Star Rating
Languages Supported
Pricing Options
Firewall Type

Firewall Software reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Best Firewall Software

Firewalls are barriers used to secure networks from hackers, malware, and other attackers. Firewalls come in both hardware and software form, but all types provide fortified security between networks and outside threats. IT managers configure firewalls to specific system requirements, ensuring no data is vulnerable. Once implemented, they will monitor firewall tools to ensure security.

Smaller companies and personal computers will rarely require hardware firewalls, but large enterprise companies will use hardware firewalls within their own systems to limit access outside the company or between departments. Firewall products will have significant overlap with network security software and web security software products, as they all aim to secure systems and information. Some products may come equipped with vulnerability management software tools to detect and defeat threats.

To qualify for inclusion in the Firewall category, a product must:

Assess and filter user access
Create barriers between networks and the internet
Alert administrators when unauthorized access is attempted
Outline and enforce security and authentication rules
Automate tasks associated with testing or monitoring

Top 10 Firewall Software

  • FortiGate
  • Check Point Next Generation Firewalls (NGFWs)
  • Sophos XG Firewall
  • Huawei Firewall
  • WatchGuard Network Security
  • GlassWire Firewall
  • Cisco
  • SonicWall
  • Avast
  • Comodo

Compare Firewall Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
Sort By:
Results: 56
View Grid®
Adv. Filters
(79)4.7 out of 5

FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

Offered via the Check Point Infinity architecture, Check Point’s NGFW includes 23 Firewall models optimized for running all threat prevention technologies simultaneously, including full SSL traffic inspection, without compromising on security or performance.

(61)4.5 out of 5

Sophos XG Firewall provides comprehensive next-generation firewall protection powered by deep learning and Synchronized Security. Offering unmatched insights, XG Firewall exposes hidden user, application, and threat risks on the network and is unique in its ability to respond automatically to security incidents by isolating compromised systems with Security Heartbeat.

(12)4.9 out of 5

Huawei Enterprise is a leading global ICT solutions provider.

(51)4.5 out of 5
Optimized for quick response

For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology and delivered it as easy-to-deploy and easy-to-manage solutions. Our unique approach to network security focuses on bringing best-in-class, enterprise-grade security to any organization, regardless of size or technical expertise. Ideal for SMBs and distributed enterprise organizations, our award-winning Unified Threat Management (UTM) appliances are designed from the ground up to focus on ease of deployment, use,

(47)4.6 out of 5

GlassWire's next generation visual firewall helps you easily see detailed network activity with your devices in real-time. Our software is very easy to use and set up.

Firewall solutions from Cisco offer integrated security to help safeguard various network environments.

(82)4.1 out of 5

SonicWall real-time breach detection and prevention solutions protect more than one million networks worldwide

(70)4.4 out of 5

Avast is the global leader in next-gen cyber security products for consumers and businesses and protects over 400 million people online. Avast offers products under the Avast and AVG brands, that protect people from threats on the internet with one of the most advanced threat detection networks in the world. Avast digital security products are top ranked for mobile, PC and Mac. For businesses, Avast offers comprehensive antivirus security that keeps your devices, data, and employees safe

(32)4.0 out of 5

A Personal Firewall controls network communication in and out of a single users computer and will restrict the communication based on security policies.

(34)4.3 out of 5

Zscaler Internet Access delivers the complete security stack as a service from the cloud.

(18)4.0 out of 5

Our security solution provides fine-grained access comtrol that identifies, mitigates, and fully reports on the sophisticated security threats of the moment

(13)4.5 out of 5

ZoneAlarm Free Firewall provides multiple layers of advanced protection for monitoring and blocking unwanted traffic, guarding personal data, and shielding from hackers and malware.

(11)4.3 out of 5

Azure Firewall automatically scales with your usage during peak load or as your business grows, eliminating the need to predict and reserve capacity for peak usage.

Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies, resulting in safe enablement of applications. This lets only authorized users run sanctioned applications, greatly reducing the surgace area of cyber attacks across the organization.

(18)4.6 out of 5

Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations and applications, connects on-premises and cloud infrastructures, and helps organizations transform their business.

Adaptive Security Virtual Appliance is a virtualized network security solution based on the market-leading Cisco ASA 5500-X Series firewalls.

(21)4.2 out of 5

ZoneAlarm solutions provide enterprise-level security to protect PC and mobile devices for small businesses and consumers.

