Specification of health data transfer from devices to DiGA (§ 374a SGB V)
: Monitors system activity to block threats before they can execute.
Modern versions of the software often bundle additional privacy and security tools:
: Shields vulnerable applications (like web browsers and PDF readers) from code execution attacks. Integrated Utilities
: Scans the dark web for compromised personal information. Comparative Market Standing