ZoneAlarm Internet Security 6.0
The mantra of any network security expert is "defense in depth," and the ZoneAlarm Internet Security Suite 6.0 manages to bring this multilayered strategy to the personal desktop without sacrificing system performance or increasing the cost over . Unlike the built-in firewall within Windows XP SP2, which blocks only inbound threats, the ZoneAlarm firewall protects against both inbound and outbound attacks. Layered below that is an application- or program-layer firewall, which prevents malicious code from running on your system as legitimate software. New this year, however, is an operating system firewall; ZoneAlarm now protects the Windows core registry and system files from kernel-level malicious attacks. No other desktop firewall can claim that. Also new is ZoneAlarm's homegrown antispyware protection, which when added to the layered firewall, antivirus, and antispam protection, makes ZoneAlarm Internet Security the best desktop security value on the market today.
ZoneAlarm Internet Security is a breeze to download. When you install, the program asks for your Internet connection method (dial-up, DSL, cable, and so on), the type of computer you use (single user, family, laptop, workstation), and whether you're part of a network and already use antivirus software. This information provides ZoneAlarm Internet Security with an initial configuration that you can tweak later if necessary.
After rebooting your PC, ZoneAlarm launches the Control Center, its main interface, which is clean and concise, with configuration options intuitively divided under 10 tabs (Overview, Firewall, Program Control, Antivirus/Antispyware, E-mail Protection, Privacy, ID Lock, IM Security, Web Filtering, and Alerts & Logs). Overall, ZoneAlarm's look and feel hasn't changed from that of previous versions, as most of the enhancements are under the hood.
ZoneAlarm Internet Security's configuration can be as simple or as complex as you prefer. For beginners, the default settings should be an adequate balance of safety and convenience. For advanced users, however, ZoneAlarm makes it easy to tweak the settings to your liking. For instance, set the suite's Internet cookie management to Off, turn it on High (blocking all cookies), or leave it at Medium to permit session-only cookies. If you want more detailed control, however, you can accept each tracking cookie on your computer for whatever length of time you choose. Norton and McAfee also allow for these options, but you'll have to drill down several layers from the main interface.
ZoneAlarm is available in four different editions, ranging in price from a free download to the $70 omnibus suite. Each paid version builds upon the features found in the free firewall. Better yet, you can download ZoneAlarm Internet Security, try it for 15 days, and at the end of the trial, keep the free version of ZoneAlarm without having to reinstall the software (the paid features simply gray out). We wish other security applications were this easy to use.
ZoneAlarm is the basic, free firewall edition that includes automatic firewall rule creation, color-coded alerts, automatic intrusion blocking, firewall protection at bootup, operating system-level protection, and a Windows Internet Explorer cache cleaner. For those uncertain whether they need a firewall, ZoneAlarm presents an easy-to-use entry-level option that won't cost a cent.
ZoneAlarm with Antivirus adds an antivirus engine from Computer Associates, which is fast and light on system resources. This $20 edition of ZoneAlarm is less expensive than most standalone antivirus apps without a firewall. ZoneAlarm with Antivirus includes automatic wireless network configuration, more customization features, and a password-protected interface (so that someone doesn't try and change your configuration settings without your knowledge).
ZoneAlarm Pro includes all of the features found in both ZoneAlarm and ZoneAlarm with Antivirus and adds ID lock (to prevent personal data from escaping from your desktop), hacker ID and mapping so that you can see where an attack might have originated, and inbound and outbound MailSafe, which checks your e-mail for suspicious file attachments.