No,Except it's nothing at all like traditional antivirus in its implementation, resource requirements, and efficacy.
Antivirus has to deeply inspect a binary at the time of execution and look for specific binary fingerprints. This comes at the expense of CPU and bandwidth every time you run any executable on the system. It's possible to subvert by altering the executable in ways which change its fingerprint but don't alter its behavior.
Signed binaries can protect against that technique without draining CPU, RAM, or bandwidth.
the original post was saying:
It also means that when a malicious binary is discovered out in the wild that Apple can revoke the signature on that executable preventing it from working. That's not nothing.
A malicious binary discovered out in the wild?? It means that a$$le previously signed a malicious binary?! Because a binary cannot be compromised once it is signed! If it is compromised, there is no more match between the binary and its digital certificate!