(21)4.5 out of 5

The pfSense project is a powerful open source firewall and routing platform based on @FreeBSD.

(11)4.5 out of 5

FortiGate-VM is a full-featured FortiGate packaged as a virtual appliance.

(9)4.7 out of 5

Untangle takes the complexity out of network security—saving you time, money and frustration. Get everything you need in a single, modular platform that fits the evolving needs of your organization without the headaches of multiple point solutions.

OmniShield is the next-generation cybersecurity solution that extends your company's perimeter to all your sites while providing omnipresent, enterprise-grade security.

(4)4.4 out of 5

The vSRX offers the same features as our physical SRX Series firewalls but in a virtualized form factor for delivering security services that scale to match network demand. It offers the same features as the SRX appliance, including core firewall, robust networking, full next-gen capabilities, and automated life-cycle management. Handling speeds up to 100 Gbps, the vSRX is the industry's fastest virtual firewall.

(2)3.8 out of 5

The IPCop Firewall is a Linux firewall distribution It is geared towards home and SOHO users.

(4)4.0 out of 5

Kerio Control is a security solution that brings together next-generation firewall capabilities, intrusion detection and prevention (IPS), gateway anti-virus, VPN, and web content and application filtering in a single, easy-to-use package. With Kerio Control, your will be able to: • Configure your firewall with easy-to-use traffic rules • Control inbound and outbound communications by URL, application, traffic type and more • Connect your organization with a secure and easy-to-setup VPN • Monit

(2)4.0 out of 5

Palo Alto VM-Series is a cloud security software that allows businesses to prevent data loss and threats with this virtualized firewall for private and public cloud environments. VM-Series is a virtualized form factor of our next-generation firewall that can be deployed in a range of private and public cloud computing environments based on technologies from VMware, Cisco, Citrix, KVM, OpenStack, Amazon Web Services, Microsoft and Google.

(2)3.5 out of 5

Connecting and protecting distributed enterprises and government agencies is more important than ever before. Defending your people and critical assets starts at the new edge. Forcepoint Next-Gen Firewall combines true enterprise-class SD-WAN, advanced intrusion prevention, and seamless integration with cloud-based SASE security to keep your people and data safe—all at global scale. Forcepoint Next-Gen Firewall provides: - Proactively detect and discover advanced threats - Keep people and

G DATA Internet Security with Antivirus and exploit protection! Security against viruses, spyware, hackers and malware.

(1)5.0 out of 5

Entrerprise threat prevention and security intelligence software.

(1)4.0 out of 5

An all-in-one Windows-based software solution for network security, web access control and traffic analysis. Traffic Inspector gives you a plethora of tools needed to protect your network, including a secure firewall, a spam filter, Traffic Inspector Anti-Virus powered by Kaspersky and anti-phishing protection.

Select Grid® View
Select Company Size
Select Firewall Type
G2 Grid® for Firewall Software
Filter Grid®
Filter Grid®
Select Grid® View
Select Company Size
Select Firewall Type
Check out the G2 Grid® for the top Firewall Software products. G2 scores products and sellers based on reviews gathered from our user community, as well as data aggregated from online sources and social networks. Together, these scores are mapped on our proprietary G2 Grid®, which you can use to compare products, streamline the buying process, and quickly identify the best products based on the experiences of your peers.
High Performers
Barracuda CloudGen Firewall
Check Point Next Generation Firewalls (NGFWs)
Palo Alto
WatchGuard Network Security
Sophos XG Firewall
Huawei Firewall
ZoneAlarm Extreme Security
GlassWire Firewall
Zscaler Internet Access
Cisco Adaptive Security Virtual Appliance (ASAv)
Azure Firewall
ZoneAlarm Free Firewall
Market Presence

Learn More About Firewall Software

What is Firewall Software?

Firewalls are a key aspect of network security. Firewall solutions are implemented to dictate incoming and outgoing network traffic using a mix of security rules created by the network administration team. By setting restrictions like access authorization and allowed/blocked websites, businesses create a barrier between their own protected network and untrusted external servers and sites.

Firewalls can vary greatly in their complexity, but their overall purpose remains the same. Small businesses implement simpler solutions due to a smaller scope of protection and less overall data needing to be protected. In contrast, enterprise firewalls are typically extensive, with complex rule sets to protect hundreds of devices and huge quantities of data.

