Why would you use a firewall?

Firewalls can be implemented as both hardware and software, or a combination of both. Network firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.

What a firewall can protect against?

Other firewalls provide less strict protections, and block services that are known to be problems. Generally, firewalls are configured to protect against unauthenticated interactive logins from the “outside” world. This, more than anything, helps prevent vandals from logging into machines on your network.

What a firewall is and why is it necessary?

So for those of you who feel a little unsure – below is a brief overview of why you might need a firewall. If your PC is connected to the Internet, you are a potential target to an array of cyber threats, such as hackers, key loggers, and Trojans that attack through unpatched security holes.

Unified Threat Management (UTM)

This involves an approach to information security whereby a single hardware- or software-installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security-related function. UTM simplifies information-security management by providing a single management and reporting point for the security administrator rather than managing multiple products from different vendors. UTM appliances have quickly gained in popularity, partly because the all-in-one approach simplifies installation, configuration and maintenance. Such a setup saves time, money and people when compared to the management of multiple security systems. Instead of having several single-function appliances, all needing individual familiarity, attention and support, network administrators can centrally administer their security defences from one box.

UTMs at the minimum should have some converged security features like

  • Network Firewall
  • Intrusion Detection
  • Intrusion Prevention

Some of the other features commonly found in UTMs are

  • Gateway Anti-Virus
  • Application Layer (Layer 7) Firewall and control
  • Deep packet inspection
  • Web Proxy & content filtering
  • Data Loss Prevention (DLP)
  • Security Information and Event Management (SIEM)
  • Virtual Private Network (VPN)
  • Network Tarpit