When you compare antivirus solutions, it is therefore imperative to check that they set up all the shields necessary to deploy a full protection system. They must be able to detect common viruses and malware, but also Trojan horses (trojan), towards, spy software, rootkits, ransomware, adware. Better still, they must be able to overcome the system framework to prevent network attacks and anticipate threats online, whether it is to prevent access to dangerous websites, report phishing attempts received by email or block fraudulent downloads.