Alternatives to Agilio OVS Firewall

Compare Agilio OVS Firewall alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Agilio OVS Firewall in 2024. Compare features, ratings, user reviews, pricing, and more from Agilio OVS Firewall competitors and alternatives in order to make an informed decision for your business.

  • 1
    AWS Network Firewall
    With AWS Network Firewall, you can create firewall rules that provide fine-grained control over network traffic and easily deploy firewall security across your VPCs. Automatically scale your network firewall to protect your managed infrastructure. Protect your unique workloads with a flexible engine that can define thousands of custom rules. Centrally manage security policies across existing accounts and VPCs and automatically enforce mandatory policies on new accounts. With AWS Network Firewall, you can define firewall rules that provide fine-grained control over network traffic. Network Firewall works together with AWS Firewall Manager so you can build policies based on Network Firewall rules and then centrally apply those policies across your virtual private clouds (VPCs) and accounts. Inspect traffic flows using features such as inbound encrypted traffic inspection, stateful inspection, protocol detection, and more.
  • 2
    FortiGate NGFW
    High threat protection performance with automated visibility to stop attacks. FortiGate NGFWs enable security-driven networking and consolidate industry-leading security capabilities such as intrusion prevention system (IPS), web filtering, secure sockets layer (SSL) inspection, and automated threat protection. Fortinet NGFWs meet the performance needs of highly scalable, hybrid IT architectures, enabling organizations to reduce complexity and manage security risks. FortiGate NGFWs are powered by artificial intelligence (AI)-driven FortiGuard Labs and deliver proactive threat protection with high-performance inspection of both clear-text and encrypted traffic (including the industry’s latest encryption standard TLS 1.3) to stay ahead of the rapidly expanding threat landscape. FortiGate NGFWs inspect traffic as it enters and leaves the network. These inspections happen at an unparalleled speed, scale, and performance and prevent everything from ransomware to DDoS attacks.
  • 3
    vSRX Virtual Firewall

    vSRX Virtual Firewall

    Juniper Networks

    Organizations are increasingly moving workloads to the cloud to capitalize on virtualization benefits—but with that move comes new security requirements. Enter the vSRX Virtual Firewall, providing scalable, secure protection across private, public, and hybrid clouds.
  • 4
    ColorTokens Xtended ZeroTrust Platform
    The cloud-delivered ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection. Visibility across on-premise & multiclouds. Micro-segment for cloud workload protection. Stop ransomware from owning your endpoints. See all communication between processes, files, users, applications, and workloads. Identify security gaps with built-in threat and vulnerability assessment. Simple and faster time-to-compliance (for HIPAA, PCI, GDPR). Easily create ZeroTrust Zones™ and drastically reduce the attack surface. Dynamic policies that protect workloads migrating to the cloud. Block lateral threats without cumbersome VLANs/ACLs or firewall rules. Lockdown any endpoint by automatically allowing only whitelisted processes. Block zero day or fileless exploits, and stop communication to C&C servers.
  • 5
    Junos Security Director

    Junos Security Director

    Juniper Networks

    Security Director is your portal to SASE, bridging your current security deployments with your future SASE rollout. Security Director enables organizations to manage security anywhere and everywhere, on-premise and in the cloud with unified policy management that follows users, devices, and applications wherever they go. Policies can be created once and applied everywhere. Customers can use both Security Director Cloud and on-premises instances simultaneously to securely transition to a SASE architecture. Security Director provides extensive security policy management and control through a centralized interface and enforces policies across physical, virtual, and containerized firewalls on-premises and across multiple clouds simultaneously. Quickly manage all phases of the security policy lifecycle for firewalls, including zero-touch provisioning and configuration, and gain insight into sources of risk across your network.
  • 6
    iSecurity Firewall

