ZoneAlarm Pro Firewall

(10)
4.5 out of 5 stars

ZoneAlarm, a Check Point Software Technologies, Inc. Company, is a world leader in mobile privacy protection (VPN & antivirus) and consumer Internet security.

Work for ZoneAlarm Pro Firewall?

Learning about ZoneAlarm Pro Firewall?

We can help you find the solution that fits you best.

Find the Right Product

ZoneAlarm Pro Firewall Features

Compliance
Multi-Factor Authentication

Requires a second level of authentication, such as sms messaging or customized tokens, to access data.

80%
(Based on 6 reviews)
Access Management

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

81%
(Based on 7 reviews)
Security and Compliance

Abilities to set standards for database security and risk management.

89%
(Based on 7 reviews)
Mobile Device Mangement

Ability to set standards for types of mobile devices and networks capable of accessing data.

76%
(Based on 5 reviews)
Administration
At-Risk Analysis

Identifies location of data that may be less protected and more vulnerable to threats.

89%
(Based on 7 reviews)
Device Control

Manages user network accessibility on laptops, mobile phones, tablets and other mobile devices.

87%
(Based on 8 reviews)
DLP Configuration

Sets protocols to alert administrators and back-up or encrypt data at rest or as incidents arise.

Not enough data available

Database Management

Administrators can access and organize data related to incidents to produce reports or make data more navigable.

Not enough data available

Mobile App

Provides a local access point to view information about the mobile data security product.

Not enough data available

Protection
Data Encryption

Provide some level of encryption of data in transit, protecting sensitive data while it lives in the application.

91%
(Based on 7 reviews)
Data Transport

Protects data with some form of encryption as it leaves your secure or local network.

89%
(Based on 7 reviews)
Mobile VPN

Provides a virtual private network (VPN) to secure remote access to networks

90%
(Based on 6 reviews)
Backup

Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.

90%
(Based on 6 reviews)