Alternatives to VyOS

Compare VyOS alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to VyOS in 2024. Compare features, ratings, user reviews, pricing, and more from VyOS competitors and alternatives in order to make an informed decision for your business.

  • 1
    Cloudflare

    Cloudflare

    Cloudflare

    Cloudflare is the foundation for your infrastructure, applications, and teams. Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. It protects your internal resources such as behind-the-firewall applications, teams, and devices. And it is your platform for developing globally scalable applications. Your website, APIs, and applications are your key channels for doing business with your customers and suppliers. As more and more shift online, ensuring these resources are secure, performant and reliable is a business imperative. Cloudflare for Infrastructure is a complete solution to enable this for anything connected to the Internet. Behind-the-firewall applications and devices are foundational to the work of your internal teams. The recent surge in remote work is testing the limits of many organizations’ VPN and other hardware solutions.
    Leader badge
    Compare vs. VyOS View Software
    Visit Website
  • 2
    enforza

    enforza

    enforza

    enforza is a cloud-managed firewall platform that allows you to harness the power of open-source firewall capabilities that are normally reserved for Linux experts using the command line. Complex. Error prone. Specialist skills required. Our goal is to help you build a unified multi-cloud perimeter with the firewall capabilities you need, with easy cloud management at its core, and be a cost-effective alternative to AWS Network Firewall and Azure Firewall and avoiding hefty data processing charges. Install the agent with one command. Claim your device on the portal. Manage your policies.
    Compare vs. VyOS View Software
    Visit Website
  • 3
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential.
  • 4
    Manjaro

    Manjaro

    Manjaro

    Is an accessible, friendly, open-source operating system. Providing all the benefits of cutting-edge software combined with a focus on getting started quickly, automated tools to require less manual intervention, and help readily available when needed. Manjaro is suitable for both newcomers and experienced computer users. Unlike proprietary operating systems you have full control over your hardware without restrictions. This makes Manjaro a powerful Operating System ideal in home, work, and development environments. It is easily possible to run many popular Windows applications, using compatibility software such as Wine, PlayonLinux or Proton via Steam. The examples given here are far from comprehensive! Representing a perfect middle-ground for those who want good performance, full control, and cutting-edge software but also a degree of software stability.
  • 5
    OPNsense

    OPNsense

    OPNsense

    Simple packet filters are becoming a thing of the past. Even the open-source domain is moving towards Next-Generation Firewalls. And OPNsense is a top player when it comes to intrusion detection, application control, web filtering, and anti-virus. No network is too insignificant to be spared by an attacker. Even home networks, washing machines, and smartwatches are threatened and require a secure environment. Firewalls are a component of the security concept. They protect against known and new threats to computers and networks. A firewall offers the highest level of protection if its functions are known, its operation is simple, and it is ideally positioned in the surrounding infrastructure. OPNsense accepts the challenge and meets these criteria in different ways. This book is the ideal companion for understanding, installing and setting up an OPNsense firewall.
    Starting Price: Free
  • 6
    TNSR

    TNSR

    netgate

    Industry-leading price-performance, scalability, and solution flexibility for all edge, campus, data center, and cloud router and site-to-site VPN needs. TNSR is a high-performance software router. TNSR software combines VPP’s extraordinary packet processing performance with Data Plane Development Kit (DPDK) and other open-source technologies to provide a turnkey high-performance router that enables businesses and service providers to address today’s edge and cloud networking needs at extremely low cost. Software as a Service (SaaS) companies that host an application and make it available to customers over the internet are in constant need of high-performance routed infrastructure performance and scale, especially as more business, education, and government clients evolve away from expensive, in-house, application development/support to software as a service. Netgate appliance and virtual machine instances for remote worker, office, and data center locations.
    Starting Price: $999 per year
  • 7
    MyPublicWiFi

