Overview of personal firewalls
by Mirko Zorz - for Help Net Security
With the constant rise of permanent broadband connections that have many workstations online 24/7, there has been a growth in the number of attacks. In order to get a certain level of protection and piece of mind, the home user should install a personal firewall. If you are not familiar with how a firewall works I suggest you visit this link and find out more. For a lot more in-depth articles on the subject visit this section of HNS.

There are a lot of products out there so I decided to make a brief overview of some of the personal firewalls offered. Here we go...



MindSoft Firewall 2.6
Website: MindSoftWeb.com - [ Download ]

Mindsoft Firewall


MindSoft Firewall's setting extremely simple for the user. This is very helpful for people new to firewalls but if you eventually want to learn something more, the help file won't help you because it's very brief so you'll have to look elsewhere.



Kerio Personal Firewall 2.1.4
Website: Kerio.com - [ Download ]

Kerio Personal Firewall


Kerio Personal Firewall is a small and easy to use system designed for protecting your computer against hacker attacks and data leaks. It is based on the ICSA certified technology used in the WinRoute firewall.



Sygate Personal Firewall 5.0
Website: Sygate.com - [ Download ]

Sygate Personal Firewall


Sygate Personal Firewall offers unparalleled protection against malicious intrusion attempts by hackers, script kiddies, and cracks. It uses the combined power of bi-directional intrusion detection, vulnerability assessment, and extensive logging and forensics capabilities.



VisNetic Firewall 1.0.3
Website: Deerfield.com - [ Download ]

VisNetic Firewall


VisNetic Firewall falls into a class of firewalls called Stateful Inspection Firewalls. They examine more than just the "to" and "from" addresses in the data packets, and do not require a proxy for every application being accessed. Both the installation and the configuration are very simple. The help file is very well written.

Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //