For a chart which shows a comparison of the various personal firewalls, go here: http://www.pcflank.com/art19.htm
One I don't list out below which I like the best is Outpost Firewall by Agnitum. <http://www.agnitum.com/download/outpostfree.html> This gives some details even though they may be a bit dated but helps to give a rough sketch of what's out there: ----- BlackICE Defender Agent: Win 32 Network Ice http://www.networkice.com/ http://www.networkice.com/html/blackice_defender.html BlackICE Defender's IDS engine scans all inbound and outbound traffic on your computer looking for malicious code and activity. When it detects an attack, the firewall jumps-in and automatically blocks traffic from that source, leaving legitimate traffic unaffected. BlackICE Defender performs comprehensive back-trace to find the origins of an attack and reveal the hacker's identity. The attacker's IP Address is identified as well as Node, Group, NetBIOS, DNS, and MAC Address when available. BlackICE comes with preset security levels for automatic firewall configuration. BlackICE begins protecting your system the moment you install it. Customized configuration is also available for advanced users. BlackICE Defender can log hostile or malicious data in case you want to store evidence of an attack. ----- BlackIce Agent Agent: Win 32,unix Network Ice http://www.networkice.com/ http://www.networkice.com/html/blackice_agent.html BlackICE Agents actively defend each system by employing a multi-layered defense mechanism. Like a firewall, the first layer of protection blocks the ports that do not need to be open on the protected machine. The second defense layer is the dynamic analysis of all of the traffic destined to any open ports to ensure the validity of these communications. While traditional firewalls cannot stop malicious activity directed at available ports, Network ICE's 7-layer decode technology enables it to thwart these attacks in real time. Alerting: Alerts communicated by visual, audible, SNMP email or pager notification IP Address Blocking: BlackICE Agent can block attacking addresses automatically or manually Evidence Logging: BlackICE Agent logs malicious packets and hacking attempts into a central database for internal, civil or criminal investigations Trusted IP Addresses: Indicate trusted IP address to reduce false positives Back Trace ID: BlackICE Agent can identify a hostile IP address to track down the origin of the attack, and help determine if the attacker is inside or outside your organization ---------------------------------------------------------------------------- ---- CyberArmor Agent: Win 32 InfoExpress http://www.infoexpress.com/products/pf/index.html The CyberArmor system is a personal firewall suite. Like traditional firewalls, CyberArmor offers a layered security architecture to protect against would be hackers. Unlike traditional firewalls, CyberArmor is installed on the user's PC. CyberArmor has many unique features developed specifically for enterprise organizations. No client configuration required by end users. Lets administrators create custom policies. Inspects network traffic at various layers. Tracks the "direction" of stateless protocols like UDP. Prevents suspicious programs from running. Automatically selects the appropriate environmentally sensitive policy (ESP). Centrally manage clients through HTTP and SMS. Remotely view users, logs, and alarms. Policies are VPN, user, activity, and location aware. ----- The Doorstop Agent: Mac Open Door Networks, Inc http://www2.opendoor.com/doorstop/DoorStopEditions.html#pe Personal Edition. DoorStop Personal Edition is intended to be the absolute easiest to use firewall available. Specifically tuned to protect Mac OS 9's new Internet services, DoorStop Personal Edition also supports any PowerPC Mac running Mac OS 8.1 or later. DoorStop is particularly essential for today's cable-modem and DSL-connected Macs, which are often connected 24 hours a day. DoorStop includes advanced logging and notification options, so you can keep informed as to accesses and access attempts to your machine. DoorStop Personal's Access History window includes a "Learn More" feature that links to our Web site for detailed analysis of access attempts. ----- F-Secure Distributed Firewall Agent: Win 32 F-Secure Corporation http://www.fsecure.com/news/2000/news_2000050901.html F-Secure Distributed Firewall solves the 'always on' problem posed by the use of cable modems and DSL connections by refusing unauthorized data packets access to the corporate mobile devices. This solution keeps corporate laptops secure when users dial in to local ISP's while traveling, and avoids the problem of an intruder gaining access to a secured connection to the corporate network. The product protects the user by automatically filtering data based on IP packet header. More than a personal firewall, this product is centrally managed meaning that it can be automatically installed remotely, F-Secure Distributed Firewall also serves a very important role inside the corporate network, enhancing the traditional concept of