Avira Operations GmbH is a German multinational
computer security software
Computer security software or cybersecurity software is any computer program designed to influence information security. This is often taken in the context of defending computer systems or data, yet can incorporate programs designed specifically ...
company mainly known for their Avira Free Security
antivirus software
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the nam ...
. Avira was founded in 2006, but the antivirus application has been under active development since 1986, through its predecessor company H+BEDV Datentechnik GmbH. Since 2021, Avira is owned by American software company NortonLifeLock (now
Gen Digital
Gen Digital Inc. (formerly Symantec Corporation and NortonLifeLock) is a multinational software company co-headquartered in Tempe, Arizona and Prague, Czech Republic. The company provides cybersecurity software and services. Gen is a Fortune 5 ...
), after being previously owned by investment firm
Investcorp
Investcorp is a global manager of alternative investment products, for private and institutional clients. Founded in Bahrain in 1982, the firm has offices in United States, United Kingdom, Saudi Arabia, Qatar, United Arab Emirates, India, China, ...
.
The company also has offices in the
United States
The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territorie ...
,
China
China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's most populous country, with a population exceeding 1.4 billion, slightly ahead of India. China spans the equivalent of five time zones and ...
,
Romania
Romania ( ; ro, România ) is a country located at the crossroads of Central Europe, Central, Eastern Europe, Eastern, and Southeast Europe, Southeastern Europe. It borders Bulgaria to the south, Ukraine to the north, Hungary to the west, S ...
, and
Japan
Japan ( ja, 日本, or , and formally , ''Nihonkoku'') is an island country in East Asia. It is situated in the northwest Pacific Ocean, and is bordered on the west by the Sea of Japan, while extending from the Sea of Okhotsk in the north ...
.
Technology
Virus definition
Avira periodically "cleans out" its virus definition files, replacing specific signatures with generic ones for a general increase in performance and scanning speed. A 15
MB database clean-out was made on 27 October 2008, causing problems to the users of the Free edition because of its large size and Avira's slow Free edition servers. Avira responded by reducing the size of the individual update files, delivering less data in each update. Nowadays there are 32 smaller definition files that are updated regularly in order to avoid peaks in the download of the updates.
Its file-by-file scanning feature has jokingly been titled "Luke Filewalker" by the developers, as a reference to the
Star Wars
''Star Wars'' is an American epic film, epic space opera multimedia franchise created by George Lucas, which began with the Star Wars (film), eponymous 1977 film and quickly became a worldwide popular culture, pop-culture Cultural impact of S ...
media franchise character "
Luke Skywalker
Luke Skywalker is a fictional character and the protagonist of the original film trilogy of the ''Star Wars'' franchise created by George Lucas. Portrayed by Mark Hamill, Luke first appeared in ''Star Wars'' (1977), and he returned in ''The ...
".
Advance heuristic
Avira products contain
heuristics
A heuristic (; ), or heuristic technique, is any approach to problem solving or self-discovery that employs a practical method that is not guaranteed to be optimal, perfect, or rational, but is nevertheless sufficient for reaching an immediate, ...
that proactively uncover unknown malware, before a special virus signature to combat the damaging element has been created and before a virus guard update has been sent.
Heuristic virus detection involves extensive analysis and investigation of the affected codes for functions typical of malware. If the code being scanned exhibits these characteristic features it is reported as being suspicious, although not necessarily malware; the user decides whether to act on or ignore the warning.
ProActiv
The ProActiv component uses rule sets developed by the Avira Malware Research Center to identify suspicious behavior. The rule sets are supplied by Avira databases. ProActiv sends information on suspicious programs to the Avira databases for logging.
Firewall
Avira removed their own firewall technology from 2014 onwards, with protection supplied instead by
Windows Firewall
Windows Firewall (officially called Microsoft Defender Firewall in Windows 10 version 2004 and later) is a firewall component of Microsoft Windows. It was first included in Windows XP SP2 and Windows Server 2003 SP1. Before the release of Windows ...
(
Windows 7
Windows 7 is a major release of the Windows NT operating system developed by Microsoft. It was released to manufacturing on July 22, 2009, and became generally available on October 22, 2009. It is the successor to Windows Vista, released nearly ...
and after), because
Windows 8
Windows 8 is a major release of the Windows NT operating system developed by Microsoft. It was Software release life cycle#Release to manufacturing (RTM), released to manufacturing on August 1, 2012; it was subsequently made available for downl ...
