Best Firewall Software44Firewalls are designed to block unauthorized access to and from networks, but chiefly to stop Internet users from accessing private networks.Cisco ASA1https://dudodiprj2sv7.cloudfront.net/vendor-logos/KP/BJ/EKH5RFTLCO4X-180x180.PNGMalwarebytes2https://dudodiprj2sv7.cloudfront.net/product-logos/iO/H1/HB8SVAF84H8S.pngFortinet FortiGate3https://dudodiprj2sv7.cloudfront.net/product-logos/xg/Td/W8SSKHRTKKEC.pngCisco Meraki MX Firewalls4https://dudodiprj2sv7.cloudfront.net/product-logos/xb/mX/4WFZL1ANOD5T.JPEGPalo Alto Networks Next-Generation Firewalls - PA Series5https://dudodiprj2sv7.cloudfront.net/product-logos/DS/BU/ULEO0WQAHCO8.PNGpfSense6https://dudodiprj2sv7.cloudfront.net/product-logos/6D/LQ/9RZOGMJAK4DF.pngSophos UTM7https://dudodiprj2sv7.cloudfront.net/product-logos/YS/pm/3JWD9S5MW3QO.pngWatchGuard XTM - Discontinued Product8https://dudodiprj2sv7.cloudfront.net/product-logos/wC/uY/EDJTWWBLNSLQ.jpegJuniper SRX9https://dudodiprj2sv7.cloudfront.net/vendor-logos/gB/Ia/1U86W7216QBM-180x180.PNGPalo Alto Networks WildFire10https://dudodiprj2sv7.cloudfront.net/product-logos/ej/jE/F7QTO7QIO9UF.PNGSonicWall TZ11https://dudodiprj2sv7.cloudfront.net/vendor-logos/zc/Na/VOD2KUJ9G2Z3-180x180.JPEGZscaler Web Security12https://dudodiprj2sv7.cloudfront.net/product-logos/IH/93/E4CITT6N520T.pngUntangle NG Firewall13https://dudodiprj2sv7.cloudfront.net/product-logos/1G/OL/1ZTB7ZMOO181.pngBarracuda NG Firewall14https://dudodiprj2sv7.cloudfront.net/vendor-logos/cV/TT/VZW5UWK3DW36-180x180.JPEGWatchGuard NGFW15https://dudodiprj2sv7.cloudfront.net/vendor-logos/S5/0n/3SU13FGAXP2N.pngRackFoundry Total Security Management16https://dudodiprj2sv7.cloudfront.net/product-logos/Jl/h8/UUKVPXASSP28.PNGMcAfee Firewall Enterprise17https://dudodiprj2sv7.cloudfront.net/vendor-logos/eB/ri/277N5FG3B8SN-180x180.JPEGPalo Alto Networks Virtualized Next-Generation Firewalls - VM Series18https://dudodiprj2sv7.cloudfront.net/product-logos/DZ/IE/G35QRNV62FSQ.pngAlert Logic Web Security Manager19https://dudodiprj2sv7.cloudfront.net/vendor-logos/6s/Kj/LNDO4FAX2DHG-180x180.JPEGCyberoam20https://dudodiprj2sv7.cloudfront.net/product-logos/gY/sV/LUCR8FMGRNKH.jpegSourcefire Firewalls21https://dudodiprj2sv7.cloudfront.net/vendor-logos/KP/BJ/EKH5RFTLCO4X-180x180.PNGTrustwave Firewalls22https://dudodiprj2sv7.cloudfront.net/product-logos/lf/MQ/S5LXQ79QPZ1O.jpegSmoothwall UTM23https://dudodiprj2sv7.cloudfront.net/product-logos/66/Os/LLZTG09GXQMZ.jpegCheck Point Firewall Software Blade24https://dudodiprj2sv7.cloudfront.net/product-logos/el/42/JT46P4SQMN0S.jpegFirebox T Series25https://dudodiprj2sv7.cloudfront.net/vendor-logos/S5/0n/3SU13FGAXP2N.png

Firewall Software

Best Firewall Software

TrustMaps are two-dimensional charts that compare products based on satisfaction ratings and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap, and those above the median line are considered Top Rated.

Firewall Software Overview

What are Firewall Software?

Firewalls are filters that stand between a computer or computer network and the Internet. Each firewall can be programmed to keep specific traffic in or out. All messages passing through the firewall are examined and those not meeting pre-defined security criteria are blocked.


