Award-winning performance and continuous testing
Crowd sourcing from over 100 million Avira end-user
Qualified 24x7 technical support available
Dedicated business account managers
Get a FREE consultation and access to our software development kits (SDKs)
Thanks for registering. We'll get in touch very soon.
SAVAPI can be used to add anti-malware protection in the following types of applications:
SAVAPI v4 integrates the Avira Protection Cloud, a technology that detects and prevents zero-day attacks and malware outbreaks. A unique hash will be created and checked against the information in the cloud to determine whether the file is infected or not.
Depending on the configuration, any file that has not been previously scanned and verified by the engine can be sent to the Avira Protection Cloud for a deep scan with advanced technologies. This way Avira is harnessing the collective intelligence of its over 100 million users to continuously expand the cloud hosted database.
MAVAPI, integrated into Avira’s award-winning Android security product, uncovers apps that misuse device data, monitor behavior, and send premium text messages.
MAVAPI uses only an offline database with a very small footprint for signature updates. It is created to have a very low power consumption and is available on Android starting with version 2.2. It supports the mobile chipsets starting with ARM EABI 5.
Phishing is a very effective online fraud method, which uses fake websites to obtain user logins and passwords, credit card information or even online identity information in order to steal money or spread spam and malware.
Some of these malicious websites remain active only for a few hours and it’s imperative that the links to them are always up-to-date.
This technology can be used in several ways, to prevent the end-user from landing on dangerous URLs:
Avira ICAP Server is based on Avira SAVAPI and uses the Internet Content Adaption Protocol (ICAP) to communicate with web proxy servers such as Squid.
The Avira ICAP provides the following functionalities:
The product can be customized and included in complex security solutions running on Linux systems.