Key Benefits of Firewall Software

  • Protection at network and endpoint levels
  • Improved data security
  • Event reporting and analysis

Why Use Firewall Software?

Firewalls are a core aspect of network security. In many ways the gatekeepers of network traffic, firewalls help prevent unwanted visitors into your network and also can prevent in-network users from accessing potentially dangerous websites or servers. Regardless of the size of a business, firewall software is an important step in protecting a business’ data and any devices on the network. As the digital age continues to evolve, the importance of using a firewall solution will grow significantly.

Who Uses Firewall Software?

Digital security teams are a company’s main users of firewall solutions. Particularly, network administrators will have the greatest control and use, since firewalls are, by design, targeted towards securing networks from undesired intrusions. Network management and network security usually take specific training, experience, and certification. This is what limits who has access to firewall software in a business setting.

Kinds of Firewall Software

Firewall software can be built for a variety of deployment options, each suited to a different need.

Hardware — Most options on this site will not provide hardware security as their main functionality (aside from securing individual endpoints), but some firewall solutions will have this functionality available as an offering.

Endpoints and Software — Endpoint and software firewalls will protect user devices and applications from malware and hackers. These are some of the most common firewalls available. Some of these tools will include a cloud firewall, but most cloud-focused tools can be found in our cloud security software category.

Virtual — Virtualized environments will be a little trickier since there are many variations and factors, but many firewall solutions can adapt to a range of virtualized environments. Some may focus directly on virtualized environments due to their more specialized needs for protection.

Firewall Software Features

Access Control — Firewall solutions act as the gatekeeper for network access to users and the internet. Access and authentication rules only allow authorized users to enter the network, and from there, they are restricted to whatever servers and websites are not filtered out.

Custom Restriction — With firewall software, network admins have the ability to dictate what websites and servers users on the network are allowed to access. This can be set strictly to block non-business-related websites, but it can also be used to block servers or IP addresses of known or potential threats.

Alerting — If an unauthorized access attempt occurs, firewall solutions will send an alert to network admins detailing the breach. This can help network admins understand potential threat sources, as well as who within a network may be trying to access sources they should not be.

Automation — Part of the benefit of firewall software is the ability to automate some of the more menial tasks of network administration. Firewall solutions can automate monitoring tasks and rule-testing, leaving time for administrators to focus on more pressing network issues and tasks.

Reporting — Reporting can be an incredibly helpful component to a company’s security practices. Some tools will document all kinds of historical data, from logins and access points to penetration attempts and security failures, but others provide little documentation for a network’s security history. If a business has a dedicated security staff, consider getting the tightest security for sensitive data, and invest in a solution with in-depth reporting features that provide insight on vulnerability points, event outcomes, and unapproved access attempts.

Additional Firewall Software Features

Integration Capabilities — Check prospective products’ integrations lists to see how they match up with your company’s existing IT strategy and software. Various integrations and plugins can provide a vast array of needed functions, from device support and content filtering to data integration and dashboards. Other tools may help security staff build custom dashboards to improve monitoring and reporting. Content filtering is another integration that can prevent users from accessing unapproved websites or visiting dangerous links hidden in emails.

Potential Issues with Firewall Software

Range of Devices — This era has made the bring-your-own-device (BYOD) practice incredibly popular for businesses of all sizes. The range of laptops, tablets, phones, and other smart devices raises a number of vulnerability concerns. When looking into firewall solutions, be sure they support the range of devices used. If there are a few missing, consider enforcing stricter BYOD guidelines to allow only approved devices. If a company doesn’t practice BYOD, be sure the devices distributed to employees are supported by any potential firewall solutions.

Over-Restriction — Firewall solutions allow network administrators to set as strict or relaxed policies as a business would need. But tightening the reins with firewall solutions, while more secure, can also potentially inhibit the ability to perform certain business needs by shutting off access to certain servers or web domains. Be sure that, when implementing a firewall, restrictions do not become inhibitors of productivity.

Outdated Security Measures — Port-based rules built on firewalls are becoming particularly difficult to enforce in the digital age. Applications and traffic now use SSL or default to any open port to make connections, which makes older port-based rules futile. When implementing firewall solutions, consider taking a more broad approach to security rules and not constructing as many rules focused on specific port traffic.