    MyPublicWiFi

    MyPublicWiFi

    Anyone nearby can surf the Internet through your sharing. This is also an ideal solution for setting up a temporary Access Point in a hotel room, meeting room, at home, or the like. By enabling user authentication, Customers will be redirected to your login page to authenticate with an access password or accept the Terms Of Use before getting Internet access. The MyPblicWiFi-Firewall can be used to restrict user access to specific servers. You can also prevent the use of certain Internet services (e.g. file sharing programs) or block the use of social media networks (e.g. Facebook). MyPublicWiFi turns your PC into an Adblock Router. Advertising blockers are an effective way to save your internet bandwidth and protect the privacy of your user. The Bandwidth Manager helps you to control the download and upload rate for your hotspot clients. MyPublicWiFi allows you to record and track all visited url pages on your virtual WiFi-Hotspot.
  • 8
    Connectify Hotspot
    Connectify Hotspot makes all your devices happy. This easy-to-use virtual router application lets you share Internet from your laptop with your smartphone, tablet, media player, e-reader, other laptops, and even your nearby friends. Use it anywhere in the world without restrictions. Connectify Hotspot makes the Internet traffic look like it's all coming from your computer — even if it’s coming from connected devices, like other computers, gaming consoles, smartphones, or smart TVs. This way, you will be able to connect all your devices to the Internet without having to worry about any Internet access restrictions. Extend the range of your existing Wi-Fi network. Connectify Hotspot MAX is the only true Wi-Fi Repeater software for Windows.
    Starting Price: $34.99 one-time payment
  • 9
    m0n0wall

    m0n0wall

    m0n0wall

    m0n0wall is a project aimed at creating a complete, embedded firewall software package that, when used together with an embedded PC, provides all the important features of commercial firewall boxes (including ease of use) at a fraction of the price (free software). m0n0wall is based on a bare-bones version of FreeBSD, along with a web server, PHP and a few other utilities. The entire system configuration is stored in one single XML text file to keep things transparent. m0n0wall is probably the first UNIX system that has its boot-time configuration done with PHP, rather than the usual shell scripts, and that has the entire system configuration stored in XML format.
    Starting Price: Free
  • 10
    IPFire

    IPFire

    IPFire

    IPFire is a hardened, versatile, state-of-the-art Open Source firewall based on Linux. Its ease of use, high performance in any scenario, and extensibility make it usable for everyone. Security is the highest priority in IPFire. It is hardened to protect itself from attacks from the Internet and prevents attacks on your network. Its powerful firewall engine and intrusion prevention system protect your network against attacks from the Internet and denial-of-service attacks. IPFire is free software developed by an open community and trusted by hundreds of thousands of users from all around the world. The primary objective of IPFire is security. It's easy to configure a firewall engine and an intrusion prevention system stops any attackers from breaking into your network. In the default configuration, the network is split into various zones with different security policies such as a LAN and DMZ to manage risks inside the network and have a custom configuration for specific needs.
  • 11
    discrimiNAT Firewall

    discrimiNAT Firewall

    Chaser Systems

    The discrimiNAT is a solution to being unable to specify hostnames/FQDNs in Google Cloud Firewall Rules and AWS Security Groups for scalable egress filtering. It works by monitoring and blocking traffic without decryption, with our Deep Packet Inspection engine, inline as a high-availability NAT Instance on the egress of your VPC network. We have made the configuration of this firewall as simple as possible. Just specify the allowed destination FQDNs in the applications' outbound rules itself and the firewall will take care of the rest. See the brief video demos for how straightforward this is. From complete multi-zone network configurations that work with a single click and have sane defaults, to DIY instance deployments so you can configure the networking around it, we have all templates ready to go in our CloudFormation library for AWS and as a Deployment Manager template for Google Cloud.
  • 12
    FreeBSD

    FreeBSD

    FreeBSD

    FreeBSD offers advanced networking, performance, security and compatibility features today which are still missing in other operating systems, even some of the best commercial ones. FreeBSD makes an ideal Internet or Intranet server. It provides robust network services under the heaviest loads and uses memory efficiently to maintain good response times for thousands of simultaneous user processes. FreeBSD brings advanced network operating system features to appliance and embedded platforms, from higher-end Intel-based appliances to ARM, PowerPC, and MIPS hardware platforms. From mail and web appliances to routers, time servers, and wireless access points, vendors around the world rely on FreeBSD’s integrated build and cross-build environments and advanced features as the foundation for their embedded products. And the Berkeley open source license lets them decide how many of their local changes they want to contribute back.
    Starting Price: Free
  • 13
    Maryfi

    Maryfi

    Maryfi

    Other Wi-Fi-enabled devices including laptops, smartphones, music players, and gaming systems can see and join your Maryfi hotspot just like any other Wi-Fi access point and are kept safe and secure by password-protected WPA2 encryption. MaryFi works in case you are using a proxy or even vpn connection. You can connect any WI-FI enabled device to a MaryFi connection. this includes but is not limited to smartphones, Android, Mac iOS, iPad, iPod, iPhone, and Apple TV. With Maryfi, users can wirelessly share any Internet connection such as a cable modem, a cellular card, or even another Wi-Fi network. Other Wi-Fi-enabled devices including laptops, smartphones, music players, and gaming systems can see and join your Maryfi hotspot just like any other Wi-Fi access point and are kept safe and secure by password-protected.
    Starting Price: Free
  • 14
    illumos