, and later the
Microsoft
Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washing ...
Certification Program, forces developers to use interfaces introduced in
Windows Vista
Windows Vista is a major release of the Windows NT operating system developed by Microsoft. It was the direct successor to Windows XP, which was released five years before, at the time being the longest time span between successive releases of ...
.
Protection Cloud
Avira Protection Cloud (APC) was first introduced in version 2013. It uses information available via the Internet (cloud computing) to improve detection and affect system performance less. This technology was implemented in all paid 2013 products.
APC was initially only used during a manual quick system scan; later it was extended to real-time protection.
Partners
Avira offers its antivirus engine in the form of a
software development kit
A software development kit (SDK) is a collection of software development tools in one installable package. They facilitate the creation of applications by having a compiler, debugger and sometimes a software framework. They are normally specific to ...
to implement in complementary products. Strategic and technology partners of Avira include Canonical, CYAN Networks, IBM, intelligence AG, Microsoft, novell, OPSWAT, Synergy Systems and others.
On 4 September 2014, Avira announced a partnership with Dropbox, to combine Avira's security with Dropbox's "sync and share" capabilities.
Tjark Auerbach, the founder of Avira sold almost 100% stakes of the company to the
Investcorp Group of Manama (
Bahrain
Bahrain ( ; ; ar, البحرين, al-Bahrayn, locally ), officially the Kingdom of Bahrain, ' is an island country in Western Asia. It is situated on the Persian Gulf, and comprises a small archipelago made up of 50 natural islands and an ...
) in April 2020.
The stakes were reportedly sold at a price of 180 million dollars. The Investcorp Group has invested in several other firms from the cybersecurity sector in the past. The directors of Investcorp Group belong to several royal families of Middle East countries like
Kuwait
Kuwait (; ar, الكويت ', or ), officially the State of Kuwait ( ar, دولة الكويت '), is a country in Western Asia. It is situated in the northern edge of Eastern Arabia at the tip of the Persian Gulf, bordering Iraq to the nort ...
,
Bahrain
Bahrain ( ; ; ar, البحرين, al-Bahrayn, locally ), officially the Kingdom of Bahrain, ' is an island country in Western Asia. It is situated on the Persian Gulf, and comprises a small archipelago made up of 50 natural islands and an ...
,
Saudi Arabia
Saudi Arabia, officially the Kingdom of Saudi Arabia (KSA), is a country in Western Asia. It covers the bulk of the Arabian Peninsula, and has a land area of about , making it the fifth-largest country in Asia, the second-largest in the A ...
, etc. However, 20% of its total ordinary and preferred shares are owned by the
Abu Dhabi
Abu Dhabi (, ; ar, أَبُو ظَبْيٍ ' ) is the capital and second-most populous city (after Dubai) of the United Arab Emirates. It is also the capital of the Emirate of Abu Dhabi and the centre of the Abu Dhabi Metropolitan Area.
...
-based
Mubadala Group since 2017. The
UAE
The United Arab Emirates (UAE; ar, اَلْإِمَارَات الْعَرَبِيَة الْمُتَحِدَة ), or simply the Emirates ( ar, الِْإمَارَات ), is a country in Western Asia (The Middle East). It is located at th ...
also serves as the headquarter of a cybersecurity firm discredited for its involvement in
human rights
Human rights are Morality, moral principles or Social norm, normsJames Nickel, with assistance from Thomas Pogge, M.B.E. Smith, and Leif Wenar, 13 December 2013, Stanford Encyclopedia of PhilosophyHuman Rights Retrieved 14 August 2014 for ce ...
abuses against activists, dissidents arrested for criticizing the monarchy; conducting cyber offensives against FIFA officials, and the ruler of
Qatar
Qatar (, ; ar, قطر, Qaṭar ; local vernacular pronunciation: ), officially the State of Qatar,) is a country in Western Asia. It occupies the Qatar Peninsula on the northeastern coast of the Arabian Peninsula in the Middle East; it sh ...
; and the surveillance over
Jamal Khashoggi
Jamal Ahmad Khashoggi (; ar, جمال أحمد خاشقجي, Jamāl ʾAḥmad Ḵāšuqjī, ; 13 October 1958 – 2 October 2018) was a Saudi journalist, dissident, author, columnist for ''Middle East Eye'' and ''The Washington Post'', and a ge ...
