Features:
- It's a complete rule-based security policy that lets you set up new policies for applications, trusted IP addresses, and ports
- Detect worms, viruses, trojans, and other intruders in real-time
- You will be immediately notified when any intrusion is attempted, and you can automatically adjust to prevent the same type of attack in the future
- Highly configurable, easy to use, and best of all, strong enough to keep the hackers away!
Description:
CheckIt Firewall is a user-friendly personal firewall. It ensures that your personal computer is protected from malicious hackers and other intruders, while preventing unauthorized access from your computer to a network. In essence, CheckIt Firewall makes your protected machines invisible to the outside world. That makes CheckIt Firewall a valuable security measure for any PC that connects to a private network or the Internet.Once your computer has been compromised, every other network you connect to is at risk, including your home, business, and online bank accounts. No matter where you use your computer, whether remotely or behind a corporate firewall, whether dialup or an always-on broadband Internet connection, CheckIt Firewall can give you confidence that your business, personal, financial, and other data is safe and secure. CheckIt Firewall also includes advanced active-scan vulnerability assessment to pinpoint your PC's weaknesses and fine-tune your security policy. Policies regarding applications, IP addresses, ports, protocols, and scheduling can be customized to support and secure any network configurations or requirements. Designed with high performance in mind, CheckIt Firewall delivers security without restricting your computing power. Whether you're working, banking, gaming, or chatting, CheckIt Firewall is protecting your computer by actively looking for hostile intruders and Trojan horse applications. If an intrusion attempt occurs, CheckIt Firewall detects it in real time with built-in host- and application-based intrusion detection technology, while blocking it by default. You are immediately notified and, with your approval, your Internet connection is adjusted to prohibit further attacks.
|