Wednesday, July 24, 2019

Marketing Planning and Strategy (The buying process)2 Assignment

Marketing Planning and Strategy (The buying process)2 - Assignment Example As a result programmers and computer engineers have strived continually to find solutions to this. Anti-viruses have been produced over the years to deal with the different malware that arise. These anti-viruses, which can be acquired online, help in fighting malware and shielding computers from further entry and attack from them. This papers aims at discussing the online purchase process that can be used in purchasing antivirus. With the increased cases of cyber threats, many computer users are compelled to take preventive measures to enhance security of their data. There are a number of antiviruses that are always available for purchase online. The antiviruses have varying characteristics which depends on the specific type of system protection that a business organization is interested in (Sabri, Gupta, & Beitler, 2007). Computers user intending to purchase antiviruses online have to identify the different types and their potential benefits. The Norton anti-virus is one such product. It was developed by the American corporation known as Symantec that identified the continuous need to protect computers and other devices from attacks from malware attacks. The antivirus uses signatures and heuristics to identify the type of virus in invasion (MezgaÃŒ r, 2006). They provide internet security, phishing protection and email spam filtering. The product is well known in the computer market and is highly recommended for cases where the windows operating system is being used. This makes it very popular because of the fact those windows operating system is currently the most popular operating system (Mansour, 2013). The Bit-defender, a Romanian developed anti-virus is another antivirus that is common in the market. It ranks higher than Norton in terms of functionalities and effectiveness. Its package comes with the antivirus, anti-spyware, email-spam filtering, a firewall, backup,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.