    illumos

    illumos

    illumos is a Unix operating system which provides next-generation features for downstream distributions, including advanced system debugging, next generation filesystem, networking, and virtualization options. illumos is developed by both volunteers and companies building products on top of the software. illumos is an excellent base for both traditional and cloud-native deployments. The OmniOS and OpenIndiana distributions are a good place for new users to get started. You can install in a virtual machine or on bare metal. You need an illumos-based operating system to build illumos. Cross-compilation is not supported. illumos is freely available from our source repository. illumos is the home of many technologies including ZFS, DTrace, Zones, ctf, FMA, and more. We pride ourselves on having a stable, highly observable, and technologically different system. illumos has a proud engineering heritage, tracing it roots back through Sun Microsystems to the original releases of UNIX and BSD.
  • 15
    Qubes OS

    Qubes OS

    Qubes OS

    Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing. Qubes OS leverages Xen-based virtualization to allow for the creation and management of isolated compartments called qubes. These qubes, which are implemented as virtual machines (VMs), have specific Purposes with a predefined set of one or many isolated applications, for personal or professional projects, to manage the network stack, the firewall, or to fulfill other user-defined purposes. Qubes brings to your personal computer the security of the Xen hypervisor, the same software relied on by many major hosting providers to isolate websites and services from each other. Can't decide which Linux distribution you prefer? Still, need that one Windows program for work? With Qubes, you're not limited to just one OS. With Whonix integrated into Qubes, using the Internet anonymously over the Tor network is safe and easy.
  • 16
    AWS Network Firewall
    With AWS Network Firewall, you can create firewall rules that provide fine-grained control over network traffic and easily deploy firewall security across your VPCs. Automatically scale your network firewall to protect your managed infrastructure. Protect your unique workloads with a flexible engine that can define thousands of custom rules. Centrally manage security policies across existing accounts and VPCs and automatically enforce mandatory policies on new accounts. With AWS Network Firewall, you can define firewall rules that provide fine-grained control over network traffic. Network Firewall works together with AWS Firewall Manager so you can build policies based on Network Firewall rules and then centrally apply those policies across your virtual private clouds (VPCs) and accounts. Inspect traffic flows using features such as inbound encrypted traffic inspection, stateful inspection, protocol detection, and more.
  • 17
    Alibaba Cloud Firewall
    Cloud Firewall is one of the first SaaS firewalls deployed on the public cloud. It is your first choice for network security that safeguards your businesses in the cloud. Alibaba Cloud Firewall centrally manages the policies that control the traffic from the Internet to your businesses. It also controls the traffic between VPC networks, the traffic on Express Connect instances, and the traffic generated by VPN-based remote access. Cloud Firewall is embedded with an Intrusion Prevention System (IPS) and can detect outbound connections from your assets. Alibaba Cloud Firewall can also visualize network traffic and access between businesses as well as can store network traffic logs generated within the last six months. You can quickly activate Cloud Firewall without complex network configuration or image file installation. The firewalls are deployed in clusters to ensure high reliability. Smooth capacity expansion is supported.
  • 18
    OmniOS

    OmniOS

    OmniOS

    The open-source enterprise server OS with just the features you need. ZFS, OmniOS' native file system, combines a volume manager and file system with strong data-integrity protection. Easily share volumes via iSCSI, CIFS, and NFS. Run lightweight OmniOS or Linux virtual machines in containers without the overhead of a traditional hypervisor and with full resource control. OmniOS also provides full hardware virtualization via bhyve and KVM for running guests such as Microsoft Windows, FreeBSD, and many others. Virtualize your network infrastructure through Crossbow virtual interfaces and switches and even allocate dedicated resources for specific services. DTrace provides a comprehensive dynamic tracing framework to aid troubleshooting across the whole software stack. Always available, instrument anything on demand. OmniOS is open-source, self-hosting, and maintained on GitHub. All development is done out in the open with pull requests and anyone can grab the source and build OmniOS.
    Starting Price: Free
  • 19
    pfSense

    pfSense

    Netgate

    The pfSense project is a free network firewall distribution, based on the FreeBSD operating system with a custom kernel and including third party free software packages for additional functionality. pfSense software, with the help of the package system, is able to provide the same functionality or more of common commercial firewalls, without any of the artificial limitations. It has successfully replaced every big name commercial firewall you can imagine in numerous installations around the world, including Check Point, Cisco PIX, Cisco ASA, Juniper, Sonicwall, Netgear, Watchguard, Astaro, and more.
  • 20
    Sangfor NGAF

