A firewall is a protective hardware or software platform that lies between your network and the Internet. It’s purpose is to carefully analyze data entering and exiting the network based on your configuration, ignoring information coming from unsecured, unknown or suspicious locations. It is a vital network component as it provides the protective barrier from the outside world.
Our firewalls are simple, yet extremely flexible and secure with features such as Web-Proxy, Watchdog and several other business critical features.
Firewalls can be used in a number of ways to add security to your home or business. Large corporations often have very complex firewalls in place to protect their extensive networks. On the outbound side, firewalls can be configured to prevent employees from sending certain types of emails or transmitting sensitive data outside of the network. On the inbound side, firewalls can prevent access to certain websites. Additionally, firewalls can prevent outside computers from accessing computers inside the network. A company might choose to designate a single computer on the network for file sharing and all other computers could be restricted. There is no limit to variety of firewall configurations.
It is important for your firewall to not only block requests to reach your computer, but to also make it appear as if your computer does not even exist on the Internet. Stealth mode allows for your computer to appear invisible to probes to your computer. Hackers have the ability to detect Internet access using the probing technique. Stealth mode instructs the firewall to not send this information creating the illusion to hackers that you are not online.
Notifications allows you to see firewall activity and possible penetration attempts on your computer.
Many firewalls now have the ability to block spyware, hijackers, and adware from reaching your computer. This allows you to protect your computer from being infected with software that is known to reveal private information about what you do on the Internet or other computing habits. These features are usually bundled into the commercial versions of the firewall software packages.
Application Integrity is when the firewall monitors the files on your computer for modification in the file or how they are launched. When it detects such a change it will notify the user of this and not allow that application to run or transmit data to the Internet. Many times these modifications may have been part of an upgrade, but if it was modified by a malicious program you will now be made aware of it.
Intruders use various methods to penetrate the security of your computer. Intrusion detection scans incoming data for signatures of known methods and notifies you when such attacks are recognized. This allows you to see what means a hacker is trying to use to hack your computer.