Jetico Personal Firewall
Did you know that there are a lot of Bad Guys out there?
Jetico Personal Firewall makes sure the Bad Guys can't harm you.
Jetico Personal Firewall software protects computers against hackers and malicious software when networked or connected to the Internet.
Jetico Personal Firewall offers:
- Detailed and configurable event logs
- Detailed and configurable reports
- Option to view and edit the firewall configuration
The modular architecture is as open as possible to assist with easier evaluation of the security.
Click on the following features for more information:
- Monitor Running Applications that Access the Network
- Monitor Selected/all Network Packets as well as Selected Network Events
- Choose a Pre-defined Security Policy — the Firewall Rule Set
- Modify Security Policy to Meet your Needs
- Make your own Security Policy
- Three Layers of Protection
Jetico Personal Firewall outperforms other well known products:
Matousec.com firewall test results with emphasis on HIPS
Highest protection level based on multi-level filtering
Jetico Personal Firewall establishes filters at multiple layers in the operating system. This allows the software to withstand all known attacks.
Fine tuned configuration
The firewall package contains several pre-built configurations to satisfy everyone's needs.
Jetico Personal Firewall Configuration explorer displays effective configuration as well as rule activity indicators.
Low resources consumption
Jetico Personal Firewall is designed to be high-performance and small footprint software.
The entire firewall configuration is available for user inspection and modification. Firewall filtering functions are implemented by modules. Jetico Personal Firewall contains no hidden or compiled-in features.
Jetico Personal Firewall v2 runs as privileged Windows service. It can protect computer before user logon. Native support for Windows XP Fast User Switching and Terminal Services. Jetico Personal Firewall supports Access Control Lists for all main functions. Administrator can configure ACL to grant access to particular firewall functions for any user or group. Windows XP Service Pack 2 Security Center support.
Improved rule editing interface. New popup message. The new look for popup dialog is presented. Popup message text and rule creation options can be modified. Firewall variables formerly controlled by Configuration Wizard, are integrated into main application window. Language file support for easy localization. All translatable words and phrases are taken from single UTF-8 encoded text file.
New XML-based open configuration file format. Detailed documentation is available upon request. The new version maintains single protected firewall configuration for all users. Simplified controls for configuration. New hash handling scheme. Separate table for hash checking. Each firewall filtering layer has own root table. New automatic variables (per-connection) for local connections are supported.
Rules support lists of parameters where possible. IP rules support IP address ranges. Low level protocol rules support filtering by MAC address. Application rules have events for direct and indirect access to network. Indirect access details are also available. New module for hash checking created. Application, Process attack and Hash checking rules support wildcards in file paths.
Log entries can be associated with rule. Firewall can create rule based on log information. New WELF-compatible text log format. WELF is supported by many log analyzers. Improved log control.
Jetico is only responsible for the English language version. Yet many of our users have kindly contributed translations of the software so it appears in their native language. Jetico appreciates our open global community of dedicated users and enables the distribution of these user-contributed translations:
If you would like to translate Jetico Personal Firewall into your native language, contact Jetico Technical Support.
Make sure the Bad Guys can't harm you... Protect your computer with Jetico Personal Firewall