    Sangfor NGAF

    Sangfor Technologies

    Sangfor NGAF is the world's first AI enabled and fully integrated NGFW (Next Generation Firewall) + WAF (Web Application Firewall) with an all-around protection from all threats powered by innovations such as Neural-X and Engine Zero. It is a truly secured, integrated and simplified firewall solution, providing holistic overview of the entire organization security network, with ease of management for administration, operation & maintenance. As the IT industry evolves, so does malicious malware like Ransomware, allowing those with insidious intentions access to all our confidential data, financial information, personal information and more. Traditional internet security solutions are becoming obsolete in the face of rapidly evolving malicious software and network security is taking on a more prominent role in the IT industry.
  • 21
    Forcepoint NGFW
    The Forcepoint Next Generation Firewall has multiple layers of defenses that protect your network, your endpoints, and your users against modern, advanced threats. Ability to manage large quantities of firewalls and fleets of firewalls at scale without compromising performance. Ease of management, the granularity of controls, and scalability of management capabilities. Assessed block rate, IP Packet Fragmentation/TCP Segmentation, false-positive testing, stability, and reliability. Assessed ability to protect against evasions, HTTP evasions, and a combination of evasion techniques. Designed like software, rather than hardware, NGFW gives you the flexibility to deploy on hardware, virtually or in the cloud. Open API's let you customize automation and orchestrations to your own specifications. Our products routinely undergo rigorous certification testing to meet the most stringent needs of sensitive and critical industries, agencies, organizations and governments around the world.
  • 22
    WatchGuard Network Security

    WatchGuard Network Security

    WatchGuard Technologies

    Our products provide your security systems with complete, uncompromising visibility into your network. You will find that this helps to keep pace with increasing network speed and complexity, while gaining the insight needed to better detect and contain breaches, and achieve a rapid recovery. By implementing Network Critical solutions you can improve your existing security system's network performance, therefore increasing your ROI. Firstly, SPAN ports. These have been a long-term, insufficient, solution to network security. It is remarkably easy for hackers to infiltrate routers, switches and entire networks without detection. SPAN does not provide access to real-time information either, which is another key issue that may greatly affect your network's security. This is because SPAN ports groom your data, unlike Network TAPs, that act as a window, where you can look through at any time, in real-time.
  • 23
    Zenarmor

    Zenarmor

    Zenarmor

    Get instant security whenever and wherever you have network access! Easily manage all your Zenarmor instances through the cloud-based management interface and get ultimate control over your security! Powerful, enterprise-class content filtering engine that detects and blocks advanced malware as well as highly sophisticated threats. You can even deploy Zenarmor on an outdated PC or a home lab virtual system! Free, lightweight and nimble. This allows enterprises to instantly launch software-based micro firewalls on demand to easily secure assets wherever they might be and at any time. AI-powered cloud based web categorization database provides real-time classification for hundreds of millions of sites. Unknown sites are categorized under 5 minutes.
  • 24
    Verizon Virtual Network Services (VNS)
    As network operations become increasingly complex, businesses are facing another challenge when trying to meet demand—rigid service delivery and rising operating costs. Verizon’s Virtual Network Services (VNS) - Routing gives you a more simplified way to connect your people, places, and things. Unlike traditional appliance-based routers that might take weeks to implement, VNS - Routing can be deployed as quickly as a matter of minutes, using a pre-defined catalog of virtual functions and easy-to-deploy equipment that can support multiple network functions. This also expands your options for the routing services you want to use. Not only are you able to select different sizing models, but you can choose the router image that matches other technologies in your existing network.
  • 25
    AP Lens

    AP Lens

    AP Lens

    AP Lens is a Sandbox Browser that isolates networks using DNS Whitelisting. We stop the attack before it reaches the network. What does AP Lens provide? - Web Filtering: Flexible and user-friendly content blocking. - Anti-Phishing: Stop look-alike domains with 100% accuracy. - Ransomware Protection: Isolate the network without affecting business applications. - Secure Remote Work: Enforce internet usage policies without VPN slowness. - No More 0-Day Attacks: Escape the limits of blacklisting with AP Lens Augmented Whitelist. - Compliant: AP Lens meets regulatory requirements requested by cybersecurity insurance policies. - One-Click Installation: No need for a lengthy setup process or updating from the user's side. - No Maintenance: Stop malware and phishing without continuous monitoring. Our team builds on over 20 years of experience in cyber security, cloud security, and information protection in industries such as private banking and the public sector.
    Starting Price: $5
  • 26
    6WIND Virtual Service Router
    6WIND VSR is a product line comprising of various high-performance and scalable virtualized software routers optimized for CSPs, MNOs and Enterprises. They can be deployed bare-metal, virtualized, or containerized on COTS servers in private and public clouds. Our VSR solutions are based on the 6WIND core technology (6WNOS), and can reduce your carbon footprint by lowering your energy consumption by more than 50%. 6WIND VSR product suite comprises of vPE, vCSR, vSecGW, vCGNAT, vBorderRouter & vCPE Virtual Router Solutions, delivering: End to End Security, Reliability & Flexibility, Increased Deployment Agility, Optimized use of Resources, Highly Cost Effective. The 6WIND VSR Product Suite has demonstrated its ability to conserve energy and reduce carbon footprint. These solutions offer high performance, security, scalability, flexibility, openness, and agility to global CSPs, MNOs, Cloud Providers, Data Centers, and Enterprises.
  • 27
    Winhotspot