    iSecurity Firewall

    Raz-Lee Security

    iSecurity Firewall is a comprehensive, all-inclusive intrusion prevention system that secures every type of internal and external access to the IBM i server. It enables you to easily detect remote network accesses and, most importantly, implement real-time alerts. Firewall manages user profile status, secures entry via pre-defined entry points and IBM i file server exit points, and profiles activity by time. Its “top-down” functional design and intuitive logic creates a work environment that even iSeries novices can master in minutes. Protects all communication protocols (including SQL, ODBC, FTP, Telnet, SSH, and Pass-through). Intrusion Prevention System (IPS) with real-time detection of access attempts. Precisely controls what actions users may perform after access is granted – unlike standard firewall products. Protects both native and IFS objects – all of your databases are secured.
  • 7
    Cisco ACI
    Achieve resource elasticity with automation through common policies for data center operations. Extend consistent policy management across multiple on-premises and cloud instances for security, governance, and compliance. Get business continuity, disaster recovery, and highly secure networking with a zero-trust security model. Transform Day 2 operations to a more proactive model and automate troubleshooting, root-cause analysis, and remediation. Optimizes performance, and single-click access facilitates automation and centralized management. Extend on-premises ACI networks into remote locations, bare-metal clouds, and colocation providers without hardware. Cisco's Multi-Site Orchestrator offers provisioning and health monitoring, and manages Cisco ACI networking policies, and more. This solution provides automated network connectivity, consistent policy management, and simplified operations for multicloud environments.
  • 8
    Trend Micro TippingPoint
    Go beyond next-gen IPS without compromising security or performance. TippingPoint integrates with the Deep Discovery Advanced Threat Protection solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight and prioritization, and real-time enforcement and remediation. The TippingPoint®️ Threat Protection System is part of Trend Micro Network Defense. It’s powered by XGen™️ security, a blend of cross-generational threat defense techniques that deliver faster time to protection against known, unknown, and undisclosed threats. Our smart, optimized, and connected technology ensures that everything is working together to give you visibility and control across the evolving threat landscape.
  • 9
    Symantec Data Center Security
    Complete server protection, monitoring, and workload micro-segmentation for private cloud and physical on-premises data center environments. Security hardening and monitoring for private cloud and physical data centers with support for Docker containers. Agentless Docker container protection with full application control and integrated management. Block zero-day exploits with application whitelisting, granular intrusion prevention, and real-time file integrity monitoring (RT-FIM). Secure OpenStack deployments with full hardening of Keystone identity service module. Data center security: monitoring. Continuous security monitoring of private cloud and physical on-premises data center environments. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services.
  • 10
    HyTrust

    HyTrust

    HyTrust

    In a multi-cloud world where technology moves at lightning speed and security often plays catchup, organizations face the daunting challenge of eliminating the gaps and resolving the inconsistencies in policy enforcement and adherence to compliance mandates. HyTrust CloudControl provides advanced privileged user access control, policy enforcement, forensic and automated compliance for private clouds. HyTrust DataControl provides powerful data-at-rest encryption and integrated key management for workloads running in any cloud environment. Encrypting workloads helps enterprises to ensure their data is protected. One of the challenges of workload encryption is scaling the management of encryption keys. HyTrust’s mission is to make private, public and hybrid cloud infrastructure more trustworthy for enterprises, service providers and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking and storage workloads.
  • 11
    Symantec Integrated Cyber Defense
    The Symantec Integrated Cyber Defense (ICD) Platform delivers Endpoint Security, Identity Security, Information Security, and Network Security across on-premises and cloud infrastructures to provide the most complete and effective asset protection in the industry. Symantec is the first and only company to unify and coordinate security. Functions across both cloud and on-premises systems. Symantec enables enterprises to embrace the cloud as it makes sense for them, without sacrificing past investments and reliance on critical infrastructure. We know Symantec will never be your only vendor. That’s why we created Integrated Cyber Defense Exchange (ICDx), which makes it easy to integrate third-party products and share intelligence across the platform. Symantec is the only major cyber defense vendor that builds solutions to support all infrastructures, whether entirely on-premises, entirely in the cloud, or a hybrid of the two.
  • 12
    OPNsense

