santiago silver - Fotolia
The widespread use of malicious software to steal data, take control of computers and commit other forms of cybercrime has led to the emergence of many alternatives to Windows Defender in the desktop security marketplace.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Even though Windows 8 and Windows 8.1 are more secure than the operating systems that came before them, the need for cybersecurity hasn't diminished, according to the PWC 2014 U.S. State of Cybercrime Survey and the RSA Cybercrime Report for 2014.
Fortunately, there are several well-established antivirus vendors and desktop antimalware offerings, including:
- Symantec Norton 360 2015
- Kaspersky Total Security
- BitDefender Anti-virus
- McAfee Anti-virus
- Avira Free Anti-Virus
You should also consider adding other desktop utilities or security tools because vendors often bundle multiple products. For example, you might get antimalware and backup features from one vendor while another may offer antimalware, firewall and content filtering capabilities.
Firewalls are intended to prevent network traffic on ports that are not accessed by applications you routinely use. Content filters can help block malicious sites that you don't want employees accessing while at work, such as online gambling.
A more in-depth comparison of Windows 8 Defender and third-party tools
Windows Defender isn't on by default in Windows 8, requires more protection
Top five new security features in Windows 8.1
Watch third-party apps, privacy when evaluating Windows 8 security
Microsoft tightens security in Windows 8, but IT worries persist
Dig Deeper on Network intrusion detection and prevention and malware removal
Related Q&A from Dan Sullivan
Docker's recent upgrade introduced support for hardware signing and in the future, automated security analysis on Docker images. Expert Dan Sullivan ...continue reading
Cisco's new project Contiv automates operational policies for containerized applications in the cloud. Expert Dan Sullivan explains the benefits of ...continue reading
Dropbox API abused by attackers posing as legitimate users in a huge spear phishing campaign. Expert Dan Sullivan explains how to mitigate the risks ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.