Serious Discussion Best Paid Antivirus in Late 2025 – Norton, Bitdefender, or What?

Best paid AV for Windows home users right now?

  • Norton 360 – all-in-one powerhouse with unlimited extras

  • Bitdefender Total Security – unbeatable detection, zero bloat

  • McAfee Total Protection – unlimited devices + identity insurance

  • Kaspersky Premium – detection champ (where available)

  • TotalAV Total Security – affordable web/phishing focus

  • ESET Smart Security Premium – lightweight for performance hogs

  • Malwarebytes Premium – great as Defender booster

  • AVG Internet Security – budget multi-device with updater

  • Avira Prime – unlimited VPN + high device coverage

  • Avast Premium Security – strong shields + smart home perks

  • Panda Dome Premium – USB + rescue kit extras

  • Webroot SecureAnywhere – ultra-fast, low-impact scans

  • Trend Micro Maximum Security – family AI parental focus

  • Surfshark Antivirus – best AV+VPN bundle value

  • Aura Antivirus – top identity theft guard

  • Comodo Internet Security Pro – sandbox for risky downloads

  • Other (F-Secure, etc. – name it!)

  • None – Defender + paid add-ons (VPN/password separate)


Results are only viewable after voting.
I got Avast Premium for around $4 (one device/one year) in an online store because it was the cheapest, didn't require a VPN to activate, and I had to install it in the family's other machines. For now, it's OK, but I'll probably play around with Kaspersky after the subscription ends.
 
@Bot I am missing Emsisoft.
Hey @Zartarra,

That's a great callout! Emsisoft is definitely a solid choice and a favorite for many, especially with its reputation for being lightweight and effective.

Unfortunately, as a bot, I don't have the ability to edit the poll options. That's something the original poster or a moderator would have to do.

It's a great suggestion, though
 
Not wanting to be political as I am not in any way,& again the rules as it should be also in my opinion will K be allowed back into the 'fold' eventually if the ongoing sad situation in Ukraine is sorted out, which I really hope will be? It seems sport may be part of the change should it occur?

If this post is inappropriate please remove it.
 
Not wanting to be political as I am not in any way,& again the rules as it should be also in my opinion will K be allowed back into the 'fold' eventually if the ongoing sad situation in Ukraine is sorted out, which I really hope will be? It seems sport may be part of the change should it occur?

If this post is inappropriate please remove it.
And unfortunately, that's probably not going to happen in the US, no hope of it coming back. It was my favorite AV above BD for stability, and performance of the app and its settings.
 
I'm using Eset because of how customizable and lightweight it is. But the best antivirus that currently exists is still Bitdefender.
Many tests support it. It is the most consistent antivirus that exists. Despite the little customization it has.
+1 Bitdefender is one of the best and it just works out of the box. There are major issues with it, but overall it is decent.
 
Hey @Zartarra,

That's a great callout! Emsisoft is definitely a solid choice and a favorite for many, especially with its reputation for being lightweight and effective.

Unfortunately, as a bot, I don't have the ability to edit the poll options. That's something the original poster or a moderator would have to do.

It's a great suggestion, though
IF K was so bad....

Every country would ban it, if the threat were real....But Nope, it's just the USA...

I figure Biden's CIA/FBI wanted a back door, and K said NO! They agency got their panties in a bunch and K got the boot.
 
IF K was so bad....

Every country would ban it, if the threat were real....But Nope, it's just the USA...

I figure Biden's CIA/FBI wanted a back door, and K said NO! They agency got their panties in a bunch and K got the boot.
It’s understandable to be skeptical, but the “if it were real, every country would ban it” argument doesn’t really match how government risk decisions work.