    OPNsense

    OPNsense

    Simple packet filters are becoming a thing of the past. Even the open-source domain is moving towards Next-Generation Firewalls. And OPNsense is a top player when it comes to intrusion detection, application control, web filtering, and anti-virus. No network is too insignificant to be spared by an attacker. Even home networks, washing machines, and smartwatches are threatened and require a secure environment. Firewalls are a component of the security concept. They protect against known and new threats to computers and networks. A firewall offers the highest level of protection if its functions are known, its operation is simple, and it is ideally positioned in the surrounding infrastructure. OPNsense accepts the challenge and meets these criteria in different ways. This book is the ideal companion for understanding, installing and setting up an OPNsense firewall.
  • 13
    Untangle NG Firewall
    Managing your network and ensuring every device is adequately protected can be a complex and costly task. NG Firewall simplifies network security with a single, modular, software platform designed to fit the evolving needs of your organization. Designed specifically for organizations with limited IT resources and budgets, NG Firewall provides a browser-based, responsive and intuitive interface enabling you to quickly gain visibility into the traffic on the network. From content filtering to advanced threat protection, VPN connectivity to application-based shaping for bandwidth optimization, NG Firewall delivers a comprehensive, enterprise-grade network security platform for organizations in any industry. Dedicated hardware appliances provide extensive control of the network, visibility into traffic and events, flexible connectivity options, and multiple layers of advanced protection.
  • 14
    Xvirus Firewall
    Xvirus Firewall is designed as a simple application that enables the user to check all active connections and control which are granted access or not. Xvirus Firewall is a straightforward application that relies on whitelisting and blacklisting for managing the connections. There are no parameters to set up or other assessment capabilities that could determine the legitimacy of a connection. Xvirus Firewall is simple enough for novice users and advanced enough for experienced users. You can just install and forget it or change the settings for a more customizable experience, either way, you know you will be secure. Thanks to Xvirus' Network Monitor you can see all the details of the connections of your applications, like the protocol, IP and port, status, and the process id. Xvirus Firewall allows you to control what programs run on your computer. With its simple rules list, you can manage which program should be allowed to run or block.
    Starting Price: €19.99 per year
  • 15
    Forcepoint NGFW
    The Forcepoint Next Generation Firewall has multiple layers of defenses that protect your network, your endpoints, and your users against modern, advanced threats. Ability to manage large quantities of firewalls and fleets of firewalls at scale without compromising performance. Ease of management, the granularity of controls, and scalability of management capabilities. Assessed block rate, IP Packet Fragmentation/TCP Segmentation, false-positive testing, stability, and reliability. Assessed ability to protect against evasions, HTTP evasions, and a combination of evasion techniques. Designed like software, rather than hardware, NGFW gives you the flexibility to deploy on hardware, virtually or in the cloud. Open API's let you customize automation and orchestrations to your own specifications. Our products routinely undergo rigorous certification testing to meet the most stringent needs of sensitive and critical industries, agencies, organizations and governments around the world.
  • 16
    Kerio Control

