15 years helping New Zealand businesses
choose better software
Antivirus software
AntiVirus software handles the detection and removal of computer viruses using anomaly detection, threat response and real-time monitoring capabilities. Organizations use these applications to provide additional internet security for their workstations and servers. AntiVirus solutions typically offer real-time monitoring to detect a wide variety of potential threats including: viruses, worms, trojans, hackers as well as email spam and other forms of attempted intrusions. AntiVirus software isolates and disables potentially malicious applications discovered by continuous monitoring, notifying users when suspect items have been identified and quarantined. AntiVirus software is related to Computer Security software and Spyware Removal software. Read more Read less
Featured software
Most reviewed software
Explore the most reviewed products by our users on the Antivirus software
34 results
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans

Admin By Request
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans
Features
- Anomaly/Malware Detection
- Threat Response
- Real Time Monitoring
- Automatic Scans