
Total Security
K7 Computing Home User Produkte
Hersteller![]() | Zertifizierung![]() | Schutzwirkung![]() | Geschwindigkeit![]() | Benutzbarkeit![]() | |
| Oktober 2025 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 100› | |
| August 2025 | |||||
K7 Computing Total Security 16.0 | ![]() | 83,3 | 100 | 91,7› | |
| Juni 2025 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 83,3› | |
| April 2025 | |||||
K7 Computing Total Security 16.0 | ![]() | 100 | 100 | 91,7› | |
| Februar 2025 | |||||
K7 Computing Total Security 16.0 | ![]() | 100 | 100 | 100› | |
| Dezember 2024 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 100› | |
| Oktober 2024 | |||||
K7 Computing Total Security 16.0 | ![]() | 100 | 91,7 | 100› | |
| August 2024 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 83,3› | |
| Juni 2024 | |||||
K7 Computing Total Security 16.0 | ![]() | 100 | 100 | 100› | |
| April 2024 | |||||
K7 Computing Total Security 16.0 | ![]() | 100 | 100 | 100› | |
| Februar 2024 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 91,7› | |
| Dezember 2023 | |||||
K7 Computing Total Security 16.0 | ![]() | 83,3 | 100 | 100› | |
| Oktober 2023 | |||||
K7 Computing Total Security 16.0 | ![]() | 83,3 | 100 | 100› | |
| August 2023 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 100› | |
| Juni 2023 | |||||
K7 Computing Total Security 16.0 | ![]() | 83,3 | 100 | 100› | |
| April 2023 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 100› | |
| Februar 2023 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 100› | |
| Dezember 2022 | |||||
K7 Computing Total Security 16.0 | ![]() | 83,3 | 100 | 100› | |
| Oktober 2022 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 100› | |
| August 2022 | |||||
K7 Computing Total Security 16.0 | ![]() | 100 | 100 | 100› | |
| Juni 2022 | |||||
K7 Computing Total Security 16.0 | ![]() | 100 | 100 | 91,7› | |
| April 2022 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 91,7› | |
| Februar 2022 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 91,7› | |
| Dezember 2021 | |||||
K7 Computing Total Security 16.0 | ![]() | 75 | 100 | 100› | |
| Oktober 2021 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 100› | |
| August 2021 | |||||
K7 Computing Total Security 16.0 | ![]() | 100 | 91,7 | 100› | |
| Juni 2021 | |||||
K7 Computing Total Security 16.0 | ![]() | 83,3 | 100 | 91,7› | |
| April 2021 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 91,7› | |
| Februar 2021 | |||||
K7 Computing Total Security 16 | ![]() | 83,3 | 100 | 100› | |
| Dezember 2020 | |||||
K7 Computing Total Security 16.0 | ![]() | 83,3 | 100 | 100› | |
| Oktober 2020 | |||||
K7 Computing Total Security 16.0 | ![]() | 100 | 100 | 91,7› | |
| August 2020 | |||||
K7 Computing Total Security 16.0 | ![]() | 75 | 100 | 100› | |
| Juni 2020 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 100› | |
| April 2020 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 91,7› | |
| Februar 2020 | |||||
K7 Computing Total Security 16.0 | ![]() | 91,7 | 100 | 100› | |
| Dezember 2019 | |||||
K7 Computing Total Security 16.0 | ![]() | 100 | 91,7 | 100› | |
| Oktober 2019 | |||||