    Kerio Control

    GFI Software

    Detect threats, block viruses and secure VPN with the firewall built for SMB. Configure your firewall with easy-to-use traffic rules, controlling in- and outbound communications by URL, application, traffic type and more. Intrusion detection and prevention using the Snort system constantly monitors inbound and outbound network communications for suspicious activity. Log or block the communications depending on the severity. Prevent viruses, worms, Trojans and spyware from entering your network. Kerio Control goes beyond just checking files for malicious code; it scans your network traffic for potential attacks. Create secure, high-performance server-to-server connections between your offices running Kerio Control with an easy-to-setup VPN technology. Or, you can create a secure VPN connection to a remote office that doesn’t have Kerio Control deployed, using industry-standard VPN protocols.
    Starting Price: $270 per year
  • 17
    Sophos XG Firewall
    The world's best visibility, protection, and response. Superior visibility into risky activity, suspicious traffic, and advanced threats helps you regain control of your network. Powerful next-gen protection technologies like deep learning and intrusion prevention keep your organization secure. Automatic threat response instantly identifies and isolates compromised systems on your network to stop threats from spreading. XG Firewall makes it easy to extend your secure network to employees anywhere. Sophos Connect provides an intuitive VPN connection client that’s easy to deploy and configure. Give your remote workers secure access to resources on the corporate network from Windows and macOS devices. Our small, ultra-affordable XG 86(w) and SD-RED devices provide the ultimate in SOHO protection with always-on dedicated or split-tunnel VPN that’s easy to deploy and manage with a variety of flexible options.
  • 18
    Falcon Firewall Management
    Falcon Firewall Management makes it easy to create, manage and enforce policies with a simple, centralized approach. Defend against network threats, and gain instant visibility to enhance protection and inform action.Delivered via the same lightweight Falcon agent, management console and cloud-native architecture, it deploys and is operational in minutes. Simplifies operations by using the same lightweight Falcon agent, management console and cloud-native architecture. Deploys and is operational in minutes without requiring reboots, fine-tuning or complex configuration. Streamlines workflows and increases visibility across endpoint security controls due to the single management console for both endpoint protection and host firewall management. Automatically identify and view specific activities, potential threats and network anomalies.
  • 19
    BIG-IP Advanced Firewall Manager
    DDoS attacks saturate bandwidth, consume network resources, and disrupt application services. Can your infrastructure successfully fend them off? Advanced Firewall Manager mitigates network threats before they disrupt critical data center resources. Unifies application configuration with network security policy for tighter enforcement. Identifies and mitigates network, protocol, DNS threats, before they reach critical data center resources. Supports SNMP, SIP, DNS, IPFIX collectors, and protects log servers from being overwhelmed. Protects data center resources with purpose-built defenses augmented by F5 threat data. Understand traffic patterns into the data center with customizable reports and analytics. Mitigate sophisticated zero-day threats or gather critical forensics using F5 iRules. Defends your network infrastructure and mobile subscribers from attacks such as DDoS.
  • 20
    AhnLab TrusGuard
    The NGFW TrusGuard has been acknowledged by a through market assessment for its technology, performance and stability. The firewall, IPS, application control, VPN, C&C, Anti-Virus/Anti-Spam and DLP protect the business environment. TrusGuard has full lineup from the low-end to data center level models. Scales up to protect high-performance networks. Capable of handling growing network traffic, thanks to optimization for high-performance multicore environments. Ensures network stability. Protects network resources (such as, websites, database servers, applications servers, and client machines) from unknown network attacks with the 3-step defense. Covers IPv6 network environments. Complete support for IPv6 networks. Reduces total cost of operation (TCO). Offers cost cuts compared to integrating multiple security products Relieves operational and labor costs associated with managing multiple security solutions. Increases productivity and network efficiency.
  • 21
    Comodo Endpoint Security Manager
    Comodo Advanced Endpoint Protection provides a state-of-the-art anti-malware suite that proactively protects your servers, workstations, laptops and netbooks while offering advanced, real-time management and control over critical system resources. Whether deployed as a complete security suite or by using the sandbox as a standalone to fortify existing AV solutions, Comodo ESM offers unrivaled endpoint protection for Microsoft Windows servers, desktops, laptops and tablets. The full Comodo Endpoint Security suite brings 5 layers of defense (Antivirus, Firewall, Host Intrusion Prevention, Auto-Sandbox & File Reputation) to the point of impact - the desktop environment. Its ground-breaking auto-sandbox technology eliminates malware outbreaks and operating system contamination by automatically running untrusted processes in an isolated environment. This makes Comodo's endpoint protection the only managed anti-malware solution that can offer a $5,000 limited warranty against infection.
    Starting Price: $4.00/one-time/user
  • 22
    Zenarmor

    Zenarmor

    Zenarmor

    Get instant security whenever and wherever you have network access! Easily manage all your Zenarmor instances through the cloud-based management interface and get ultimate control over your security! Powerful, enterprise-class content filtering engine that detects and blocks advanced malware as well as highly sophisticated threats. You can even deploy Zenarmor on an outdated PC or a home lab virtual system! Free, lightweight and nimble. This allows enterprises to instantly launch software-based micro firewalls on demand to easily secure assets wherever they might be and at any time. AI-powered cloud based web categorization database provides real-time classification for hundreds of millions of sites. Unknown sites are categorized under 5 minutes.
  • 23
    A10 Thunder ADC