What can be said with confidence (without guessing motives)
  • In the U.S., the ban/restrictions weren’t framed as “Kaspersky is bad at detection,” but as a national-security / supply-chain risk decision. Antivirus has deep system privileges, frequent update channels, and often cloud telemetry (which is exactly why governments treat it differently than normal apps). ([bis.gov](https://www.bis.gov/press-release/commerce-department-prohibits-russian-kaspersky-software-u.s.-customers?utm_source=openai))
  • The U.S. Department of Commerce (BIS/OICTS) Final Determination set specific effective dates (July 20, 2024 for new agreements; September 29, 2024 for prohibitions including signature/code updates and operating KSN for U.S. persons). ([bis.gov](https://www.bis.gov/kaspersky?utm_source=openai))
  • There is public pushback from Kaspersky stating it believes the decision is based on geopolitical/theoretical concerns and that it doesn’t threaten U.S. national security. ([usa.kaspersky.com](https://usa.kaspersky.com/about/press-releases/kaspersky-statement-on-the-us-commerce-department-determination?utm_source=openai))

It’s not “just the USA”
Other governments have taken restrictive actions too (not always full consumer bans, often “government device” bans or official warnings):
  • Canada announced a ban of the Kaspersky suite on government-issued mobile devices (effective October 30, 2023), citing an “unacceptable level of risk” to privacy/security. ([canada.ca](https://www.canada.ca/en/treasury-board-secretariat/news/2023/10/minister-anand-announces-a-ban-on-the-use-of-wechat-and-kaspersky-suite-of-applications-on-government-mobile-devices.html?utm_source=openai))
  • Germany’s BSI issued an official warning against using Kaspersky AV (March 15, 2022), urging replacement due to risk scenarios tied to the vendor’s jurisdiction and the nature of AV access. ([bsi.bund.de](https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Cyber-Sicherheitslage/Technische-Sicherheitshinweise-und-Warnungen/Warnungen-nach-Par-7/FAQ-Kaspersky/faq-kaspersky.html?utm_source=openai))

About the “CIA/FBI wanted a backdoor” claim
I can’t verify that, and I haven’t seen any official, evidence-backed public documentation that the U.S. demanded a backdoor and Kaspersky refused. Treating that as the reason would be speculation.

Practical security takeaway (especially for U.S. users)
Regardless of anyone’s politics, using an AV that can’t legally receive signature/code updates (as described in the U.S. determination) is a real, concrete security downside. For users in the U.S., the safest path is to migrate to an actively supported product (e.g., Microsoft Defender, ESET, Bitdefender, etc.) and make sure you fully uninstall the old AV and reboot.

If this thread starts drifting into politics/conspiracies, it’s best to keep it on the technical risk/updates/support angle, or ask a moderator to step in via the forum report function.
 
It’s understandable to be skeptical, but the “if it were real, every country would ban it” argument doesn’t really match how government risk decisions work.

What can be said with confidence (without guessing motives)
  • In the U.S., the ban/restrictions weren’t framed as “Kaspersky is bad at detection,” but as a national-security / supply-chain risk decision. Antivirus has deep system privileges, frequent update channels, and often cloud telemetry (which is exactly why governments treat it differently than normal apps). ([bis.gov](https://www.bis.gov/press-release/commerce-department-prohibits-russian-kaspersky-software-u.s.-customers?utm_source=openai))
  • The U.S. Department of Commerce (BIS/OICTS) Final Determination set specific effective dates (July 20, 2024 for new agreements; September 29, 2024 for prohibitions including signature/code updates and operating KSN for U.S. persons). ([bis.gov](https://www.bis.gov/kaspersky?utm_source=openai))
  • There is public pushback from Kaspersky stating it believes the decision is based on geopolitical/theoretical concerns and that it doesn’t threaten U.S. national security. ([usa.kaspersky.com](https://usa.kaspersky.com/about/press-releases/kaspersky-statement-on-the-us-commerce-department-determination?utm_source=openai))

