Contact Details

Avast Software s.r.o.

Located in Czech Republic, Praha, Prague

Founded in 1988

Best For User Type

  • Full content and URL filtering
  • Active directory integration
  • Cloud sandboxing and firewall protection
  • Enhanced security
Search

Compare product ratings to similar products Find other products with similar features to suit your business

contact us

Have you used this product before? Find other productswith similar features to suit your business

Write a review

Does this product belong to you

Alternatives to Avast

GLASSWIRE network security

GLASSWIRE network security

No ratings yet!
Watchguard

Watchguard

No ratings yet!
ESET ENDPOINT  NETWORK SECURITY

ESET ENDPOINT NETWORK SECURITY

No ratings yet!
Webroot

Webroot

No ratings yet!
Gfi languard

Gfi languard

No ratings yet!
Mcafee network security

Mcafee network security

No ratings yet!
Sophos

Sophos

No ratings yet!
Norton 360

Norton 360

No ratings yet!
Broadcom

Broadcom

No ratings yet!
FireEye Network security

FireEye Network security

No ratings yet!
View all alternatives

What is Avast?

Show Less

Contact Details

Avast Software s.r.o.

Located in Czech Republic, Praha, Prague

Founded in 1988

Best For User Type

  • Full content and URL filtering
  • Active directory integration
  • Cloud sandboxing and firewall protection
  • Enhanced security

Top Industries Represented

Data from Grid Report for Network Security Software

View grid data

Deployment & Support

Deployment

  • Cloud, Saas, Web-based
  • Desktop-mac
  • Desktop-Windows
  • Desktop-Linux
  • Desktop-Chromebook
  • On Promise Windows
  • On Premise Linux
  • Mobile-Android
  • Mobile-Iphone
  • Mobile-Ipad

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live Recap)

Training

  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos

Avast Pricing  View vendors pricing

Check out our offers for each of our packages to get best out of the software

Avast premium security

1,599
per 10 devices/year

    Visit us on our website to know more

    Get a custom quote

    Avast Features

    Primary Features

    Access Controls/Permissions

    Access control is a security technique that regulates who or what can view or use resources in a computing environment. It is a fundamental concept in security that minimizes risk to the business or organization.

    Activity Monitoring

    User activity monitoring is the process of actively monitoring and tracking the behavior of employees across IT resources owned by your company, such as devices and networks.

    Intrusion Detection System

    An Intrusion Detection System (IDS) is a monitoring system that detects suspicious activities and generates alerts when they are detected.

    Firewalls

    A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

    Threat Response

    Threat Response monitors activity in real time and generates alerts when potential malicious behavior is detected.

    Vulnerability Scanning

    Vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes.

    Real Time Monitoring

    RTM, therefore, allows network administrators and engineers to see and respond to network events such as faults, failures, performance, health and usage, slow systems among other issues that can cause organization systems or network downtime as they occur.

    Reporting/Analytics

    It is an approach to cybersecurity that uses data collection, data aggregation and analysis tools for threat detection and security monitoring.

    Alerts/Notifications

    Network alerts are a crucial aspect of network performance monitoring, as they're designed to provide IT admins with quick insight into network issues, allowing for faster troubleshooting.

    Secondary Features

    • Vulnerability Protection
    • Endpoint Protection
    • Vpn

    Compare with Similar Products

    GLASSWIRE network security

    GLASSWIRE network security

    Watchguard

    Watchguard

    ESET ENDPOINT  NETWORK SECURITY

    ESET ENDPOINT NETWORK SECURITY

    Webroot

    Webroot

    Gfi languard

    Gfi languard

    Mcafee network security

    Mcafee network security

    Sophos

    Sophos

    Norton 360

    Norton 360

    Broadcom

    Broadcom

    FireEye Network security

    FireEye Network security

    Show Comparisons

    Resources