Evaluating Security Software (Firewall) Report (Assessment)

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Dec 10th, 2023

Introduction

A firewall is precisely a combination of specific hardware and software’s, which performs a major role in preventing all types of unauthorized users from accessing private networks. Additionally, firewalls also control the tremendous flow of all incoming and outgoing private networks traffics (Laudon & Laudon, 2009).

We will write a custom essay on your topic a custom Assessment on Evaluating Security Software (Firewall)
808 writers online

Firewall is specifically put in a central position sandwiched in between the organization private network and other external networks. This allows an automatic distraction of all external and unwanted networks such as internet, hence protecting the company’s network.

Two categories of firewalls discussed in this paper include: the proxy firewalls and unified threat management firewalls (UTM) (Laudon & Laudon, 2009).

Proxy firewall

This firewall performs better than any other type of security firewall basing on its operation speed and performance capabilities. This is because; proxy firewall limiting all application accessed by this network. Moreover, for proxy firewall network traffic does not flow through before the computer fully establishes a direct connection to the proxy (Searchnetworking.techtarget.com, 2008).

The proxy primarily serves the major role of signaling development of another network connection on behalf of the previous request. This is very important as far as network security is concerned since the proxy automatically prevents direct and risky connections between systems found on each side of the firewall (Searchnetworking.techtarget.com, 2008).

Furthermore, this proxy firewall makes it very hard for any attacker to discover where the network protected by proxy is located. This is because all external intruders will never gain the direct channel to access the packet data produced by the protected network system. This is because this firewall is strongly sandwiched in between these two networks.

Proxy firewall software is really effective and also considered to be the most appropriate for small workgroups and offices. This firewall is also categorized to be cost efficient. Proxy can be accessed free for up to three users, but for unlimited users it costs up to even $299 (Searchnetworking.techtarget.com, 2008).

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Unified Threat Management (UTM)

When UTM emerged, it created a direct feeling of being the most convenient protection for systems against all threats out there. UTM firewall is capable of guarding system against and unwanted foreign intrusion. Notable to mention is that, UTM not only guards or blocks foreign intrusion, but also filters all the contents of the intrusion (Searchnetworking.techtarget.com, 2008).

Additionally, UTM performs intrusion detection, recognition, spam filtering and even anti-virus duties which are always and traditionally done by multiple systems (Searchnetworking.techtarget.com, 2008). The UTM devices were specifically developed to fully combat all levels of suspicious and malicious intrusions targeting any private computer network.

An effective UTM solution offers perfect system security, which is composed of “robust and fully intergrated security and networking function” (Searchnetworking.techtarget.com, 2008). Examples of these security functions include; “network firewalling intrusion detection and detections (IDS/IPS) and gateway antivirus (AV) meant for security management” (Searchnetworking.techtarget.com, 2008).

UTM was simply designed to offer network protection against unknown threats without implicating or interfering with performance of the network. UTM is best recommended for all small and medium- sized organizations or businesses.

Which is the best product? Why?

UTM is the best firewall because the installation of this software is convenient and easy. The other advantage is that, there is less human involvement required during the installation and configuration of the software. Moreover, this UTM firewall has reduced complexity in addition to its ease in deployment and integration capabilities. Some of the leading vendors producing UTM include, “Fortinet, NetScreen, Symantec, NetScaler, WatchGuard Technologies and Elitecore Technologies” (Searchnetworking.techtarget.com, 2008).

Conclusion

In summary, system security is important since it is best used to protect networks and machines from external intrusion.

References

Laudon, K., Laudon, J. (2009). Essentials of Management Information Systems, 8th Edition. Pearson Learning Solutions.

Remember! This is just a sample
You can get your custom paper by one of our expert writers

Searchnetworking.techtarget.com. (2008). Introduction to firewalls: types of firewalls. Web.

Print
Need an custom research paper on Evaluating Security Software (Firewall) written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2023, December 10). Evaluating Security Software (Firewall). https://ivypanda.com/essays/evaluating-security-software-firewall/

Work Cited

"Evaluating Security Software (Firewall)." IvyPanda, 10 Dec. 2023, ivypanda.com/essays/evaluating-security-software-firewall/.

References

IvyPanda. (2023) 'Evaluating Security Software (Firewall)'. 10 December.

References

IvyPanda. 2023. "Evaluating Security Software (Firewall)." December 10, 2023. https://ivypanda.com/essays/evaluating-security-software-firewall/.

1. IvyPanda. "Evaluating Security Software (Firewall)." December 10, 2023. https://ivypanda.com/essays/evaluating-security-software-firewall/.


Bibliography


IvyPanda. "Evaluating Security Software (Firewall)." December 10, 2023. https://ivypanda.com/essays/evaluating-security-software-firewall/.

Powered by CiteTotal, the best citation generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1