    Winhotspot

    Winhotspot

    Winhotspot is a virtual wifi hotspot software for Windows Winhotspot stands for Windows hotspot, and this software which can be downloaded and installed on a laptop or PC will allow your laptop's internet to be shared by creating a wireless router virtually. It's free and easy to use and also has a lot of wifi tools you can check who is connected to your wifi hotspot, I forgot to mention that you can specify a password to protect your WiFi access point.
    Starting Price: Free
  • 28
    HostedNetworkStarter
    Using the Wifi hosted network feature of Windows operating system. With the wifi hotspot created by this tool, you can allow any device with wifi support to access the network and the Internet connection available in your computer. HostedNetworkStarter crashes when trying to start the hosted network. The crash occurs inside hnetcfg.dll while HostedNetworkStarter requests to disable previous ICS (Internet Connection Sharing) settings in order to set ICS for the hosted network. It's unclear whether this crash occurs because HostedNetworkStarter does something wrong or it's some kind of bug in ICS component of Windows 10. Some people reported that this crash started to appear after installing Windows 10 Anniversary Update.
    Starting Price: Free
  • 29
    ARPMiner

    ARPMiner

    KaplanSoft

    ARPMiner consists of a GUI and a service application called TekSpot, PPPoE, HTTP, DHCP server, and a proxy DNS server. RADIUS accounting and PPP encryption are supported in only the SP edition. ARPMiner supports three modes of operation for access control. Network Address Translation (NAT), bridge mode, and PPPoE server mode. ARPMiner allows you to set the private interface IP address and subnet mask directly from the management interface. IP address and subnet mask of the interface will be changed at the operating system level when you save the settings changes in ARPMiner. You can enable sponsored authorization to allow HotSpot users to request access from a corporate employee via email. ARPMiner sends a request for access on behalf of the user to a user-specified sponsor email address.
    Starting Price: 269
  • 30
    CloudReady

    CloudReady

    Neverware

    Transform your organization’s computers so they’re secure, easy to manage, and never slow down. CloudReady gives you all the power of the web—without the weight or risk of traditional operating systems. It’s an OS designed for now...and for what’s next. That’s why companies, non-profits, schools, and government agencies around the world use CloudReady to streamline and secure their devices when accessing web apps and VDI. CloudReady is based on Google’s Chromium OS, the same open-source architecture as Chrome OS. Whether your computers are brand new or a decade old, installing CloudReady provides unparalleled speed, simplicity, and security without hardware limitations.
    Starting Price: $15 per device per year
  • 31
    GemOS

    GemOS

    GemOS

    We allow companies to discover and share disparate data tied to unique identifiers. Create flexible applications that can adapt to different protocols, like Ethereum, Hyperledger and more. Run blockchain nodes of varying sizes and functionality to fit your needs, as a validator or read-only participant. Additionally, you can connect to one or many protocols. Connect data sources from different systems, and register them on a common ledger. Create proofs-of-existence with verifiable integrity without surrendering custody of sensitive information. Attach identity registries for individuals, groups, and devices, and assign a universal blockchain IDs. Create entitlements for users and roles across the network and automatically enforce key-based authorization. Safeguard user access with industry-leading security based on PKI and hierarchical-deterministic (HD) identity trees. Integrate your organization's identity and permission schemas for mirrored functionality.
  • 32
    Corsa Security

