Signature-based malware detection products are in the twilight of their useful life. The rapid evolution of malware for which no signature exists and the ongoing use of attack methods that don't rely on malware (i.e., stolen credentials) have greatly reduced the effectiveness of signature-based AV.
Many enterprises are likely questioning the value they receive from traditional
