es *.gdata.pt *.gdatasoftware.co.uk *.gdatasoftware.com *.gdata-software.com *.gdata-advancedanalytics.de *.gdata.co.jp *.gdata-china.com *.gdata-hongkong.com *.inventorofantivirus.com www.awin1.com *.doubleclick.net bid.g.doubleclick.net tpc.googlesyndication.com fbanalytics.org m.youtube.com player.vimeo.com gdata.jobbase.io gdata-a.akamaihd.net; report-uri https://www.gdatasoftware.com/__cspreporting__
x-xss-protection0
x-content-type-optionsnosniff
referrer-policyno-referrer-when-downgrade
statuscode200
http_versionHTTP/2

External factors

Blacklists
(Nice to have)
This website is not classified "for adult only".
This website has excellent links from other websites.
This page has backlinks from 66 referring domains.
This page has 1,982 backlinks.
This page has backlinks from 53 different ip addresses.
Facebook popularity
(Somewhat important)
The page has 0 shares and comments on Facebook.

Links from Wikipedia

No links from Wikipedia were found.

Robots.txt

User-agent: *
Disallow: /index.php*
Disallow: /*l=*
Disallow: /*lv=*
Disallow: /*uc=*
Disallow: */l/*
Disallow: */lv/*
Disallow: */uc/*
Disallow: */upgradecenter/*
Disallow: /*eID=*
Disallow: /*belboon=*
Disallow: /typo3/
Disallow: /typo3_src/
Disallow: /typo3conf/
Disallow: /stw-d8aaaec9c4

Allow: /typo3conf/ext/gd_sites/Resources/Public/*

# Internet Archiver Wayback Machine
User-agent: ia_archiver
Disallow: /

# digg mirror
User-agent: duggmirror
Disallow: /

Search preview

www.gdata.at
IT-Sicherheit Made in Germany | G DATA
Digitale Sicherheit für Ihr Unternehmen und für Sie zuhause. Managed EDR ✓ Awareness Trainings ✓ Endpoint Security ✓ Antivirus ✓ Jetzt entdecken!

Most important keywords

Following keywords were found. You can check the keyword optimization of this page for each keyword.

KeywordResultRecheck
Sicherheit77%Check
DATA76%Check
Unternehmen70%Check
Made68%Check
Germany68%Check
IT-Sicherheit Made68%Check
IT-Sicherheit66%Check
Security Made65%Check
Digitale Sicherheit65%Check
Security58%Check

Test up to 1.000 webpages of gdata.at with our free plan!

Try For Free
No trial. It's just free!

Cookie Policy

We use cookies to make our site work and also for analytics and advertising purposes. You can enable or disable optional cookies as desired. See the following links for more information.

We need these so the site can function properly

So we can better understand how visitors use our website

So we can serve you tailored ads and promotions