Windows Anti-Malware Market Share Report, August 2019
OPSWAT’s streamlined Market Share Report provides monthly updates on the market share of leading anti-malware vendors and products. This report focuses on the market share of anti-malware products versus traditional antivirus engines, as they offer protection from a greater range of threats such as PUAs, ransomware, spyware, key-loggers and botnets. For each vendor represented in this report, additional data is available on the market share of the vendor’s individual products.
The data in this report was generated on August 26th, 2019 and includes data collected in the last 6 months from users of MetaAccess and other products. MetaAccess prevents risky devices from accessing local networks and cloud applications using OPSWAT’s industry-leading endpoint security and advanced threat prevention technologies. The information in this report is representative of tens of millions of data points collected from over 30,000 live endpoints and includes both corporate and home users.
Although Microsoft is heavily saturated in the anti-malware product market, we have excluded this vendor because we feel that its products do not accurately represent the user's product of choice as they come pre-installed on many Windows systems and cannot be removed. We also have previous Market Share Reports available for comparing data from past reports. OPSWAT is committed to providing both timely and accurate information in these reports.


- ファイルアップロードの保護 – 10 のベストプラクティスで サイバー攻撃を防御
- MetaDefenderによる世界で最も危険なマルウェアEmotetの防御
- OPSWAT Expands Global Availability of Critical Infrastructure Protection
- OPSWAT Announces Expansion of Cybersecurity Training Program
- Avoiding storage data leaks and PII regulation noncompliance
- How OPSWAT Can Help Detect and Prevent the VMware WorkSpace ONE Access exploit (CVE-2020-4006)
- Protecting Critical Infrastructure from Advanced Cyberattacks
- MetaDefender Cloud Hash Reputation Database Now Exceeds 40 Billion
- OPSWAT Continues to Expand OESIS Framework with New Partners
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure