Best Firewall Software44Firewalls are designed to block unauthorized access to and from networks, but chiefly to stop Internet users from accessing private networks.Cyberoam1https://media.trustradius.com/product-logos/gY/sV/LUCR8FMGRNKH.jpegCheck Point 2200 Appliances- Discontinued2https://media.trustradius.com/vendor-logos/Tb/vB/CDDG6MZOH6BI-180x180.JPEGCheck Point Firewall Software Blade3https://media.trustradius.com/vendor-logos/Tb/vB/CDDG6MZOH6BI-180x180.JPEGCheck Point 4000 Appliances4https://media.trustradius.com/vendor-logos/Tb/vB/CDDG6MZOH6BI-180x180.JPEGCheck Point Next Generation Firewall5https://media.trustradius.com/vendor-logos/Tb/vB/CDDG6MZOH6BI-180x180.JPEG3Com Firewall (Discontinued)6https://media.trustradius.com/vendor-logos/GB/WA/AD35SXDCUJ9A-180x180.PNGCheck Point VSX7https://media.trustradius.com/vendor-logos/Tb/vB/CDDG6MZOH6BI-180x180.JPEGCheck Point UTM-18https://media.trustradius.com/vendor-logos/Tb/vB/CDDG6MZOH6BI-180x180.JPEGStonesoft Next Generation Firewall (Discontinued)9https://media.trustradius.com/vendor-logos/fC/ym/ZG6BNROAG4PC-180x180.PNGStormshield Network Security10https://media.trustradius.com/product-logos/gU/s3/UTFT1PM756TV.jpegA10 Thunder CFW11https://media.trustradius.com/vendor-logos/bJ/Q5/99PWRVRE6VM1-180x180.PNGR&S Unified Firewall12https://media.trustradius.com/vendor-logos/t1/03/GW9B3JVCDZK1-180x180.JPEGCenturyLink Adaptive Network Security Services13https://media.trustradius.com/vendor-logos/OK/UO/KTW2ZSTJRMM2-180x180.JPEGHuawei Unified Security Gateway14https://media.trustradius.com/vendor-logos/AG/vw/4MOX29P1S10T-180x180.JPEGHillstone T-Series Intelligent Next-Generation Firewalls (NGFW)15https://media.trustradius.com/vendor-logos/8a/XH/8KXSWQW27BJ6-180x180.JPEGHillstone X-Series Data Center Next-Generation Firewall16https://media.trustradius.com/vendor-logos/8a/XH/8KXSWQW27BJ6-180x180.JPEGSonicWall E10000 Series17https://media.trustradius.com/vendor-logos/zc/Na/VOD2KUJ9G2Z3-180x180.JPEGSonicWall SuperMassive 9000 Series18https://media.trustradius.com/vendor-logos/zc/Na/VOD2KUJ9G2Z3-180x180.JPEGComodo Firewall19https://media.trustradius.com/vendor-logos/QG/sV/G1522B0P2EWE-180x180.JPEGFortinet on IBM Cloud20https://media.trustradius.com/product-logos/BH/DH/7QMCZ3D8TTGW-180x180.JPEGSangfor NGAF21https://media.trustradius.com/vendor-logos/vy/hl/2GZ3GG424F04-180x180.PNGAhnLab TrusGuard22https://media.trustradius.com/vendor-logos/BO/GF/E2B5C4206AQR-180x180.PNGH3C SecPath23https://media.trustradius.com/vendor-logos/GB/WA/AD35SXDCUJ9A-180x180.PNGAzure Firewall24https://media.trustradius.com/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGCisco Meraki Z3 Teleworker25https://media.trustradius.com/vendor-logos/KP/BJ/EKH5RFTLCO4X-180x180.PNG

Best Firewall Software

TrustMaps are two-dimensional charts that compare products based on satisfaction ratings and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Firewall Software Overview

What are Firewall Software?

Firewalls are filters that stand between a computer or computer network and the Internet. Each firewall can be programmed to keep specific traffic in or out. All messages passing through the firewall are examined and those not meeting pre-defined security criteria are blocked.


For example, on the outbound side, firewalls can be configured to prevent employees from transmitting sensitive data outside the network, while on the inbound side, firewalls can be configured to prevent access to certain kinds of websites like social media sites.

Firewall Software Features & Capabilities

  • Application visibility and control

  • Identify and control evasive app threats

  • Intrusion Prevention integration

  • Physical and virtual environment support

  • Integration with LDAP and Active Directory

  • "Sandbox," or isolated, cloud-based threat emulation

Firewall vendors are beginning to bundle firewall offerings with other security or privacy features, although this is not a universal practice. The most common example is support for Virtual Private Networks (VPN), and load-management is often featured as well.

Firewall methods

Firewalls use several methods to control traffic flowing in and out of a network:


  • Packet filtering: This method analyzes small pieces of data against a set of filters. Those that meet the filter criteria are allowed to pass through, while others are discarded.

  • Proxy service: In this method, computers make a connection to the proxy which then initiates a new network connection based on the content of the request. In this way, there is no direct connection or packet transfer on either side of the firewall. Network addresses are effectively hidden.

  • Stateful inspection: Stateful inspection is the new standard firewall security method that monitors communications packets over a period of time. Outgoing packets that request specific types of incoming packets are tracked. Only incoming packets that are an appropriate response are allowed to pass. Firewalls using this method are often referred to as next-generation firewalls (NGFW).

