Thursday, November 28, 2019

Evaluating Security Software (Firewall)

Introduction A firewall is precisely a combination of specific hardware and software’s, which performs a major role in preventing all types of unauthorized users from accessing private networks. Additionally, firewalls also control the tremendous flow of all incoming and outgoing private networks traffics (Laudon Laudon, 2009).Advertising We will write a custom assessment sample on Evaluating Security Software (Firewall) specifically for you for only $16.05 $11/page Learn More Firewall is specifically put in a central position sandwiched in between the organization private network and other external networks. This allows an automatic distraction of all external and unwanted networks such as internet, hence protecting the company’s network. Two categories of firewalls discussed in this paper include: the proxy firewalls and unified threat management firewalls (UTM) (Laudon Laudon, 2009). Proxy firewall This firewall performs better than an y other type of security firewall basing on its operation speed and performance capabilities. This is because; proxy firewall limiting all application accessed by this network. Moreover, for proxy firewall network traffic does not flow through before the computer fully establishes a direct connection to the proxy (Searchnetworking.techtarget.com, 2008). The proxy primarily serves the major role of signaling development of another network connection on behalf of the previous request. This is very important as far as network security is concerned since the proxy automatically prevents direct and risky connections between systems found on each side of the firewall (Searchnetworking.techtarget.com, 2008). Furthermore, this proxy firewall makes it very hard for any attacker to discover where the network protected by proxy is located. This is because all external intruders will never gain the direct channel to access the packet data produced by the protected network system. This is becaus e this firewall is strongly sandwiched in between these two networks. Proxy firewall software is really effective and also considered to be the most appropriate for small workgroups and offices. This firewall is also categorized to be cost efficient. Proxy can be accessed free for up to three users, but for unlimited users it costs up to even $299 (Searchnetworking.techtarget.com, 2008).Advertising Looking for assessment on programming? Let's see if we can help you! Get your first paper with 15% OFF Learn More Unified Threat Management (UTM) When UTM emerged, it created a direct feeling of being the most convenient protection for systems against all threats out there. UTM firewall is capable of guarding system against and unwanted foreign intrusion. Notable to mention is that, UTM not only guards or blocks foreign intrusion, but also filters all the contents of the intrusion (Searchnetworking.techtarget.com, 2008). Additionally, UTM performs intrusion detection, recogn ition, spam filtering and even anti-virus duties which are always and traditionally done by multiple systems (Searchnetworking.techtarget.com, 2008). The UTM devices were specifically developed to fully combat all levels of suspicious and malicious intrusions targeting any private computer network. An effective UTM solution offers perfect system security, which is composed of â€Å"robust and fully intergrated security and networking function† (Searchnetworking.techtarget.com, 2008). Examples of these security functions include; â€Å"network firewalling intrusion detection and detections (IDS/IPS) and gateway antivirus (AV) meant for security management† (Searchnetworking.techtarget.com, 2008). UTM was simply designed to offer network protection against unknown threats without implicating or interfering with performance of the network. UTM is best recommended for all small and medium- sized organizations or businesses. Which is the best product? Why? UTM is the best f irewall because the installation of this software is convenient and easy. The other advantage is that, there is less human involvement required during the installation and configuration of the software. Moreover, this UTM firewall has reduced complexity in addition to its ease in deployment and integration capabilities. Some of the leading vendors producing UTM include, â€Å"Fortinet, NetScreen, Symantec, NetScaler, WatchGuard Technologies and Elitecore Technologies† (Searchnetworking.techtarget.com, 2008). Conclusion In summary, system security is important since it is best used to protect networks and machines from external intrusion. References Laudon, K., Laudon, J. (2009). Essentials of Management Information Systems, 8th Edition. Pearson Learning Solutions.Advertising We will write a custom assessment sample on Evaluating Security Software (Firewall) specifically for you for only $16.05 $11/page Learn More Searchnetworking.techtarget.com. (2008). Introduction to firewalls: types of firewalls. Web. This assessment on Evaluating Security Software (Firewall) was written and submitted by user Miya B. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.