    A10 Thunder ADC

    A10 Networks

    High-performance advanced load balancing solution that enables your applications to be highly available, accelerated, and secure. Ensure efficient and reliable application delivery across multiple datacenters and cloud. Minimize latency and downtime, and enhance end-user experience. Increase application security with advanced SSL/TLS offload, single sign-on (SSO), DDoS protection and Web Application Firewall (WAF) capabilities. Integrate with the Harmony™ Controller to gain deep per-application visibility and comprehensive controls for secure application delivery across on-premises datacenters, public, private and hybrid clouds. Complete full-proxy Layer 4 load balancer and Layer 7 load balancer with flexible aFleX® scripting and customizable server health checks. High performance SSL Offload with up-to-date SSL/TLS ciphers enabling optimized and secure application service. Global Server Load Balancing (GSLB) extends load balancing on a global basis.
  • 24
    FirstWave Cloud Content Security Platform
    COVID-19 forced businesses to send their people home or away from the office to work. Using less secure home or public rather than private networks led almost immediately to a dramatic increase in cyber-attacks. Targeted phishing, malware and ransomware attacks and data breaches, designed to cripple businesses financially and operationally, all increased substantially. The end-user problem is now well-understood globally. If organisations, particularly small and medium businesses who have less financial and human capacity than larger organisations, do not reduce the risk of cyber threats by protecting the rapidly expanding new perimeter (i.e. from simply the firewall to email, web, and end-point devices), eventually they will be compromised. It will be disruptive, potentially very expensive and for some, terminal.
  • 25
    Trend Micro ServerProtect
    Enterprise servers can be a vulnerable, centralized point of information exchange. Even from inside the network, users or applications without adequate protection can unintentionally upload infected files to the server, which can spread to other systems that access these files. Additionally, large organizations may have hundreds or thousands of individual server machines that require monitoring, configuration, and maintenance. More importantly, today’s sophisticated attacks can target multiple points on the network and leave unseen trails of damage and the potential for re-infection. Trend Micro™ ServerProtect™ delivers the industry’s most reliable virus, spyware and rootkit protection while simplifying and automating security operations on servers. ServerProtect scans and detects malware in real time and incorporates cleanup capabilities to help remove malicious code and repair system damage.
  • 26
    Azure Firewall
    Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. The stateful firewall service has built-in high availability and unrestricted cloud scalability to help you create, enforce, and log application and network connectivity policies across subscriptions and virtual networks. Simplify deployment and management of your network security with a scalable and highly available cloud native firewall. Centrally manage security across all virtual networks with a common set of network and application rules.
  • 27
    Alibaba Cloud Firewall
    Cloud Firewall is one of the first SaaS firewalls deployed on the public cloud. It is your first choice for network security that safeguards your businesses in the cloud. Alibaba Cloud Firewall centrally manages the policies that control the traffic from the Internet to your businesses. It also controls the traffic between VPC networks, the traffic on Express Connect instances, and the traffic generated by VPN-based remote access. Cloud Firewall is embedded with an Intrusion Prevention System (IPS) and can detect outbound connections from your assets. Alibaba Cloud Firewall can also visualize network traffic and access between businesses as well as can store network traffic logs generated within the last six months. You can quickly activate Cloud Firewall without complex network configuration or image file installation. The firewalls are deployed in clusters to ensure high reliability. Smooth capacity expansion is supported.
  • 28
    Bitdefender GravityZone
    Bitdefender GravityZone provides full visibility into organizations' overall security posture, global security threats, and control over its security services that protect virtual or physical desktops, servers and mobile devices. All Bitdefender's Enterprise Security solutions are managed within the GravityZone through a single console, Control Center, that provides control, reporting, and alerting services for various roles within the organization
  • 29
    Akamai Guardicore Segmentation
    Akamai Guardicore Segmentation simplifies segmentation, reduce your attack surface and prevent lateral movement with fast and simple segmentation that works everywhere. Granular visibility and segmentation controls for Data Center, Cloud and Hybrid Cloud Environments. The Akamai Guardicore Segmentation Platform is the simplest and most intuitive way to visualize activity in data center and cloud environments, implement precise segmentation policies, protect against external threats, and detect possible breaches quickly. Akamai Guardicore Segmentation collects detailed information about an organization’s IT infrastructure through a mix of agent-based sensors, network-based data collectors, and virtual private cloud (VPC) flow logs from cloud providers. Relevant context is added to this information through a flexible and highly automated labeling process that includes integration with existing data sources like orchestration systems and configuration management databases.
  • 30
    Privafy

    Privafy

    Privafy

    Data security must adapt to this world of change by protecting data-in-motion as it moves across enterprises, communications service providers, and IoT devices. For telecommunications service providers, there is CarrierEdge. Built to help carriers deliver managed security services to their customers through the cloud, enabling rapid scalability through simple, flexible licensing models. CarrierEdge provides a complete, enterprise-class security stack that protects data-in-motion as it moves between the enterprise, the carrier network, and the cloud. For IoT device manufacturers, there is MicroEdge. Designed for rapid, simple integration into existing IoT chipsets, MicroEdge delivers embedded security capabilities for data-in-motion as it moves from devices through hybrid cloud environments, allowing IoT device manufacturers to provide data security assurance to their customers at a lower price per device.
  • 31
    Trend Micro Deep Security
    Get streamlined with a complete set of workload security capabilities and protect your cloud-native applications, platforms, and data in any environment with a single agent. Thanks to our strong API integration with Azure and AWS, Deep Security works seamlessly in the cloud. Protect your sensitive enterprise workloads without the need to set up and maintain your own security infrastructure. Accelerate and maintain compliance for your hybrid and multi-cloud environments. Although AWS and Azure have many compliance certifications, you are still responsible for securing the workloads you put in the cloud. Secure servers across the data center and cloud with a single security product. Remove the need to worry about product updates, hosting, or database management. Quick Start AWS CloudFormation templates available for NIST and AWS Marketplace. Host-based security controls that can be deployed automatically, even while auto-scaling.
  • 32
    Corsa Security