a firewall by enabling policy-based traffic filtering at the workstations. This provides an efficient method for building internal security zones as well as easing the burden of the perimeter firewall. In addition to protection from outside attacks, F-Secure Distributed Firewall defends enterprise workstations and servers from insider attacks. ----- NetBarrier Agent: Mac http://www.maccentral.com/news/9912/15.netbarrier.shtml NetBarrier is a tool that combines a personal firewall, antivandal detector and a network filter. It checks incoming/outgoing TCP/IP traffic, allows control of the incoming and outgoing data and can use preset or customized security rules. The software's filter safeguards personal information, filters TCP/IP and AppleTalk stacks, offer protection against hostile Java Applets, and protection against hostile plug-ins. NetBarrier 1.3 adds support for Mac OS 9 as well as the following enhancements and features: Stealth Mode has been renamed No ping reply for a better understanding improved compatibility with USB modems alert message displayed when No ping reply and/or TCP sequence scrambling are checked bug correction in the Stop List improved PPP Support now compatible with FreePPP, SAGEM PPP, MLPPP ----- Norton Personal Firewall 2000 Agent: Win 32 Symantec Corporation. http://www.symantec.com http://www.symantec.com/sabu/nis/npf/ Firewall software controls all Internet connections to and from your computer and alerts you to attempted intrusions. You can also use Norton Personal Firewall to prevent personal data from being sent to web sites without your knowledge, and to block Java™ applets, ActiveX® controls, and cookies from unfamiliar sites. ----- McAfee.com Personal Firewall (MFP) formerly Conseal by Signal 9 Agent: McAfee.com http://www.mcafee.com/pr_firewall.asp The firewall inserts itself beneath the operating system, allowing it to investigate all network packets before those packets are delivered to or from any network or dialup device. Offending packets, incorrect information or network attacks are discarded without any interruption to your desktop. s operating system or applications. ----- PGP Desktop Security - Personal Firewall Edition Agent: Win 32 Network Associates, Inc http://www.pgp.com/products/dtop-security/default.asp This corporate package includes Personal Firewall, Personal Intrusion Detection System and Virtual Private Network. Whether employees access your corporate network from home or work, PGP Personal Firewall ensures full-time security that keeps your e-business running-safely and cost-effectively. PGP Personal Firewall 7.0 operates smoothly on all major computer platforms. Covers all mobile and desktop security needs combining Personal Firewall, Intrusion detection system and Virtual Private Network. Centrally managed solution for complex environments that lets administrators pre-configure all settings. PGP Desktop Security provides transparent protections to end-users with enabled, centralized alerting to the administrator (IDS or Firewall attacks). Features: Personal Firewall Offers flexible packet filtering with six pre-defined levels of protection. Personal IDS (Intrusion Detection) Guards users against common hacker attacks and provides centralized alert capabilities. VPN (Virtual Private Networking) Delivers cost-effective enterprise remote access by operating seamlessly in both peer-to-peer and client-to-server VPN situations Supports IETF IPsec and IETF IKE (Internet Key Exchange) protocols. Encryption Enrolls into PGP and X.509 v3 PKIs and support s X.509 certificates from VeriSign, EntrustiPlanet CMS and Net Tools PKIs. Enterprise-Class Manageability Configuration "lock down" that keeps users from modifying settings, and supports SMS and Tivoli for software distribution. ----- Symantec Desktop Firewall 2.0 Agent: Win 32 Symantec Corporation. http://www.symantec.com/sabu/firewall/ Symantec Desktop Firewall 2.0 enables administrators to quickly roll out a highly effective solution that works intelligently in the background, monitoring both inbound and outbound communications. And since Symantec Desktop Firewall is optimized for always-on broadband connections such as DSL and cable modems that are favored by mobile users, it is the ideal solution for securing today’s remote communications. Deploys rapidly to protect remote and mobile users from hackers Secures corporate networks from back-door attacks via remote connections Reduces administration and support costs with remote installation and automatic configuration Supports leading VPN environments that are optimized for broadband connections ----- SonicWall 10 Agent: SonicWALL, Inc. http://www.menetworks.ch/home.thtml/en/security/firewall/sonic/sonicwall-ext .html SonicWALL SOHO is an effective, ICSA(*)-tested firewall solution for smaller companies and private individuals, allowing secure Internet access via the company's own network or from a home PC via a leased line, dial-up or cable-TV modem. At the same time, with the help of an inexpensive upgrade, a Virtual Private Networking tunnel can be installed in this