What is the Firewall protection?

 

 

A firewall is a barrier or type of protection that allows a system to keep information safe when the computer accesses other networks –such as the Internet- or transmits information (which might be infected with a virus or involve an attack from another computer or user) through them.

 

Its main purpose is to protect access points (entry points and exit points) to the network to which the computer is connected, or to the Internet. A firewall consists of a set of software (programs) and/or hardware (physical items, computers, etc) components that allow or deny access or data traffic between a computer and the exterior.

 

What is the firewall protection used for?

The firewall protection allows you to specify the system programs and services that should not have access to the Internet or the network to which the computer is connected, which should have it, what IP addresses (number or numeric code that uniquely identifies every computer that exists) and communication ports (access points in a computer or means through which information is transferred -inbound/outbound- from the computer to the outside and vice-versa) can be used to establish connections to/from other computers, indicate if your shared network folders can are accessed or not, etc. Platinum Internet Security incorporates excellent firewall software that enables you to do all this.

 

A good combination: IT security solution + firewall

The perfect combination consists of installing a good IT security solution with firewall protection. Platinum Internet Security is an outstanding security solution that also incorporates firewall protection. Both elements work together without interfering with the other’s function, which leads to better protection and increased security.

 

However, you must bear in mind the importance of using and configuring the firewall protection correctly. The security restrictions and rules established in the firewall protection will define the traffic (inbound/outbound) between your computer and the exterior (local network, the Internet). Allowed inbound traffic can include harmful contents (viruses, Trojans, worms, dialers, or data used to launch an attack on your computer from other computers). In this case -when rules defined in the firewall protection have allowed dangerous contents to access your system- the program must act by detecting possible viruses, worms, Trojans, etc.

 

image\nota_shg.gif Important note: When using and configuring the firewall protection, bear in mind that the rules you apply can affect the functioning of programs and network resources shared with other computers. Preventing certain programs from accessing the network or blocking access to shared folders, for example, means that other computers connected to the network will not be able to use them.

 

There are many commercial firewalls on the market for protecting different types of platforms and operating systems. Each of these firewalls has its own characteristics and functionalities. However, it is preferable to have a firewall incorporated in the security solution installed.