For example, on the outbound side, firewalls can be configured to prevent employees from transmitting sensitive data outside the network, while on the inbound side, firewalls can be configured to prevent access to certain kinds of websites like social media sites.

Firewall Software Features & Capabilities

  • Application visibility and control

  • Identify and control evasive app threats

  • Intrusion Prevention integration

  • Physical and virtual environment support

  • Integration with LDAP and Active Directory

Firewall methods

Firewalls use several methods to control traffic flowing in and out of a network:


  • Packet filtering: This method analyzes small pieces of data against a set of filters. Those that meet the filter criteria are allowed to pass through, while others are discarded.

  • Proxy service: In this method, computers make a connection to the proxy which then initiates a new network connection based on the content of the request. In this way, there is no direct connection or packet transfer on either side of the firewall. Network addresses are effectively hidden.

  • Stateful inspection: Stateful inspection is a newer firewall security method that monitors communications packets over a period of time. Outgoing packets that request specific types of incoming packets are tracked. Only incoming packets that are an appropriate response are allowed to pass. Firewalls using this method are often referred to as next-generation firewalls (NGFW).

Pricing Information

The cost of firewalls can vary from free (for personal use) to significant sums of money for enterprise firewalls. Firewalls are often on-premise appliances, but can also be purchased as software which must be installed on a server, or as a cloud service. The range of pricing models is broad making it difficult to compare across vendors. However, an enterprise firewall may cost upwards of $30,000, depending on capability and type.

Firewall Products

Listings (1-25 of 43)

Cisco ASA

103 Ratings

Cisco ASA is a firewall option.

Fortinet FortiGate

57 Ratings

FortiGate, from San Francisco-based company Fortinet, is a firewall option.

Cisco Meraki MX Firewalls

28 Ratings

Cisco Meraki MX Firewalls are firewall technology.

Palo Alto Networks Next-Generation Firewalls - PA Series

27 Ratings

Palo Alto next-generation firewalls classify all traffic, including encrypted traffic, based on application, application function, user and content. Users can create security policies, resulting in enablement of applications. This lets only authorized users run sanctioned applications, reducing...

pfSense

19 Ratings

pfSense is an open source firewall.

Sophos UTM

16 Ratings

Sophos UTM is a firewall option, from the UK company Sophos.

WatchGuard XTM - Discontinued Product

7 Ratings

WatchGuard XTM is a firewall option, from WatchGuard Technologies.

Juniper SRX

12 Ratings

Juniper SRX is product-line of firewall technology and intrusion detection / prevention systems from Juniper Networks in California.

Palo Alto Networks WildFire

7 Ratings

WildFire is a firewall option from Palo Alto Networks.

SonicWall TZ

15 Ratings

SonicWall TZ is firewall technology from Dell.

Zscaler Web Security

9 Ratings

Zscaler Web Security from the company Zscaler in San Jose, California, is a firewall option.

Untangle NG Firewall

6 Ratings

Untangle in San Jose, California offers NG Firewall, a firewall platform with network performance monitoring and web content filtering features.

Barracuda NG Firewall

10 Ratings

NG Firewall from Barracuda Networks is a firewall option.

RackFoundry Total Security Management

4 Ratings

RackFoundry Total Security Management offers a complete solution featuring powerful firewall, VPN, Intrusion Detection/Prevention, SIEM, automated vulnerability scanning and log management that is monitored by the vendor’s security operations center. According to the vendor, it is the first...

McAfee Firewall Enterprise

3 Ratings

McAfee Firewall Enterprise (MFE) is firewall technology from McAfee / Intel Security.

Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series

2 Ratings

The VM-Series is a virtualized form factor of Palo Alto next-generation firewall that can be deployed in a range of private and public cloud computing environments based on technologies from VMware®, Amazon® Web Services, Microsoft®, Citrix®, and KVM. The VM-Series natively analyzes all...

Cyberoam

3 Ratings

Cyberoam is a firewall option; the company Cyberoam is now a part of Sophos.

Sourcefire Firewalls

2 Ratings

Sourcefire was acquired by Cisco in 2013 to expand their own firewall technology.

Trustwave Firewalls

1 Ratings

Chicago-based Trustwave offers a firewall option.

Smoothwall UTM

1 Ratings

Smoothwall UTM is the firewall solution from UK company Smoothwall.

Check Point Firewall Software Blade

5 Ratings

Check Point Power-1 is a firewall option, from Check Point Software Technologies.