Generated by GPT-5-mini| Avast | |
|---|---|
![]() JiriMatejicek · CC BY-SA 3.0 · source | |
| Name | Avast |
| Type | Public |
| Industry | Computer security |
| Founded | 1988 |
| Founder | Pavel Baudiš; Eduard Kučera |
| Headquarters | Prague, Czech Republic |
| Key people | Ondřej Vlček; Pavel Baudiš |
| Revenue | (2020) |
| Employees | (2021) |
Avast is a Prague-based cybersecurity company known for producing antivirus software, internet security, and privacy products for consumers and enterprises. Founded in the late 20th century by founders from Czechoslovakia, the firm grew into a multinational corporation competing with firms such as McAfee, Symantec, Kaspersky Lab, and Trend Micro. Its offerings span endpoint protection, virtual private networks, and threat intelligence, used across markets served by companies like Microsoft, Apple Inc., and Google.
The company was founded in 1988 by Pavel Baudiš and Eduard Kučera in Prague during the final years of Czechoslovakia, emerging from collaborations with academic institutions such as the Czech Technical University in Prague. Early growth paralleled global shifts following the Velvet Revolution and the expansion of the personal computer market alongside corporations like IBM. In the 1990s and 2000s, the firm expanded internationally, establishing offices in regions including California, London, and Israel, and participating in industry events such as RSA Conference and Black Hat USA. Strategic milestones included initial public offerings, partnerships with platform providers like Intel and Qualcomm, and competition with firms such as Sophos and ESET. In the 2010s, the company pursued acquisitions and product diversification amid increasing attention to online privacy highlighted by incidents involving Edward Snowden and regulations such as the General Data Protection Regulation.
The product portfolio includes consumer antivirus suites comparable to offerings from Avira and Bitdefender, enterprise endpoint protection used by organizations deploying solutions from CrowdStrike and SentinelOne, and a virtual private network service akin to products by ExpressVPN and NordVPN. Additional services comprise password management similar to 1Password and LastPass, cleanup and optimization tools in the style of CCleaner, and browser extensions competing with tools by Mozilla and Google Chrome. The company also offers mobile security apps for Android and iOS devices, integrated threat intelligence feeds for security operations centers that rely on platforms like Splunk and Elastic, and managed security services paralleling those from IBM Security and Cisco Systems.
Core technologies include signature-based detection strategies used historically by vendors such as McAfee LLC and heuristic engines similar to those developed by Kaspersky Lab. The firm employs cloud-based telemetry models feeding into machine learning systems akin to those deployed by Microsoft Defender and anomaly detection frameworks resembling those from Darktrace. Threat intelligence initiatives produce indicators of compromise and reputation services shared with industry consortia including VirusTotal and trusted by security vendors like Trend Micro. Features across products include sandboxing comparable to Cuckoo sandbox, behavioral analysis like techniques used by CrowdStrike Falcon, and firewall controls interoperable with platforms such as Windows Defender Firewall and pfSense deployments. Integration capabilities support enterprise orchestration tools including ServiceNow and Palo Alto Networks management consoles.
The company has faced scrutiny over data collection and monetization practices paralleling controversies that affected companies such as Facebook and Google. Investigations and reporting by outlets including The Wall Street Journal and Vice Media raised questions similar to those in cases involving Cambridge Analytica and prompted regulatory attention from authorities in jurisdictions governed by laws like the General Data Protection Regulation and enforcement bodies such as the Information Commissioner's Office and the Federal Trade Commission. Criticisms centered on telemetry, third-party data sales, and transparency, leading to business responses and changes in data handling policies comparable to remedial steps taken by firms including Uber and Equifax after their respective incidents. Litigation and settlement activity drew parallels to antitrust and consumer protection cases handled by courts in London and New York.
Corporate expansion involved acquisitions of companies offering complementary technologies, following a strategy akin to consolidation seen with Symantec Corporation and Broadcom Inc. in the cybersecurity sector. Notable business transactions included purchases and integrations of firms in fields such as threat intelligence, mobile security, and identity management, echoing deals by Palo Alto Networks and Cisco Systems. The company’s governance features a board and executive team with ties to investors and private equity firms similar to relationships seen with KKR and TPG Capital in technology acquisitions. Headquarters in Prague coordinate global operations with regional offices in markets including United States, United Kingdom, and Israel, and partnerships with cloud providers such as Amazon Web Services and Google Cloud Platform support product delivery.
Category:Computer security companies