    Corsa Security

    Corsa Security

    Many large network owners still want a ‘private network’ approach for their network security to ensure data privacy, data sovereignty and low latency that meets their business needs and regulatory compliance requirements. But when it comes to on-premise firewalls, not much has evolved beyond introducing bigger and bigger hardware appliances. Corsa Security offers the first turnkey network security virtualization solution that helps large enterprises and service providers scale threat protection and automate firewall virtualization, at much lower total cost of ownership (TCO) by replacing their physical firewalls with virtual ones. By tightly integrating firewall virtualization with intelligent orchestration, the Corsa Security Orchestrator provides an aggregated view of all your virtual firewalls while managing their infrastructure health, capacity and performance.
  • 33
    CIRA DNS Firewall
    CIRA's DNS Firewall provides protection against malware and phishing attacks by blocking access to malicious websites. CIRA combines advanced data science with decades of experience managing the DNS to provide a critical element of your defense-in-depth strategy. Cybersecurity is a game of layers. No one cybersecurity solution is 100% effective. Whether you have traditional endpoint or firewall protection, a defense-in-depth strategy that includes a DNS firewall is essential. DNS Firewall adds a cost-effective, low-maintenance layer to your cybersecurity footprint. By monitoring and analyzing your DNS traffic, DNS Firewall can block users from accessing malicious websites, prevent phishing attacks, and even stop malware already on your network from accessing the internet. Faster data can optimally route on networks in Canada to improve performance. Private with all data kept secure and sovereign.
  • 34
    Untangle NG Firewall
    Managing your network and ensuring every device is adequately protected can be a complex and costly task. NG Firewall simplifies network security with a single, modular, software platform designed to fit the evolving needs of your organization. Designed specifically for organizations with limited IT resources and budgets, NG Firewall provides a browser-based, responsive and intuitive interface enabling you to quickly gain visibility into the traffic on the network. From content filtering to advanced threat protection, VPN connectivity to application-based shaping for bandwidth optimization, NG Firewall delivers a comprehensive, enterprise-grade network security platform for organizations in any industry. Dedicated hardware appliances provide extensive control of the network, visibility into traffic and events, flexible connectivity options, and multiple layers of advanced protection.
  • 35
    Protectstar Firewall AI
    Android Firewall is not only ready to use in seconds but also protects you from hacker attacks and notifies you when an app tries to send data to the internet. Get a real-time view of which apps are accessing which servers or wasting mobile data. With simple filter rules, you can even allow or deny certain connections of an app. With the firewall, you can monitor and block this data traffic. You can also completely block the online access of an app. The AI Android firewall can block unwanted access from known intelligence agencies and government organizations. With our built-in Intrusion Prevention System (IPS), all known servers and IP addresses of the FBI, CIA, NSA, GCHQ, and many more are automatically blocked. If there is an access attempt, you will receive a special warning. Firewall AI protects you from spy servers in countries like China, Iran, and Russia, as well as mobile trackers.
    Starting Price: $9.90 per year
  • 36
    Barracuda CloudGen Firewall
    Get comprehensive protection for on-premises and multi-cloud deployment using the firewall built in and for the cloud. Frictionless, cloud-hosted Advanced Threat Protection detects and blocks advanced threats, including zero-day and ransomware attacks. Gain rapid protection against the newest threats with the help of a global threat intelligence network fed by millions of data collection points. Modern cyber threats such as ransomware and advanced persistent threats, targeted attacks, and zero-day threats, require progressively sophisticated defense techniques that balance accurate threat detection with fast response times. Barracuda CloudGen Firewall offers a comprehensive set of next-generation firewall technologies to ensure real-time network protection against a broad range of network threats, vulnerabilities, and exploits, including SQL injections, cross-site scripting, denial of service attacks, trojans, viruses, worms, spyware, and many more.
  • 37
    Agilio OVS Firewall
    Agilio OVS Firewall gives users the ability to define more intelligent filtering policies, security groups, access control lists, and stateful firewall applications. The solution is a drop-in accelerator for OVS, making it compatible with existing network tools, controllers and orchestration software. Netronome Agilio SmartNICs and Agilio software track the features of standard OVS, which are continuously evolving and include server-based networking functions such as flexible match-action forwarding, connection tracking (Conntrack), network overlay control with tunneling protocols such as VXLAN and NVGRE, and fine-grained statistics and meters. These features enable functions such as L2/L3 forwarding, network virtualization, security, load balancing and analytics. Agilio Firewall Software, combined with Agilio SmartNICs augments the Agilio OVS Software product to enable zero-trust stateful security while significantly improving server-based networking performance.
  • 38
    Xvirus Firewall
    Xvirus Firewall is designed as a simple application that enables the user to check all active connections and control which are granted access or not. Xvirus Firewall is a straightforward application that relies on whitelisting and blacklisting for managing the connections. There are no parameters to set up or other assessment capabilities that could determine the legitimacy of a connection. Xvirus Firewall is simple enough for novice users and advanced enough for experienced users. You can just install and forget it or change the settings for a more customizable experience, either way, you know you will be secure. Thanks to Xvirus' Network Monitor you can see all the details of the connections of your applications, like the protocol, IP and port, status, and the process id. Xvirus Firewall allows you to control what programs run on your computer. With its simple rules list, you can manage which program should be allowed to run or block.
    Starting Price: €19.99 per year
  • 39
    Securd DNS Firewall
    Make sure the Internet is always safe and available, to all your worldwide users, with our global, anycast dns firewall and dns resolver featuring 10ms resolutions, real-time threat protection, and a zero-trust posture to reduce your attack surface at the edge. Anti-virus protection can't keep up with the pace of modern malware, ransomware, and phishing attacks. It takes a layered approach to defend your assets from these threats. Deploying DNS filtering reduces the risk of a successful cyber attack by blocking access to malicious domains, disrupting downloads from compromised sites, or preventing malware from exfiltrating your data. DNS firewalls also provide real-time and historical visibility into endpoint DNS queries and resolution, which is necessary to hunt down and remediate infected and compromised devices quickly. Securd DNS Firewall is powered by a worldwide anycast network.
  • 40
    iSecurity Firewall