Firewall Comparison

To compare different Firewall products, you likely want to consider evaluating these aspects of the software:

  1. Managed Service Provider vs. In-House Focus: Are you looking for a firewall product to sell to and manage for your clients, or do you need something for your own business? Products tailored to the former context will emphasize centralized management and customizability, while the latter will be more accessible for line of business users without IT security backgrounds.
  2. Physical vs. Cloud Deployments: The standard deployment method for firewalls is via hardware appliance deployed on premise. Alternative deployments on virtual machines, or hosted in the cloud on 3rd party infrastructure, have become frequent options among leading vendors. Cloud deployments frequently operate on a subscription pricing model, while physical appliances are more likely to be a one-time purchase, with additional costs for software updates varying by product.
  3. Multi-location vs. single location: Providing a firewall across multiple locations will require specific features. The most relevant feature differences will be VPN support (for securely connecting to remote offices), central management support, and native SD-WAN capabilities.
  4. Support: Reviewers frequently mention customer support and service, both positively and negatively depending on the product. Given a convergence of capabilities towards market parity, the extra support and services vendors provide can become a key differentiator between products.

Start a Firewall comparison

Pricing Information

The cost of firewalls can vary from free (for personal use) to significant sums of money for enterprise firewalls. Firewalls are often on-premise appliances, but can also be purchased as software which must be installed on a server, or as a cloud service. The range of pricing models is broad making it difficult to compare across vendors. However, an enterprise firewall may cost upwards of $30,000, depending on capability and type.

Firewall Products

Listings (26-50 of 61)

4 Ratings

Sophos’s Cyberoam offers UTM and NGFW products. Cyberoam provides the full suite of modularized firewall services, as well as real-time reporting, for enterprise-level use.

Check Point Firewall Software Blades are the modularized product offerings that Check Point provides. They include Check Point’s VPN, IPS, Firewall, and Application control features. These features are structured into “blades” to enable easier user access and toggling from a single management consol…

We don't have enough ratings and reviews to provide an overall score.

Check Point VSX is a firewall option, from Check Point Software Technologies in San Carlos, California.

We don't have enough ratings and reviews to provide an overall score.

The Stormshield Network Security is the company's line of SN series Next-Generation Firewalls (NGFW). The SN series is based on the NETASQ Firewalls acquired and merged into Stormshield after that company was formed from the merger of the original companies Netasq and Arkoon.

We don't have enough ratings and reviews to provide an overall score.

A10 Networks offers A10 Thunder CFW (for Convergent Firewall), a combined firewall and secure web gateway.

We don't have enough ratings and reviews to provide an overall score.

Comodo Cybersecurity headquartered in New Jersey offers the Comodo Firewall to deliver security controls to moderate size businesses.

We don't have enough ratings and reviews to provide an overall score.

Sangfor NGAF is a combined NGFW and Web Application Firewall. It provides a full core suite of firewall services scaled for enterprises.

We don't have enough ratings and reviews to provide an overall score.

Korean company AhnLab offers TrusGuard, an integrated firewall, IPS, VPN, anti-virus, and anti-spam security appliance featuring DDoS protection and secure connectivity with internal systems through an IPSec/SSL VPN.

We don't have enough ratings and reviews to provide an overall score.

H3C provides network security via its SecPath next-generation firewall (NGFW) series.

We don't have enough ratings and reviews to provide an overall score.

Microsoft's Azure Firewall is a managed cloud-based network security service that protects Azure Virtual Network resources.

We don't have enough ratings and reviews to provide an overall score.

Cisco Meraki Z3 Teleworker is an enterprise class firewall, VPN gateway and router. Each model offers five gigabit ethernet ports and wireless for connectivity. Each model is designed to securely extend the power of Meraki cloud managed networking to employees, IT staff, and executives working from …

TrustRadius Top Rated for 2019

2019 Top Rated Firewall Software

There are plenty of options out there, but here's our shortlist of the best Firewall Software. These products won a Top Rated award for having excellent customer satisfaction ratings. The list is based purely on reviews; there is no paid placement, and analyst opinions do not influence the rankings. To qualify, a product must have 10 or more recent reviews and a trScore of 7.5 or higher, indicating above-average satisfaction for business technology. The products with the highest trScores appear first on the list. Read more about the Top Rated criteria.

Frequently Asked Questions


What is a firewall?

A firewall is a filter that stands between a computer or computer network and the Internet. It monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of rules. All messages passing through the firewall are examined and those not meeting pre-defined security criteria are blocked.

What are the main types of firewall?

There are four major types.

  • Packet Filtering: Small pieces of data are analyzed against a set of filters and are either allowed to pass through or are discarded.
  • Proxy Firewall: A proxy firewall serves as the gateway from one network to another. Computers make a connection to the proxy which then initiates a new network connection based on the content of the request.
  • Stateful Inspection: Stateful inspection monitors the state of active connections and uses this information to determine which network packets to allow through. Decisions on what to allow through are based on a combination of defined rules and context.
  • Next-Generation Firewall (NGFW): Next-generation firewalls go beyond packet filtering and stateful inspection. They have additional capabilities in order to help combat more modern threats like malware.

What’s the difference between a hardware and a software firewall?

Firewall hardware and firewall software both perform the same task; they both act as barriers between the internet and the computer and they both help to protect from anything that can harm the computer from an outside connection. Hardware firewalls offer network-wide protection from external threats. Software firewalls installed on individual computers are capable of closer data inspection and can block specific programs from sending data to the Internet.

What additional capabilities do next-generation firewalls have?

Next-generation firewalls are an acknowledgement that standard firewall capabilities are insufficient, and they typically include other related technologies such as: intrusion protection systems, deep packet inspection, SSL-encrypted traffic termination, and sandboxing.

How much do firewalls cost?

The cost of firewalls can vary from free (for personal use) to significant sums of money for enterprise firewalls. The range of pricing models is broad making it difficult to compare across vendors. However, an enterprise firewall may cost upwards of $30,000, depending on capability and type.