Emsisoft: Quite Possibly The Most Privacy Conscious Anti-Malware Around


In a post-Snowden Internet, personal privacy is a top concern for more Internet citizens than it ever has been before. More than ever, people want to know if the software services they are using track their behavior and if that data is being shared with the government or being sold to third-parties.

By now, most web users have come to expect and begrudgingly accept data tracking as part of modern-day life. For this reason, many people buy Internet Security products to safeguard their identity; however, few stop to consider a frightening possibility: Is my anti-malware tracking me too?

The 2014 AV-Comparatives Data transmission of Internet security products Survey

AV-Comparatives is an independent not-for-profit organization that checks whether security software lives up to its promises. In today’s infinitely trackable web environment, one of those promises is ensuring the privacy of customer data. In keeping with its mission, AV-C set out to determine just how many security software vendors stay true to that promise. Their method was simple – run a test, conduct a survey, and compare.

21 leading anti-virus vendors from around the world participated in this comparative; and, while AV-C’s report simply lists the results and does not assign a ranking…

Emsisoft is already being recognized as one of the most privacy conscious anti-virus companies around.

How’d we do it?

Well, for starters, we are open and upfront about our End User Licensing Agreement. On top of that, we take great care to transmit as little information about our customers as possible.

Data that we DON’T transmit includes: internal IP addresses, visited URLs, Windows usernames, and most other machine and personal information that can be connected to your identity.

“Suspicious” files that our software submits for analysis are never non-executable personal documents – we only collect malicious executables so that we can study their behavior to ensure protection, and we give our users the right to opt out of such collection at all times.

We DON’T collect information harvested by malware – meaning if you submit a malware file that has infected your computer and it has collected your information, we don’t make matters worse by collecting that information too.

Data that we DO transmit is limited to anonymous information that can help us improve our product, prevent it from being pirated, and protect our users from emerging malware.


Our Commitment: To Become the Most Privacy Conscious Anti-Malware Vendor Around

Those interested in AV-C’s full comparative can find it here (PDF).

We hope that after viewing the facts yourself, you’ll be proud to find that you’re using an awarding winning anti-malware that doesn’t compromise on its commitment to protect its users for third-party profit or governmental interests.

In time, we hope to become known as the most privacy conscious anti-malware vendor around. At present, this means doing everything we can to keep our users’ digital worlds safe and leaving their personal data where it belongs: with them.

Have a Great (Privacy-Protected) Day!

About AV-Comparatives

AV-Comparatives is an independent not-for-profit organization offering systematic testing that checks whether security software, such as PC/Mac-based antivirus products and mobile security solutions, lives up to its promises. Using one of the largest sample collections worldwide, it creates a real-world environment for truly accurate testing. AV-Comparatives offers freely accessible results to individuals, news organizations and scientific institutions. Certification by AV-Comparatives provides an official seal of approval for software performance which is globally recognized.



  • Legend

    No doubt that privacy on the internet is only a memory nowadays. So what can you do as a normal user to enhance your privacy online. Well there is actually a lot you can do. But the most important thing, is to start to be aware about who you trust, and to whom you what to share your data with, so to speak. So the first step is to be, Aware and Critical, and choose who you what to trust, with care. Personally I think that Privacy online will be a competition parameter, in the future.

    • chuckspires.com

      More and more systems are going online to provide true privacy. Although yes the jury is out at this very moment I would like to mention to those that are really interested in privacy to be aware of your internet habbits and explore services using newer open source End-to-end encryption (E2EE) such as email clients Tutanota, Proton Mail and Operating Systems like Tails. If the time comes when we stop our expectation of privacy then “they” have won. I know the government is currently on a rampage to stop End-to-end encryption and our best option to insure that they fail is to use and or subscribe to these services. By using and donating to these services then we are giving the finger to our government because they ARE trying to stop it. If we choose to not use it then we are surrindering our right to privacy further than we have already.
      The patriot act was never intended to be used the way Obama has used it but he has set a new standard for how it WILL be used in the future. Use only open source end to end encryption services and also make a donation of at least $1 to any service you choose. Together we can stop the invasion of our privacy and send a strong message to all governments.

      • Evan Peters

        There is no “true privacy”. Once you connected a computer to the internet, some data will get out, even with the most protected systems. There is nothing to stop it, this is how the network works.

        • chuckspires.com

          I think what you are calling “true privacy” and what I am calling “true privacy” are different. Yes networks leak data. That will always be an issue. I stated several points that you didn’t mention in connection with “connecting one computer to another” which is going to be referred to here as a network. Snowden changed the internet world for those of us whom understand how to work it. Using any of the true E2EE services that are in the budding stage and also as I said above understanding how your inet habits can put you at risk and making changes to risky behavior on your part then you CAN achieve true privacy and annon. Not knowing your background I will question you as to what your experience with what you call “protected systems” are. But right now, today, this moment if you have an understanding of “protected systems” are then yes you can maintain privacy.

  • Pingback: farmacia express()

  • Pingback: Xbox 360()

  • Pingback: agen togel()

  • Pingback: casino online()

  • Pingback: bandarq()

  • Pingback: bandarq()

  • Pingback: sex therapist()