Public Sector | Anti-malware capabilities
Engine name | Vendor name | Country | Detection |
---|---|---|---|
ClamAV | ClamAV | USA | Signature based |
AhnLab | Harbin AhnLab Technology | South Korea | Signature based |
Avira | Avira | Germany | Signature and AI based |
ESET | ESET | Slovakia | Signature based |
Bitdefender | Bitdefender | Romania | Signature based |
K7 | K7 Computing Private | India | Signature based |
Quick Heal | Quick Heal Technologies | India | Signature based |
Vir.IT | TG Soft | Italy | Signature based |
Cyren | Cyren | Israel | Signature based |
Emsisoft | Emsisoft | New Zealand | Signature based |
IKARUS | IKARUS Security Software | Austria | Signature based |
TACHYON | INCA Internet | South Korea | Signature based |
Comodo | Comodo | USA | Signature based |
McAfee | McAfee | USA | Signature based |
Sophos | Sophos | UK | Signature based |
CrowdStrike Falcon ML | CrowdStrike | USA | AI based |
RocketCyber | RocketCyber | USA | AI based |
Webroot SMD | OpenText | USA | Signature and AI based |
Lionic | Lionic Corp | Taiwan | Signature based |
Lavasoft | Adaware | Canada | Signature based |
Microsoft Defender | Microsoft | USA | Signature based |
NETGATE | Netgate Technologies | Slovakia | Signature based |
Scrutiny | Cyberstanc | USA | AI based |
Xvirus Anti-Malware | Xvirus | Portugal | Signature based |
Systweak | Systweak | India | Signature based |
Cylance | BlackBerry | Canada | AI based |
Please check the configuration page in the product for the detail Detection methods (Heuristic, Archive extraction, ...) of each engine
Was this page helpful?