    iSecurity Firewall

    Raz-Lee Security

    iSecurity Firewall is a comprehensive, all-inclusive intrusion prevention system that secures every type of internal and external access to the IBM i server. It enables you to easily detect remote network accesses and, most importantly, implement real-time alerts. Firewall manages user profile status, secures entry via pre-defined entry points and IBM i file server exit points, and profiles activity by time. Its “top-down” functional design and intuitive logic creates a work environment that even iSeries novices can master in minutes. Protects all communication protocols (including SQL, ODBC, FTP, Telnet, SSH, and Pass-through). Intrusion Prevention System (IPS) with real-time detection of access attempts. Precisely controls what actions users may perform after access is granted – unlike standard firewall products. Protects both native and IFS objects – all of your databases are secured.
  • 41
    AlgoSec

    AlgoSec

    AlgoSec

    Discover, map and migrate business application connectivity to the cloud. Proactively analyze security risk from the business perspective Automate network security policy changes - with zero touch Link cyber-attacks to business processes. Automatically discover, map, and securely provision network connectivity for business applications. Manage on-premise firewalls and cloud security groups in a single pane of glass. Automate the security policy change process – from planning through risk analysis, implementation and validation. Proactively assess every security policy change to minimize risk, avoid outages and ensure compliance. Automatically generate audit-ready reports and reduce audit preparation efforts and costs by up to 80%. Clean up firewall rules and reduce risk – without impacting business requirements.
  • 42
    Falcon Firewall Management
    Falcon Firewall Management makes it easy to create, manage and enforce policies with a simple, centralized approach. Defend against network threats, and gain instant visibility to enhance protection and inform action.Delivered via the same lightweight Falcon agent, management console and cloud-native architecture, it deploys and is operational in minutes. Simplifies operations by using the same lightweight Falcon agent, management console and cloud-native architecture. Deploys and is operational in minutes without requiring reboots, fine-tuning or complex configuration. Streamlines workflows and increases visibility across endpoint security controls due to the single management console for both endpoint protection and host firewall management. Automatically identify and view specific activities, potential threats and network anomalies.
  • 43
    Signal Sciences

    Signal Sciences

    Signal Sciences

    The leading hybrid and multi-cloud platform that provides next-gen WAF, API Security, RASP, Advanced Rate Limiting, Bot Protection, and DDoS purpose built to eliminate the challenges of legacy WAF. Legacy WAFs weren’t designed for today’s web apps that are distributed across cloud, on-premise or hybrid environments. Our next-gen web application firewall (NGWAF) and runtime application self protection (RASP) increase security and maintain reliability without sacrificing velocity, all at the lowest total cost of ownership (TCO).
  • 44
    Cyberoam

