Home > Free Essays > Tech & Engineering > Computer Science > Evaluating Security Software (Firewall)
Cite this

Evaluating Security Software (Firewall) Report (Assessment)


Introduction

A firewall is precisely a combination of specific hardware and software’s, which performs a major role in preventing all types of unauthorized users from accessing private networks. Additionally, firewalls also control the tremendous flow of all incoming and outgoing private networks traffics (Laudon & Laudon, 2009).

Firewall is specifically put in a central position sandwiched in between the organization private network and other external networks. This allows an automatic distraction of all external and unwanted networks such as internet, hence protecting the company’s network.

Two categories of firewalls discussed in this paper include: the proxy firewalls and unified threat management firewalls (UTM) (Laudon & Laudon, 2009).

Proxy firewall

This firewall performs better than any other type of security firewall basing on its operation speed and performance capabilities. This is because; proxy firewall limiting all application accessed by this network. Moreover, for proxy firewall network traffic does not flow through before the computer fully establishes a direct connection to the proxy (Searchnetworking.techtarget.com, 2008).

The proxy primarily serves the major role of signaling development of another network connection on behalf of the previous request. This is very important as far as network security is concerned since the proxy automatically prevents direct and risky connections between systems found on each side of the firewall (Searchnetworking.techtarget.com, 2008).

Furthermore, this proxy firewall makes it very hard for any attacker to discover where the network protected by proxy is located. This is because all external intruders will never gain the direct channel to access the packet data produced by the protected network system. This is because this firewall is strongly sandwiched in between these two networks.

Proxy firewall software is really effective and also considered to be the most appropriate for small workgroups and offices. This firewall is also categorized to be cost efficient. Proxy can be accessed free for up to three users, but for unlimited users it costs up to even $299 (Searchnetworking.techtarget.com, 2008).

Unified Threat Management (UTM)

When UTM emerged, it created a direct feeling of being the most convenient protection for systems against all threats out there. UTM firewall is capable of guarding system against and unwanted foreign intrusion. Notable to mention is that, UTM not only guards or blocks foreign intrusion, but also filters all the contents of the intrusion (Searchnetworking.techtarget.com, 2008).

Additionally, UTM performs intrusion detection, recognition, spam filtering and even anti-virus duties which are always and traditionally done by multiple systems (Searchnetworking.techtarget.com, 2008). The UTM devices were specifically developed to fully combat all levels of suspicious and malicious intrusions targeting any private computer network.

An effective UTM solution offers perfect system security, which is composed of “robust and fully intergrated security and networking function” (Searchnetworking.techtarget.com, 2008). Examples of these security functions include; “network firewalling intrusion detection and detections (IDS/IPS) and gateway antivirus (AV) meant for security management” (Searchnetworking.techtarget.com, 2008).

UTM was simply designed to offer network protection against unknown threats without implicating or interfering with performance of the network. UTM is best recommended for all small and medium- sized organizations or businesses.

Which is the best product? Why?

UTM is the best firewall because the installation of this software is convenient and easy. The other advantage is that, there is less human involvement required during the installation and configuration of the software. Moreover, this UTM firewall has reduced complexity in addition to its ease in deployment and integration capabilities. Some of the leading vendors producing UTM include, “Fortinet, NetScreen, Symantec, NetScaler, WatchGuard Technologies and Elitecore Technologies” (Searchnetworking.techtarget.com, 2008).

Conclusion

In summary, system security is important since it is best used to protect networks and machines from external intrusion.

References

Laudon, K., Laudon, J. (2009). Essentials of Management Information Systems, 8th Edition. Pearson Learning Solutions.

Searchnetworking.techtarget.com. (2008). Introduction to firewalls: types of firewalls. Web.

This assessment on Evaluating Security Software (Firewall) was written and submitted by your fellow student. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly.

Need a custom Assessment sample written from scratch by
professional specifically for you?

Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar

301 certified writers online

GET WRITING HELP
Cite This paper

Select a website citation style:

Reference

IvyPanda. (2019, May 27). Evaluating Security Software (Firewall). Retrieved from https://ivypanda.com/essays/evaluating-security-software-firewall/

Work Cited

"Evaluating Security Software (Firewall)." IvyPanda, 27 May 2019, ivypanda.com/essays/evaluating-security-software-firewall/.

1. IvyPanda. "Evaluating Security Software (Firewall)." May 27, 2019. https://ivypanda.com/essays/evaluating-security-software-firewall/.


Bibliography


IvyPanda. "Evaluating Security Software (Firewall)." May 27, 2019. https://ivypanda.com/essays/evaluating-security-software-firewall/.

References

IvyPanda. 2019. "Evaluating Security Software (Firewall)." May 27, 2019. https://ivypanda.com/essays/evaluating-security-software-firewall/.

References

IvyPanda. (2019) 'Evaluating Security Software (Firewall)'. 27 May.

More related papers