Firewall fire sale: Free ZoneAlarm makes it to Vista
On another subject, the security vendor swears to hack Vista kernel if necessary
Check Point Software Technologies Ltd. today launched a Windows Vista version of its flagship ZoneAlarm firewall and blamed the delay on a switch to the new operating system's application programming interfaces (API).
The Vista version of ZoneAlarm, a two-way firewall that will continue to be given away, is the first from a major security vendor to apply Vista's Windows Filtering Platform (WFP) API, said Laura Yecies, the general manager of Check Point's consumer security line.
"This is a bit later than we would have liked," said Yecies, noting the four-month lag between Vista's retail release and ZoneAlarm's appearance. "We underestimated the schedule impact of WFP. But long term, WFP will give us more support and more stability on Vista. It was a lot of extra work, but we'll have to do fewer hacks in the future."
WFP, a new Vista architecture that lets developers tap into the TCP/IP processing path, was a hard row to hoe. "At times, it seemed like we were an extension of Microsoft QA. They patched and made changes based on what we found while we were developing," Yecies said. Microsoft used WFP to create its own Windows Firewall, which is bundled with Vista.
Even so, Check Point is committed to keeping ZoneAlarm a free download.
"It's very important to who were are," Yecies said. Zone Labs Inc., which was acquired by Check Point in 2004, made its name by giving away the firewall. "And we think it's the right thing to do," she said. "Our paid users live in a safer world because there are 20 million more protected by the free firewall."
Check Point touted ZoneAlarm, also the foundation of the ZoneAlarm Internet Suite that was released today for Vista, as an "operating system-level" firewall. "Eighteen months ago, we decided that the firewall had to operate at the lowest level of the OS, to monitor every call, every program," said Jordy Berson, ZoneAlarm product manager.
"There are so many new threats that we need a behavioral-based firewall" to detect and defeat more insidious attackers, including rootkits and drive by-installed keyloggers, Berson said. "ZoneAlarm does for the computer itself what it was already doing for the network," she said. The Vista firewall tracks 30 different behaviors, such as API calling, logging keystrokes or injecting code, then decides if what it's seeing is safe. If not, it shuts down the process as a more traditional firewall shuts down access to the Internet when it spots a rogue.
ZoneAlarm's delay had nothing to do with the brouhaha last year over access to the kernel in the 64-bit version of Vista, Yecies said. Last fall, several security vendors, including Check Point rivals Symantec Corp. and McAfee Inc., pressed Microsoft to back off its PatchGuard kernel-protection technology. Eventually, Microsoft agreed. In December, the company released draft APIs.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!