b. Hourly Updates.
c. System Analyzer which detects any suspicious activity on your PC.
d. Vulnerability detection seeks out recommended patches and updates for various programs.
e. Anti Phishing.
f. Virtual Keyboard to help secure your entries on banking and shopping transactions.
3. ESET NOD 32
b. Stops threats that may enter through various removable devices so you can share files easily without any worries.
c. SysInspector and SysRescue that performs system scan and diagnosis with confidence.
d. Self Defense prevents malwares and spywares.
e. SSL encrypted.
f. Free technical support.
4. AVG
b. Surf and Download confidently and securely.
c. Protection against phishing and fraud sites.
d. Keeps threats out of system.
e. Support and assistance.
5. Norton
b. Bot Protection.
c. Pulse Updates.
d. Networking Mapping to detect any threats from networks.
e. SONAR 3 Behavioral Protection which scans your computer for suspected programs.
f. Norton Bootable Recovery Tool that creates backups regularly.
6. Avira
b. Anti Phishing protects against phishing.
c. Anti Rootkit.
d. Mail Guard scans all your incoming emails and FTP transfers.
e. Rescue System creates backup time to time.
f. AntiVirProActiv.
g. AHeAD Technology detects unknown viruses by their profiles.
h. Netbook Support.
i. Avira Support.
7. McAfee
b. On-access file scanner.
c. Daily updating of virus database.
d. Site Advisor which displays the safety rating of various websites that we surf.
e. System Guards which protects your computer.
f. X-Ray rootkit detection.
8. Avast
b. File System Shield.
c. Mail Shield scans all your attachments and mails.
d. Web Shield protects against any HTTP proxies.
e. P2P shield protects from P2P file viruses.
f. Script Blocker disables any malicious script.
g. Network Shield which acts as an intrusion detection system.
9. Trend Micro
b. Anti-spyware.
c. Real Time Updates.
d. Cloud Technology support which helps in creating backups.
e. Automatic protection.
f. Streamlined interface.
10. Webroot
b. Spy Sweeper that protects against spywares.
c. Easy to use protection.
d. blocks, detects and removes threats.
e. Great value for money.