. The chairman of the Mubadala Group owns an institute called ECSSR or the Emirates Center for Strategic Studies & Research, which allegedly influenced German academics to gain soft-power and impact policies in the conflict of interest of the UAE.
On December 7, 2020,
NortonLifeLock
Gen Digital Inc. (formerly Symantec Corporation and NortonLifeLock) is a multinational software company co-headquartered in Tempe, Arizona and Prague, Czech Republic. The company provides cybersecurity software and services. Gen is a Fortune 50 ...
announced acquisition of Avira for approximately US$360 million from
Investcorp Technology Partners. The acquisition was closed in January 2021.
In February 2021, BullGuard joined Avira as part of NortonLifeLock.
Products
Windows
Avira offers the following security products and tools for
Microsoft Windows
Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
:
* Avira Free Antivirus: The free edition antivirus/anti-spyware, for non-commercial use, with promotional pop-ups.
* Avira Antivirus Pro: The premium edition antivirus/anti-spyware.
* Avira System Speedup Free: A free suite of PC tune-up tools.
* Avira System Speedup Pro: The premium edition of the suite of PC tune-up tools.
* Avira Internet Security Suite: Consists of Antivirus Pro + System Speedup + Firewall Manager.
* Avira Ultimate Protection Suite: Consists of Internet Security Suite + additional PC maintenance tools (e.g. SuperEasy Driver Updater).
* Avira Rescue System: A set of free tools that include a utility used to write a
Linux
Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
-based
bootable CD
ISO 9660 (also known as Ecma International, ECMA-119) is a file system for CD-ROM, optical disc media. Being sold by the International Organization for Standardization (ISO) the file system is considered an International standard, international ...
. It can be used to clean an unbootable PC, and is also able to find malware that hides when the host's operating system is active (e.g., some
rootkit
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the exis ...
s). The tool contains the antivirus program and the virus database current at the time of download. It boots the machine into the antivirus program, then scans for and removes malware, and restores normal boot and operation if necessary.
OS X
* Avira Free Mac Security for Mac: Runs on OS X 10.9 and above.
Android and iOS
Avira offers the following security applications for mobile devices running
Android
Android may refer to:
Science and technology
* Android (robot), a humanoid robot or synthetic organism designed to imitate a human
* Android (operating system), Google's mobile operating system
** Bugdroid, a Google mascot sometimes referred to ...
and
iOS
iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone; the term also includes ...
:
* Avira Antivirus Security for Android: Free application for Android, runs on versions 2.2 and above.
* Avira Antivirus Security Pro for Android: Premium edition for Android, runs on versions 2.2 and above. Available as an upgrade from within the free application.
it provide additional Safe browsing, Hourly update and free tech support.
;Avira Mobile Security for iOS: Free edition for iOS devices, such as
iPhone and
iPad
The iPad is a brand of iOS and iPadOS-based tablet computers that are developed by Apple Inc. The iPad was conceived before the related iPhone but the iPhone was developed and released first. Speculation about the development, operating s ...
.
Other products
* Avira Phantom VPN: Avira's
virtual private network
A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
software for Android, iOS, macOS and Windows.
* Avira Prime: In April 2017 Avira launched a single-user, multi-device subscription-based product designed to provide a complete set of all Avira products available for the duration of the license along with premium support.
Avira Prime is compatible with Windows, OSX, iOS, and Android operating systems and related devices and is available to consumers in 5- and 25-device editions, dubbed "Avira Prime" and "Avira Prime Unlimited" respectively.
Subscriptions are in 30-day and 1-year increments.
Discontinued platforms
Avira formerly offered free antivirus software for
Unix
Unix (; trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and ot ...
and
Linux
Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
. That was discontinued in 2013, although updates were supplied until June 2016.
Security vulnerabilities
In 2005, Avira was hit by ACE archive
buffer overflow
In information security and programming, a buffer overflow, or buffer overrun, is an anomaly whereby a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations.
Buffers are areas of memory ...
vulnerability. A remote attacker could have exploited this vulnerability by crafting an ACE archive and delivering it via a malicious web page or e-mail. A buffer overflow could occur when Avira scanned the malicious archive. That would have allowed the attacker to execute arbitrary code on the affected system.
In 2010, Avira Management Console was hit by the
use-after-free
Dangling pointers and wild pointers in computer programming are pointers that do not point to a valid object of the appropriate type. These are special cases of memory safety violations. More generally, dangling references and wild references are ...
remote code execution vulnerability. The vulnerability allowed remote attackers to execute arbitrary code on vulnerable installations of Avira Management Console. Authentication was not required to exploit the vulnerability.