    Corsa Security

    Corsa Security

    Many large network owners still want a ‘private network’ approach for their network security to ensure data privacy, data sovereignty and low latency that meets their business needs and regulatory compliance requirements. But when it comes to on-premise firewalls, not much has evolved beyond introducing bigger and bigger hardware appliances. Corsa Security offers the first turnkey network security virtualization solution that helps large enterprises and service providers scale threat protection and automate firewall virtualization, at much lower total cost of ownership (TCO) by replacing their physical firewalls with virtual ones. By tightly integrating firewall virtualization with intelligent orchestration, the Corsa Security Orchestrator provides an aggregated view of all your virtual firewalls while managing their infrastructure health, capacity and performance.
  • 33
    Fidelis Halo

    Fidelis Halo

    Fidelis Cybersecurity

    Fidelis Halo is a unified, SaaS-based cloud security platform that automates cloud computing security controls and compliance across servers, containers, and IaaS in any public, private, hybrid, and multi-cloud environment. With over 20,000 pre-configured rules and more than 150 policy templates that cover standards such as PCI, CIS, HIPAA, SOC, and DISA STIGs for IaaS services, Halo’s extensive automation capabilities streamline and accelerate workflows between InfoSec and DevOps. The comprehensive, bi-directional Halo API, developer SDK, and toolkit automate your security and compliance controls into your DevOps toolchain to identify critical vulnerabilities so they can be remediated prior to production. The free edition of Halo Cloud Secure includes full access to the Halo Cloud Secure CSPM service for up to 10 cloud service accounts across any mix of AWS, Azure, and GCP, at no cost to you, ever. Sign up now and start your journey to fully automated cloud security!
  • 34
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 35
    Cisco Secure Firewall
    Intelligent control points everywhere, with unified policy and threat visibility. Today's dynamic applications run everywhere. To help you keep pace, Cisco's NetWORK security vision includes solutions integration. Dynamic policies work for you, coordinating protection at the network firewall and workload levels. Defending networks against increasingly sophisticated threats requires industry-leading intelligence and consistent protections everywhere. Improve your security posture today with Cisco Secure Firewall. As networks become more interconnected, achieving comprehensive threat visibility and consistent policy management is difficult. Simplify security management and gain visibility across distributed and hybrid networks. Cisco Secure Firewall sets the foundation for integrating powerful threat prevention capabilities into your existing network infrastructure, making the network a logical extension of your firewall solution.
  • 36
    SonicWall Next Generation Firewall
    Advanced threat protection, from small businesses to global enterprises and cloud environments. Discover network security made boundless. Whether you’re a small business or a large enterprise, whether in your home or in the cloud, SonicWall next-generation firewalls (NGFW) provide the security, control and visibility you need to maintain an effective cybersecurity posture. SonicWall’s award-winning hardware and advanced technology are built into each firewall to give you the edge on evolving threats. With solutions designed for networks of all sizes, SonicWall firewalls are designed to meet your specific security and usability needs, all at a cost that will protect your budget while securing your network. The SonicWall NSv Series virtual firewall offers you all the security advantages of a physical firewall with the operational and economic benefits of virtualization, including system scalability and agility, speed of system provisioning, simple management and cost reduction.
  • 37
    Palo Alto Networks VM-Series
    Meet demand with automatable, scalable and easy-to-deploy virtual firewalls ideal for environments where deploying hardware firewalls is difficult or impossible. VM-Series virtual firewalls provide all the best-in-class, ML-powered capabilities of the Palo Alto Networks next-generation hardware firewall in a virtual machine form factor, so you can secure the environments that are vital for your competitiveness and innovation. Now you can leverage a single tool to safeguard cloud speed and software-defined agility by infusing segments and microsegments with threat prevention.
  • 38
    Google Cloud Firewalls
    Google Cloud firewalls are fully embedded in the cloud networking fabric, highly scalable, and granular to meet your enterprise’s unique security needs. Flexible and customizable: Benefit from protection at the organization, folder, and project level with flexible control over firewall rules and policies. Visibility and optimization: Gain insights into firewall rule usage and optimization opportunities to help you keep your deployment safe and easy to manage. Granular controls: Leverage network tags and service accounts to define granular control for both north-south and east-west traffic.
  • 39
    IPFire