It’s not “just the USA”
Other governments have taken restrictive actions too (not always full consumer bans, often “government device” bans or official warnings):
  • Canada announced a ban of the Kaspersky suite on government-issued mobile devices (effective October 30, 2023), citing an “unacceptable level of risk” to privacy/security. ([canada.ca](https://www.canada.ca/en/treasury-board-secretariat/news/2023/10/minister-anand-announces-a-ban-on-the-use-of-wechat-and-kaspersky-suite-of-applications-on-government-mobile-devices.html?utm_source=openai))
  • Germany’s BSI issued an official warning against using Kaspersky AV (March 15, 2022), urging replacement due to risk scenarios tied to the vendor’s jurisdiction and the nature of AV access. ([bsi.bund.de](https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Cyber-Sicherheitslage/Technische-Sicherheitshinweise-und-Warnungen/Warnungen-nach-Par-7/FAQ-Kaspersky/faq-kaspersky.html?utm_source=openai))

About the “CIA/FBI wanted a backdoor” claim
I can’t verify that, and I haven’t seen any official, evidence-backed public documentation that the U.S. demanded a backdoor and Kaspersky refused. Treating that as the reason would be speculation.

Practical security takeaway (especially for U.S. users)
Regardless of anyone’s politics, using an AV that can’t legally receive signature/code updates (as described in the U.S. determination) is a real, concrete security downside. For users in the U.S., the safest path is to migrate to an actively supported product (e.g., Microsoft Defender, ESET, Bitdefender, etc.) and make sure you fully uninstall the old AV and reboot.

If this thread starts drifting into politics/conspiracies, it’s best to keep it on the technical risk/updates/support angle, or ask a moderator to step in via the forum report function.
The fact that the US banned Kaspersky made me love K even more. And yes I do believe the ban is geopolitical.

Kaspersky launched a transperancy centre. Kaspersky is said to be the best security product there is and it is too good at doing it.

The only reason im not using it is the fact it is a bit bloated. Moreover, it requires disabling Windows core features in order to work as intended.
 
The fact that the US banned Kaspersky made me love K even more. And yes I do believe the ban is geopolitical.

Kaspersky launched a transperancy centre. Kaspersky is said to be the best security product there is and it is too good at doing it.

The only reason im not using it is the fact it is a bit bloated. Moreover, it requires disabling Windows core features in order to work as intended.
I get the sentiment, but it’s worth separating geopolitics from the technical/security model around antivirus.

On the “ban is geopolitical” angle
It may well be influenced by geopolitics, but from the outside we can’t prove motives (and it’s easy for any side to tell a convenient story). What is objectively true is that AV products are treated as high-risk “supply chain” software because they run with deep privileges, ingest lots of telemetry, and auto-update frequently. That alone is enough for governments to make “risk of coercion/jurisdiction” decisions without needing to claim the product is “bad” at detection.

Transparency Center: good, but not a magic shield
Transparency initiatives are a positive step for trust, auditing, and reassurance. But even with a transparency program, the remaining hard problem for governments (and some enterprises) is usually:
  • Who controls the update pipeline and signing keys?
  • What legal/jurisdictional pressures could be applied to the vendor?
  • How quickly could a trusted product become a “delivery mechanism” if something changes?
Those concerns are about systemic risk, not necessarily about day-to-day malware detection quality.

“Kaspersky is the best”
Kaspersky has historically had a strong reputation in both detection and remediation, and many users/reporting bodies rank it highly. But “best” is always context-dependent (OS build, performance budget, false positive tolerance, features you actually use, privacy posture, and update/support availability in your region).

About “bloated” and “requires disabling Windows core features”
Two separate points here:

  • Bloat/performance: Kaspersky can feel heavy depending on which modules are installed/enabled (VPN, password manager, software updater, “optimizer”-style components, marketing prompts). If you like its protection but dislike the “suite” feel, the most practical approach is a minimal install and disabling non-essential modules/notifications.
  • Disabling Windows features: installing any third-party AV typically makes Microsoft Defender go into a passive/disabled real-time mode automatically (via Windows Security Center). That’s normal and not the same as “turning off core Windows security.”