In 2013, Avira engines were hit by a
0-day vulnerability that allowed attackers to get access to a customer's PC. The bug was found in the avipbb.sys driver file and allowed
privilege escalation
Privilege escalation is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The res ...
.
Awards and reviews
In January 2008, Anti-Malware Test Lab gave Avira "gold" status for proactive virus detection and detection/removal of rootkits.
AV-Comparatives
AV-Comparatives is an Austrian independent organization that tests and assesses antivirus software, regularly releasing charts and reports that are freely available to the public and the media. Antivirus vendors have to meet various requirements r ...
awarded Avira its "AV Product of the Year" award in its "Summary Report 2008."
In April 2009, ''
PC Pro
''PC Pro'' is one of several computer magazines published monthly in the United Kingdom by Future plc. Its headquarters is in London. ''PC Pro'' also licenses individual articles (or even the whole magazine) for republication in various countri ...
'' awarded Avira Premium Security Suite 9 the maximum six stars and a place on its A-list for Internet security software.
In August 2009, Avira performed at a 98.9% percent overall malware detection rate, and was the fastest for both on-demand scans and on-access scans conducted by ''
PC World
''PC World'' (stylized as PCWorld) is a global computer magazine published monthly by IDG. Since 2013, it has been an online only publication.
It offers advice on various aspects of PCs and related items, the Internet, and other personal tech ...
'' magazine, which ranked it first on its website.
Avira was among the first companies to receive OESIS OK Gold Certification, indicating that both the antispyware and antivirus components of several of its security products achieved the maximum compatibility score with widespread network technologies such as
SSL/TLS
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securi ...
VPN
A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
and
Network Access Control
Network access control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security ...
from companies including
Juniper Networks
Juniper Networks, Inc. is an American multinational corporation headquartered in Sunnyvale, California. The company develops and markets networking products, including routers, switches, network management software, network security products, ...
,
Cisco Systems
Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational corporation, multinational digital communications technology conglomerate (company), conglomerate corporation headquartered in San Jose, California. Cisco develo ...
, and
SonicWALL
SonicWall is an American cybersecurity company that sells a range of Internet appliances primarily directed at content control and network security. These include devices providing services for network firewalls, unified threat management (UTM) ...
.
In February 2010, testing by firm
AV-TEST
AV-TEST is an independent organization which evaluates and rates antivirus and security suite software for Microsoft Windows and Android operating systems, according to a variety of criteria. The organisation is based in Magdeburg, Germany.
Ever ...
, Avira tied for first place (with another German company) in the "malware on demand" detection test and earned a 99% score in the "adware/spyware on demand" test.
AV-Comparatives gave Avira its Silver award (for 99.5% detection rate) in its "Summary Report 2010."
For 2012, AV-Comparatives awarded Avira with "gold" status for its 99.6% performance in the "On-Demand Malware Detection" category and classified Avira as a "Top Rated" product overall for that year.
In the AV-Comparatives August 2014 "Real-World Protection Test," with 669 total test cases tried against various security products, Avira tied for first place.
AV-Comparatives awarded Avira its "AV Product of the Year" award in its "Summary Report 2016."
See also
*
Comparison of antivirus software
This article compares notable antivirus products and services. It is Wikipedia list article rather than a deep analysis of the strengths and weaknesses of each.
Legend
The term "on-demand scan" refers to the possibility of performing a manual ...
*
Comparison of firewalls
Comparison or comparing is the act of evaluating two or more things by determining the relevant, comparable characteristics of each thing, and then determining which characteristics of each are similar to the other, which are different, and t ...
*
Comparison of virtual private network services
A virtual private network (VPN) service provides a proxy server to help users Internet censorship circumvention, bypass Internet censorship such as Geo-blocking, geoblocking and users who want to protect their communications against data profiling ...
References
External links
*
Auerbach Stiftung (Foundation)
{{Antivirus software
Antivirus software
Freeware
Software companies established in 1986
Computer security software
Computer security software companies
Software companies of Germany
Windows security software
Linux security software
MacOS security software
Android (operating system) software
1986 establishments in West Germany
2020 mergers and acquisitions
2021 mergers and acquisitions
Gen Digital acquisitions
Gen Digital software
Firewall software
German brands