K7 Computing Total Security 16 | ![]() | 100 | 100 | 91,7› | |
| August 2019 | |||||
K7 Computing Total Security 16 | ![]() | 100 | 100 | 83,3› | |
| Juni 2019 | |||||
K7 Computing Total Security 15.1 | ![]() | 91,7 | 91,7 | 91,7› | |
| April 2019 | |||||
K7 Computing Total Security 15.1 | ![]() | 91,7 | 91,7 | 100› | |
| Februar 2019 | |||||
K7 Computing Total Security 15.1 | ![]() | 91,7 | 91,7 | 100› | |
| Dezember 2018 | |||||
K7 Computing Total Security 15.1 | ![]() | 83,3 | 91,7 | 100› | |
| Oktober 2018 | |||||
K7 Computing Total Security 15.1 | ![]() | 91,7 | 100 | 91,7› | |
| August 2018 | |||||
K7 Computing Total Security 15.1 | ![]() | 100 | 75 | 91,7› | |
| Juni 2018 | |||||
K7 Computing Total Security 15.1 | ![]() | 100 | 91,7 | 83,3› | |
| April 2018 | |||||
K7 Computing Total Security 15.1 | ![]() | 91,7 | 91,7 | 91,7› | |
| Februar 2018 | |||||
K7 Computing Total Security 15.1 | ![]() | 91,7 | 83,3 | 83,3› | |
| Dezember 2017 | |||||
K7 Computing Total Security 15.1 | ![]() | 83,3 | 75 | 100› | |
| Oktober 2017 | |||||
K7 Computing Total Security 15.1 | ![]() | 83,3 | 91,7 | 83,3› | |
| August 2017 | |||||
K7 Computing Total Security 15.1 | ![]() | 75 | 91,7 | 83,3› | |
| Juni 2017 | |||||
K7 Computing Total Security 15.1 | ![]() | 91,7 | 100 | 91,7› | |
| April 2017 | |||||
K7 Computing Total Security 15.1 | ![]() | 91,7 | 66,7 | 91,7› | |
| Februar 2017 | |||||
K7 Computing Total Security 15.1 | ![]() | 83,3 | 83,3 | 91,7› | |
| Dezember 2016 | |||||
K7 Computing Total Security 15.1 | ![]() | 83,3 | 91,7 | 83,3› | |
| Oktober 2016 | |||||
K7 Computing Total Security 15.1 | ![]() | 91,7 | 66,7 | 66,7› | |
| August 2016 | |||||
K7 Computing Total Security 15.1 | ![]() | 83,3 | 83,3 | 75› | |
| Juni 2016 | |||||
K7 Computing Total Security 15.1 | ![]() | 91,7 | 91,7 | 66,7› | |
| April 2016 | |||||
K7 Computing Total Security 15.1 | ![]() | 100 | 83,3 | 75› | |
| Februar 2016 | |||||
K7 Computing Total Security 15.1 | ![]() | 91,7 | 83,3 | 91,7› | |
| Dezember 2015 | |||||
K7 Computing Total Security 15.1 | ![]() | 91,7 | 83,3 | 83,3› | |
| Oktober 2015 | |||||
K7 Computing Total Security 15.1 | ![]() | 75 | 83,3 | 75› | |
| August 2015 | |||||
K7 Computing Total Security 14.2 & 15.1 | ![]() | 100 | 75 | 91,7› | |
| Juni 2015 | |||||
K7 Computing Total Security 14.2 | ![]() | 91,7 | 91,7 | 83,3› | |
| April 2015 | |||||
K7 Computing Total Security 14.2 | ![]() | 75 | 75 | 83,3› | |
| Februar 2015 | |||||
K7 Computing Total Security 14.2 | ![]() | 58,3 | 75 | 83,3› | |
| Dezember 2014 | |||||
K7 Computing Total Security 14.2 | ![]() | 41,7 | 58,3 | 91,7› | |
| Februar 2014 | |||||
K7 Computing Total Security 14.1 | ![]() | 66,7 | 58,3 | 75› | |
| Dezember 2013 | |||||
K7 Computing Total Security 13.1 | ![]() | 41,7 | 58,3 | 75› | |
| Oktober 2013 | |||||
K7 Computing Total Security 13.1 | 25 | 58,3 | 66,7› | ||
| August 2013 | |||||
K7 Computing Total Security 13.1 | ![]() | 33,3 | 58,3 | 83,3› | |
| Juni 2013 | |||||
K7 Computing Total Security 13.1 | 16,7 | 58,3 | 83,3› | ||

Hersteller

Zertifizierung

Schutzwirkung

Geschwindigkeit

Benutzbarkeit













































