handy little security box, which guarantees employees who are working from home or traveling can access the company's network. SonicWALL SOHO controls access rights and protects company data from unauthorized third parties. With starting prices as low as CHF 1,000, SonicWALL SOHO offers you the kind of protection that you cannot put a price on if the unthinkable happens. ----- Sybergen Secure Desktop Agent: Win32 Sybergen Networks, Inc. http://www.sygate.com/products/shield_ov.htm Set your security policy, and Secure Desktop will work in the background to secure your computer. Interactive Learning Mode: Prompts the user if any unauthorized applications are trying to access the Internet. With a single click, you can add it to the list of applications you wish to allow to access the network. Trusted IP: Easily allows certain computers in your network to access the secured PC while blocking others. Auto Interface Detection: Ensures that mobile users' Internet connections are seamlessly protected. Sybergen Secure Desktop will automatically protect the active Internet connection without any user intervention (e.g., switching from T1 to dialup). Detailed Analysis and Immediate Action: Sybergen Secure Desktop allows or denies every incoming and outgoing Internet packet based on your security policy settings (ports, protocols, IP address, time of day, application). Upon detecting intrusion attempts, Sybergen Secure Desktop will close the corresponding network connection and alert you immediately. Integrated Application-level Policy: This feature associates Internet access privileges with specific application programs, and allows or blocks any application from accessing the network. ----- Tiny Personal Firewall Agent: Win 32 Tiny Software Inc http://www.winroute.com/pwall.php It is built on the proven WinRoute Pro technology which has been recently awarded ICSA certification. Upon launching Personal Firewall, a Network Window will appear that keeps a detailed log of connection activity including: Protocol, Local IP, Ports, Remote IP addresses, Connection Origin and Date & Time of Established Connection. ----- Zone Alarm Agent: Win 32 Zone Labs Inc http://www.zonelabs.com/products.htm ZoneAlarm ™ is essential for DSL and Cable modem users providing rock-solid protection against Internet thieves and vandals, and STOPs hackers. If you can't be seen, you can't be attached. More than 4 million PC users have downloaded ZoneAlarm. Shouldn't you? ZoneAlarm is free for personal and non-profit use.* ZoneAlarm gives you: A dynamic Firewall for control over the door to your computer and PC invisibility to the Internet and potential intruders. Application control to ensure that rogue applications like spyware cannot send your valuable data to criminals and vandals. Security Levels which automatically configure the Firewall and eliminate the risk of improper use that comes with other products. ----- Zone Alarm Pro Agent: Win 32 Zone Labs Inc http://www.zonelabs.com/products.htm ZoneAlarm™ Pro delivers powerful new features and comprehensive Internet security for all users of always-on Internet-connected PCs, whether in a small business office or home setting, using an individual or networked PC. Even with its powerful new features, ZoneAlarm Pro's emphasis remains on ease of use, flexibility and ironclad protection. ZoneAlarm Pro provides: All the ease-of-use features of ZoneAlarm, trusted by more than 4 million users (see below for ZoneAlarm features). One-click NAT/ICS support for small and home office networks, making it quick and easy to provide optimal security for all PCs on the network. Customizable Security Levels for each Zone letting you create security settings to your unique requirements - connecting to the corporate LAN from home, using streaming media or sharing files over the Internet. Password Protection to ensure your security settings are tamper-proof. Enhanced MailSafe-Email Attachment Protection stops email-borne viruses. ZoneAlarm Pro compliments anti-virus software programs by providing immediate defense against unknown threats, including those that haven't been profiled yet by intrusion detection and virus protection vendors. Local and Internet Zones so you can easily expand the local network to include VPN servers or advanced Internet services, such as Internet phone calling and remote storage. ----- -----Original Message----- From: Nicole Tutt [mailto:[EMAIL PROTECTED]] Sent: Friday, July 12, 2002 12:14 PM To: [EMAIL PROTECTED] Subject: Personal Firewalls My company has a VERY distributed user base with many people working from small satellite sites and/or from home. I would love suggestions for a PC level firewall that would protect from intrusions and also whether hardware v. software solutions would be best. We deal with medical records so privacy of the data is imperative. The basic case scenario is a user working from home and connecting to the internet via cable/dsl/dial-up via an ISP to access mail (webaccess) and upload or download data(via SSL to our public web server) that may contain patient information. Thanks Nicole