    IPFire

    IPFire

    IPFire is a hardened, versatile, state-of-the-art Open Source firewall based on Linux. Its ease of use, high performance in any scenario, and extensibility make it usable for everyone. Security is the highest priority in IPFire. It is hardened to protect itself from attacks from the Internet and prevents attacks on your network. Its powerful firewall engine and intrusion prevention system protect your network against attacks from the Internet and denial-of-service attacks. IPFire is free software developed by an open community and trusted by hundreds of thousands of users from all around the world. The primary objective of IPFire is security. It's easy to configure a firewall engine and an intrusion prevention system stops any attackers from breaking into your network. In the default configuration, the network is split into various zones with different security policies such as a LAN and DMZ to manage risks inside the network and have a custom configuration for specific needs.
  • 40
    pfSense

    pfSense

    Netgate

    The pfSense project is a free network firewall distribution, based on the FreeBSD operating system with a custom kernel and including third party free software packages for additional functionality. pfSense software, with the help of the package system, is able to provide the same functionality or more of common commercial firewalls, without any of the artificial limitations. It has successfully replaced every big name commercial firewall you can imagine in numerous installations around the world, including Check Point, Cisco PIX, Cisco ASA, Juniper, Sonicwall, Netgear, Watchguard, Astaro, and more.
  • 41
    Imunify360

    Imunify360

    CloudLinux, Inc.

    Imunify360 is a security solution for web-hosting servers. Imunify360 goes beyond antivirus and WAF and is a combination of an Intrusion Prevention and Detection system, a Application Specific Web Application Firewall, Real-time Antivirus protection, a Network Firewall, and Patch Management components in one security suite. Imunify360 is a fully-automated solution and it collects all statistics under an intuitive dashboard.
  • 42
    Smoothwall Firewall
    Smoothwall Firewall features anti-malware protection, HTTPS inspection, anonymous proxy detection & blocking, and intrusion detection & prevention, to provide you with a complete all-in-one protection package. Combines with Smoothwall Filter for a complete all in one protection package. Can be purchased independently or combined to offer a unified threat management solution. Combines Layer 7 application control with perimeter firewall and stateful packet inspection to provide Next-Generation firewall functionality. Smoothwall is an eligible firewall service provider for Category 2 E-Rate funding. Combines with Smoothwall Filter - the only fully content-aware web filter in US education. You can choose which Filter deployment method works for you. Our US-based customer support team are education specialists and available to help whenever you need them.
  • 43
    VMware vDefend Distributed Firewall
    Stop the lateral spread of threats across multi-cloud environments with a software-based Layer 7 firewall distributed at each workload. Threat actors moving throughout your infrastructure and increasingly sophisticated ransomware attacks make east-west the new battleground. Get the advantage with a software-defined Layer 7 firewall that delivers granular enforcement at scale to secure east-west traffic across today’s multi-cloud world. Easily segment the network, stop the lateral spread of threats, and securely move at the speed of development on your path to Zero Trust. Gain visibility across all network flows to easily achieve granular micro-segmentation and generate context-aware policies for each workload. Reduce the attack surface and defend against known and unknown threats moving within and across clouds with a modern, distributed firewall solution that is purpose-built to secure multi-cloud traffic across virtualized workloads.
  • 44
    Sangfor NGAF

    Sangfor NGAF

    Sangfor Technologies

    Sangfor NGAF is the world's first AI enabled and fully integrated NGFW (Next Generation Firewall) + WAF (Web Application Firewall) with an all-around protection from all threats powered by innovations such as Neural-X and Engine Zero. It is a truly secured, integrated and simplified firewall solution, providing holistic overview of the entire organization security network, with ease of management for administration, operation & maintenance. As the IT industry evolves, so does malicious malware like Ransomware, allowing those with insidious intentions access to all our confidential data, financial information, personal information and more. Traditional internet security solutions are becoming obsolete in the face of rapidly evolving malicious software and network security is taking on a more prominent role in the IT industry.
  • 45
    VyOS

