It's a dangerous world out there--but which firewall should you use? We rate the five top software firewalls and let you know which is the best.
It's amazing to think there was once a time when the idea of a firewall for one's desktop computer was thought of as overkill, if not downright ridiculous. Now it's practically mandatory -- not just to protect your computer from outside threats, but to keep Trojans and e-mail viruses from hijacking your system from within.
Other things have changed, too. Today, standalone firewall products are more the exception than the rule. I took a look at five major firewalls on the market today, and almost everything that came my way was either available both as a standalone and as part of a suite of security products from the same manufacturer, or was only available as part of that suite. For the most part, this is good news -- it means you can get more for your money than ever before. On the other hand, it might also mean you're forced to buy more than you really need; but the sheer diversity of the products out there helps alleviate that a bit.
The nature of the problems a firewall has to guard against has also changed. The problems have shifted from outside attacks (the "ping of death," and so on) to compromising a system from the inside via Trojans. To that end, most of the testing I did of these products was twofold, both from the outside -- using the DSLReports.com PortScan utility -- and from the inside, to see if they were as good at stopping emergent threats from within.
Incidentally, although the dangers to PCs may have changed, some operating systems have stayed the same. If you're still using Windows 98 or ME, your choice of a firewall will be somewhat more limited: While Norton Personal Firewall and PC-cillin Internet Security support the older operating systems, McAfee and ZoneAlarm do not.
One somewhat controversial program that I used to test, but didn't rely on as an absolute indicator of a firewall's value, was the Atelier Web Firewall Tester. This program uses a number of dirty tricks to open a connection to the outside world, mostly by invoking Internet Explorer or the IE ActiveX control, and its makers claim that very few, if any, personal firewalls can block this kind of spoofing. For that reason, the fact that many of the firewalls here flunked this test is more informational than anything else; it's a sobering hint of how tough it can really be to block unauthorized traffic from a program on your computer.
I should point out that there will probably never be a perfect software solution to computer security as long as the user remains the weakest link. If I have a firewall that blocks outbound connections from programs it doesn't know by default, that's a good thing -- until a well-written Trojan comes along and uses a bogus name like "Windows Network Process" to fool me into granting it access. To that end, anyone who plans on investing in a firewall -- or, for that matter, using the Internet at all -- deserves to know as much as they can about what not to do with their PC, and how a firewall isn't in itself total protection from anything, least of all carelessness or stupidity.
Some of the features I've seen packaged with firewalls and security software are becoming more explicitly educational, such as McAfee's SiteAdvisor browser plug-in. I'm hoping in the future we'll see more software that works in a behavioral fashion to guide people away from doing the dumb things that most often get them infected.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.
Top IT Trends to Watch in Financial ServicesIT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Join us for a roundup of the top stories on InformationWeek.com for the week of October 9, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."