Feeds

Avast still focused on Windows, despite new Mac security app

Czech firm aims to checkmate VXers

Using blade systems to cut costs and sharpen efficiencies

Free security software outfit Avast reckons unprotected Windows desktops still offer its greatest potential area for growth, despite its huge existing Windows user-base of 130 million active users.

In addition to pushing out its technology to small businesses, the Czech Republic-based firm plans to offer an Android-based version of its software (designed primarily to protect jailbroken devices) as well as a personal VPN application.

Avast released a new Mac antivirus beta at the beginning of June. The security firm previously offered a paid-for Mac security product but this was a marginal offering. "It wasn't good enough to be free," joked Avast chief exec Vince Steckler.

Ondrej Vlcek, CTO at Avast, told the days when Macs were a "fringe target" for malware authors are over. "As Mac sales surge it is becoming a natural target for malware such as the MacDefender fake antivirus," he said.

"The Mac platform isn't any safer," he added.

Avast has written more than 3 million signatures for its Windows anti-virus software compared to 1,000 for its Mac security product. Nonetheless the firm reckons (probably correctly) that there's now money to be made from Mac malware and hence a need for protection.

Avast's product will compete with Sophos's free-of-charge Mac security software and paid-for applications but the focus of the firm remains firmly on the Windows desktop.

Milos Korenko, marketing director at Avast, told El Reg that despite its maturity, the Windows desktop anti-virus market is far from saturated. "The growth in PC usage in China and India combined with the growing use of two or three PCs per home in the West means there are as many as 600 million unprotected machines out there," Korenko, who used to work with Avast's arch-rival AVG said. "We want to grow our user base to 300 million."

"All this can happen hand-in-hand with our parallel growth onto new platforms, such as Macs," he added.

Avast aims to make its technology more attractive to potential users compared to other freebie scanners from AVG, Avira and Microsoft through a variety of tactics. It wants to make its software speedy by avoiding any temptation to add search toolbars or other performance draggers. "Search toolbars would pump revenue in the short term but lose the community in the longer term," explained Steckler.

Similarly the firm wants to avoid the use of intrusive pop-ups in favour of "low-key" incentives to encourage established users into paying for a paid-for product which bundles extra features such as a sandbox and personal firewall. Avast places great reliance on tech support from its community of users.

Avast execs said that by maintaining a direct relationship with users it can cut out the middlemen – computer equipment manufacturers such as HP, and retailers such as Dixon. It reckons HP charges $250m to distribute Symantec's Norton security software on new PCs. Such deals make sense but only reach break-even after two years.

The Czech-based security firm does use regional distributors and resellers, especially in its main sales channels such as the US, France and Brazil, but it prefers to stay away from pre-loaded software or retail channels, which are prime distribution channels for the like of Symantec and McAfee.

Steckler said that free scanners were either "as good as or better than" paid products. Korenko added that, perhaps surprisingly, Microsoft was one of its top referrers. "Most home users don't look at features so we rely on tech-savvy influencers to point users in our direction," he concluded. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.