    VyOS

    VyOS

    Democratizing how we access networks through a universal router and open source software. Our vision at VyOS is to dramatically change how we access networks so that we can all build the solutions we always dreamed of, without restrictions, limitations, or prohibitive costs. We fundamentally believe that internet access is as vital to our human development as air, food, water, and healthcare. Built by engineers for engineers, VyOS is an open source software company that democratizes how we access networks so that the many, not the few, benefit from building solutions without limitations and prohibitive fees. We do this as VyOS through our open source software and virtual platforms. Stateful firewalls, zone-based firewall, all types of source and destination NAT (one to one, one to many, many to many). The entire codebase and build toolchain are available to everyone for auditing, building customized images and contributing.
  • 46
    Palo Alto Networks Strata

    Palo Alto Networks Strata

    Palo Alto Networks

    Strata is our industry-leading network security suite. Prevent attacks and manage network transformation while consistently securing users, applications, and data, wherever they reside. Drawing on data collected through PAN-OS device telemetry, Device Insights gives you an overview of the health of your next-generation firewall deployment and identifies areas of improvement. Driven by innovation and dedicated to protecting your business proactively, our award-winning security features the world's first ML-Powered NGFW and empowers you to stay ahead. Best-in-class capabilities, natively integrated, resulting in simplified and highly effective networking and security. Our ML-Powered Next-Generation Firewalls enable you to stay ahead of unknown threats, see everything, including IoT, and reduce errors with automatic policy recommendations.
  • 47
    Check Point Next Generation Firewalls (NGFW)

    Check Point Next Generation Firewalls (NGFW)

    Check Point Software Technologies

    Check Point gateways provide superior security beyond any Next Generation Firewall (NGFW). Best designed for Sandblast Network’s protection, these gateways are the best at preventing the fifth generation of cyber attacks with more than 60 innovative security services. Based on the Infinity Architecture, the new Quantum Security Gateway™ line up of 18 models can deliver up to 1.5 Tbps of threat prevention performance and can scale on demand. Delivers the highest-caliber threat prevention with award winning SandBlast Network Zero Day protection out of the box. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. R81 unified security management control across networks, clouds, and IoT increases efficiency cutting security operations up to 80%.
  • 48
    NSFOCUS NGFW
    As the digital attack surface grows, both the volume and sophistication of cyberattacks increase. The resulting data theft and network disruptions can both threaten your reputation and business, a comprehensive security solution is an absolute necessity in every IT infrastructure. NSFOCUS delivers a fully integrated Next Generation Firewall (NGFW) to meet the changing needs of your cloud-enabled enterprise network. It provides NGFW capabilities and collaborates with other security devices to proactively defend against cyber threats, and improve user and application experience while lowering the total cost of ownership. A dedicated AI-based content moderation module effectively recognizes content in texts, images, and videos. Use honeypots and AI algorithms to trap attacks. AI algorithms recognize attacks and apps in encrypted traffic. Scalable AI-based AV engine increases virus detection rate.
  • 49
    Guardian

    Guardian

    Guardian

    Guardian is the safest and most secure way to protect your privacy and data while using apps and browsing the web on your iOS device. Your IP address will be hidden from any websites visited as traffic is routed through our firewall servers, making it more difficult for advertisers to track you. Your password, financial information and other sensitive data will be protected anywhere you go using strong AES-256 encryption to thwart hackers. Guardian adds an extra layer of strong encryption to all outgoing network traffic and filters out known junk to improve your mobile experience. Grant permissions to specific apps on your device, knowing that any attempt to send data to unwanted trackers will be blocked. Blocks unwanted connections to location trackers, mail trackers, generic data trackers, and other online nuisances
    Starting Price: $0.99 per day
  • 50
    MobileWall

    MobileWall

    CyberReef

    Businesses working anywhere and everywhere means skyrocketing mobile data usage. Expanding device models and operating systems. Increasing risks of unsecured mobile wireless connections. Runaway mobile data expenses. With CyberReef’s patented MobileWall cloud firewall service, you can reduce total data usage by 50-70 percent using built-in bandwidth management tools. Use any SIM-based device, get end-to-end encryption of traffic on your cellular connections, and track and control data use and costs. MobileWall gives your business unprecedented security, visibility, and control over your mobile data. MobileWall provides your business with secure mobile wireless connections. MobileWall offers insights into your corporate mobile data usage. MobileWall automates the management of your mobile data usage and costs. MobileWall’s patented cloud-based firewall enables your business to leverage mobile wireless connections securely using any SIM-based device.
    Starting Price: $3 per month