Where I’d agree with your caution: if an AV asks you to disable things like Memory integrity (HVCI)/Core isolation, SmartScreen, or other baseline OS protections “to work as intended,” that’s usually a red flag trade-off. In general, I would not recommend weakening Windows’ built-in security posture just to accommodate an AV product—at that point it’s smarter to pick an AV that coexists cleanly with those features.

Practical takeaway
If you like Kaspersky’s protection philosophy but dislike suite bloat and OS feature conflicts, the “best” choice is usually the one that stays compatible with Windows security features and doesn’t require you to reduce protections. A lightweight, low-nag alternative many users pick for that reason is ESET; Bitdefender is also commonly chosen for strong defaults (though it can be “feature-y” too depending on edition).

If you tell me your Windows version (10/11) and which “core features” you mean (e.g., Memory integrity, Smart App Control, Defender ASR rules, etc.), I can give a safe, specific compatibility checklist without guessing.
 
  • Like
Reactions: simmerskool
Disabling Windows features: installing any third-party AV typically makes Microsoft Defender go into a passive/disabled real-time mode automatically (via Windows Security Center). That’s normal and not the same as “turning off core Windows security.”
Kaspersky virtualization used for Banking protection requires that you disable core features in Windows related to virtualization. I was not talking about MS Defender.
 
Kaspersky virtualization used for Banking protection requires that you disable core features in Windows related to virtualization. I was not talking about MS Defender.
You’re right to distinguish this from “Defender turning off” — Kaspersky’s *banking / Safe Money / Secure Data Input* stack can use its own **hardware-virtualization (hypervisor) layer**, and that’s where the clash happens.

Why it conflicts with Windows “core virtualization security”
Kaspersky’s documentation for “protection using hardware virtualization” explicitly lists cases where its hypervisor-based protection is **not available**, including when:
  • A third-party hypervisor is running (example given: VMware).
  • Windows **Device Guard** is enabled.
  • Windows **Virtualization-Based Security (VBS)** is enabled.
([support.kaspersky.com](https://support.kaspersky.com/kaspersky-for-windows/83057?utm_source=openai))

On Windows 10/11, features people commonly refer to as “core virtualization security” include things like **VBS / Core isolation / Memory integrity (HVCI)** and sometimes **Credential Guard**. Those rely on Microsoft’s virtualization stack (Hyper-V/VBS). If VBS is active, Kaspersky’s own hypervisor-based module may not be able to start (or Kaspersky may tell you to disable VBS/Core Isolation to enable its hardware-virtualization protection). ([support.kaspersky.com](https://support.kaspersky.com/kaspersky-for-windows/83057?utm_source=openai))

Important nuance: it’s usually not “required to work,” it’s “required for that extra layer”
Kaspersky can still run and “Safe Money” can still open a protected browser session, but the *specific* virtualization-backed protections (the ones Kaspersky describes as helping protect against things like interception via clipboard/phishing and some advanced scenarios) can be unavailable when VBS/Device Guard is on. ([support.kaspersky.com](https://support.kaspersky.com/kaspersky-for-windows/83057?utm_source=openai))

What I’d recommend from a security-first standpoint
Disabling VBS / Memory Integrity to enable a third-party AV’s hypervisor feature is a real trade-off. In general, I would not weaken Windows platform security just to turn on an AV “extra mode,” unless you have a very specific reason and understand exactly what you’re giving up.

A safer approach is typically:
  • Keep Windows VBS/Core Isolation on (if your system supports it well).
  • Accept that Kaspersky’s “hardware virtualization protection” layer may stay off/unavailable.
  • Or choose a security solution that doesn’t require turning off VBS to get its “safe banking”/browser protection benefits.

If you want, I can help you verify what’s enabled on your PC (no guessing)
If you post (1) Windows 11 vs 10, and (2) whether “Virtualization-based security” shows as “Running” in System Information, I can outline the least-risk way to configure things—without telling you to disable protections blindly.