    Cyberoam

    Sophos

    Cyberoam offers a complete virtual security solution to organizations with its virtual network security appliances (Next-Generation Firewalls/UTMs), virtual Cyberoam Central Console for centralized management, and Cyberoam iView software for centralized logging and reporting. The Xstream architecture makes traffic handling more efficient with a high-performance single streaming DPI engine and greatly improved TLS Inspection throughput. The dedicated Xstream Flow Processor in every XGS Series appliance offloads SaaS, SD-WAN, and cloud traffic at the hardware level, reducing the burden on the main CPU. This accelerates performance by adding headroom for TLS 1.3 decryption, deep packet inspection, and more.
  • 45
    Sophos XG Firewall
    The world's best visibility, protection, and response. Superior visibility into risky activity, suspicious traffic, and advanced threats helps you regain control of your network. Powerful next-gen protection technologies like deep learning and intrusion prevention keep your organization secure. Automatic threat response instantly identifies and isolates compromised systems on your network to stop threats from spreading. XG Firewall makes it easy to extend your secure network to employees anywhere. Sophos Connect provides an intuitive VPN connection client that’s easy to deploy and configure. Give your remote workers secure access to resources on the corporate network from Windows and macOS devices. Our small, ultra-affordable XG 86(w) and SD-RED devices provide the ultimate in SOHO protection with always-on dedicated or split-tunnel VPN that’s easy to deploy and manage with a variety of flexible options.
  • 46
    GlassWire

    GlassWire

    GlassWire

    Instantly see who or what your PC is talking to on GlassWire's network monitoring graph, plus see what your PC may have connected to in the past. Detect spyware, malware, badly behaving apps, and bandwidth hogs, then block their connections. Monitor other PCs on your network and get alerted when new unknown devices join your WiFi. GlassWire warns you of network related changes to your PC, or unusual changes to your apps that could indicate malware. GlassWire offer a Consumer Solution and a Business solution, to suit the needs of both personal users and IT professionals. Among the features: Real-Time Monitoring to keep an eye on active and past network activity Threat. Threat Detection. GlassWire's built-in firewall detects and blocks potential threats. Application Tracking to Identify which applications are using your network and track their usage patterns. Bandwidth Usage, to stay informed about data consumption, And many more!
    Starting Price: $35.88/year/user
  • 47
    Check Point Quantum

    Check Point Quantum

    Check Point Software Technologies

    Cyber threats are becoming more sophisticated and harder to detect. Check Point Quantum Network Security provides ultra-scalable protection against Gen V cyber attacks on your network, cloud, data center, IoT and remote users. Check Point Quantum Next Generation Firewall Security Gateways™ combine SandBlast threat prevention, hyper-scale networking, a unified management platform, remote access VPN and IOT security to protect you against the most sophisticated cyber attacks. Delivers the highest-caliber threat prevention with award winning SandBlast Zero Day protection out of the box. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Integrating the most advanced threat prevention and a consolidated management, our security gateway appliances are designed to prevent any cyber attack, reduce complexity and lower your costs.
  • 48
    NSFOCUS NGFW
    As the digital attack surface grows, both the volume and sophistication of cyberattacks increase. The resulting data theft and network disruptions can both threaten your reputation and business, a comprehensive security solution is an absolute necessity in every IT infrastructure. NSFOCUS delivers a fully integrated Next Generation Firewall (NGFW) to meet the changing needs of your cloud-enabled enterprise network. It provides NGFW capabilities and collaborates with other security devices to proactively defend against cyber threats, and improve user and application experience while lowering the total cost of ownership. A dedicated AI-based content moderation module effectively recognizes content in texts, images, and videos. Use honeypots and AI algorithms to trap attacks. AI algorithms recognize attacks and apps in encrypted traffic. Scalable AI-based AV engine increases virus detection rate.
  • 49
    CacheGuard

    CacheGuard

    CacheGuard Technologies

    CacheGuard-OS transforms a virtual or bare metal machine into a powerful and easy to handle network appliance. It's a Linux based Operating System built from scratch and especially designed to Secure and Optimize the network traffic. Great care has been taken by CacheGuard-OS developers to select the best of the best Open Source technologies to integrate into CacheGuard-OS. The result is a robust and trustworthy solution that can be up and running within minutes. CacheGuard-OS integrates Open Source software such as but not limited to OpenSSL, NetFilter, IProute2, StrongSwan, ClamAV, Apache, ModSecurity, Squid and Open Source developments made by CacheGuard-OS developers.
    Starting Price: $9.99 per month
  • 50
    Netvisor ONE

    Netvisor ONE

    Pluribus Networks

    Moving to Open Networking bare metal switches brings significant operational and financial benefits to build next-generation networks. These switches provide the capacity needed to achieve cloud-scale, agility, elasticity, and adaptability. As you move to a disaggregated open networking strategy, selecting the right Network Operating System (OS) is a critical success factor. Why? The Network OS deployed unlocks the performance, functionality, and services from Open Networking switches to realize the most value. Netvisor® ONE is an open, secure, and programable next-generation Network OS that is purpose-built to optimize the power and performance of bare metal Open Networking hardware. Deployment-proven in production mission-critical enterprise and carrier networks, Netvisor ONE operating system meets the most stringent performance requirements and delivers the maximum levels of reliability and flexibility at scale, and without compromise.