ZoneAlarm

Last updated
ZoneAlarm
Developer(s) CheckPoint Software Technologies LTD.
Initial releaseFebruary 16, 2000;23 years ago (2000-02-16)
Stable release 15.8.038.18284 [1] (January 23, 2020;3 years ago (2020-01-23)) [±]
Preview release None [±]
Operating system Microsoft Windows
Available inEnglish, French, German, Italian, Spanish
Type Antivirus software, personal firewall
License Freemium
Website www.zonealarm.com

ZoneAlarm is an internet security software company that provides consumer antivirus and firewall products. ZoneAlarm was developed by Zone Labs, whose CEOs were Kevin Nickel, Mouad Abid and Shahin and the Company was acquired in March 2004 by Check Point. [2] ZoneAlarm's firewall security products include an inbound intrusion detection system, as well as the ability to control which programs can open outbound connections.

Contents

Technical description

In ZoneAlarm, program access is controlled by way of "zones", into which all network connections are divided. The "trusted zone" which generally includes the user's local area network can share resources such as files and printers. The "Internet zone" includes everything without the trusted zone. The user can grant permissions (trusted zone client, trusted zone server, Internet zone client, Internet zone server) to programs before they attempt to access the Internet (e.g. before the first use) or ZoneAlarm will ask the user to grant permissions on the first access attempt. [3]

"True Vector Internet Monitor", also known as "TrueVector Security Engine", is a Windows service that is the core of ZoneAlarm. In the processes list its Image Name is "vsmon.exe". This monitors internet traffic and generates alerts for disallowed access. "Operating System Firewall" (OSFirewall) monitors programs and generates alerts when they perform suspicious behaviors. The OSFirewall is useful in preventing rootkits and other spyware. "SmartDefense Advisor" is the name ZoneAlarm give to a service available in all versions that helps the user with certain types of alert, using a database of trusted program signatures to provide the user with advice on allowing or denying Internet access in response to program requests.

The current free version of Zonealarm has an ad for the paid version that pops up every time you turn on your computer after a short delay.

Awards and certifications

Both the free and Pro editions of ZoneAlarm Firewall were designated as PCMag 's Editor's Choice in 2017. [4] [5]

Controversies

As of January 2006, ZoneAlarm was reportedly [6] sending data to the company's servers in a covert fashion. A developer dismissed allegations that ZoneAlarm was spying on its clients, saying that it was an issue related to software updates and that it would be fixed. [7]

In December 2007, a browser toolbar was shipped with ZoneAlarm as an opt-out, which was not well received. [8] This was removed in later versions of the software.

On September 2, 2010, the free version of ZoneAlarm started showing a "Global Virus Alert" popup as a scareware tactic to get users to switch to their paid security suite. [9] The popup was turned off by ZoneAlarm marketing team after an uproar from disgruntled users, many of whom uninstalled the software. [10] [11]

See also

Related Research Articles

<span class="mw-page-title-main">Spyware</span> Malware that collects and transmits user information without their knowledge

Spyware is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privacy or endangering their device's security. This behaviour may be present in malware as well as in legitimate software. Websites may engage in spyware behaviours like web tracking. Hardware devices may also be affected. Spyware is frequently associated with advertising and involves many of the same issues. Because these behaviors are so common, and can have non-harmful uses, providing a precise definition of spyware is a difficult task.

<span class="mw-page-title-main">Personal firewall</span>

A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. Typically it works as an application layer firewall.

<span class="mw-page-title-main">Internet security</span> Branch of computer security

Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.

<span class="mw-page-title-main">Scareware</span> Malware designed to elicit fear, shock, or anxiety

Scareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software. Scareware is part of a class of malicious software that includes rogue security software, ransomware and other scam software that tricks users into believing their computer is infected with a virus, then suggests that they download and pay for fake antivirus software to remove it. Usually the virus is fictional and the software is non-functional or malware itself. According to the Anti-Phishing Working Group, the number of scareware packages in circulation rose from 2,850 to 9,287 in the second half of 2008. In the first half of 2009, the APWG identified a 585% increase in scareware programs.

<span class="mw-page-title-main">ESET NOD32</span> Computer protection software

ESET NOD32 Antivirus, commonly known as NOD32, is an antivirus software package made by the Slovak company ESET. ESET NOD32 Antivirus is sold in two editions, Home Edition and Business Edition. The Business Edition packages add ESET Remote Administrator allowing for server deployment and management, mirroring of threat signature database updates and the ability to install on Microsoft Windows Server operating systems.

<span class="mw-page-title-main">AVG AntiVirus</span> Antivirus computer program

AVG AntiVirus is a line of antivirus software developed by AVG Technologies, a subsidiary of Avast, a part of Gen Digital. It is available for Windows, macOS and Android.

Norton AntiVirus is an anti-virus or anti-malware software product founded by Peter Norton, developed and distributed by Gen Digital since 1990 as part of its Norton family of computer security products. It uses signatures and heuristics to identify viruses. Other features included in it are e-mail spam filtering and phishing protection.

Norton Internet Security, developed by Symantec Corporation, is a discontinued computer program that provides malware protection and removal during a subscription period. It uses signatures and heuristics to identify viruses. Other features include a personal firewall, email spam filtering, and phishing protection. With the release of the 2015 line in summer 2014, Symantec officially retired Norton Internet Security after 14 years as the chief Norton product. It was superseded by Norton Security, a rechristened adaptation of the Norton 360 security suite.

<span class="mw-page-title-main">McAfee VirusScan</span> Antivirus software

McAfee VirusScan is an antivirus software created and maintained by McAfee. Originally marketed as a standalone product, it has been bundled with McAfee LiveSafe, McAfee AntiVirus Plus, McAfee Total Protection and McAfee Gamer Security since 2010. McAfee LiveSafe integrates antivirus, firewall and anti-spyware/anti-ransomware capabilities.
In 2006, British telecom company BSkyB started offering Sky Broadband customers a branded version of VirusScan for free upon broadband modem installation.

Check Point Integrity is an endpoint security software product developed by Check Point Software Technologies. It is designed to protect personal computers and the networks they connect to from computer worms, Trojan horses, spyware, and intrusion attempts by hackers. The software aims to stop new PC threats and attacks before signature updates have been installed on the PC. The software includes.

Outpost Firewall Pro is a discontinued personal firewall developed by Agnitum.

<span class="mw-page-title-main">Rogue security software</span> Form of malicious software

Rogue security software is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer. It is a form of scareware that manipulates users through fear, and a form of ransomware. Rogue security software has been a serious security threat in desktop computing since 2008. An early example that gained infamy was SpySheriff and its clones, such as Nava Shield.

Antivirus software is computer software used to detect and stop malware and viruses. This article compares notable antivirus products and services, and is not a deep analysis of the strengths and weaknesses of each.

<span class="mw-page-title-main">Security and Maintenance</span> Microsoft Windows software

Security and Maintenance is a component of the Windows NT family of operating systems that monitors the security and maintenance status of the computer. Its monitoring criteria includes optimal operation of antivirus software, personal firewall, as well as the working status of Backup and Restore, Network Access Protection (NAP), User Account Control (UAC), Windows Error Reporting (WER), and Windows Update. It notifies the user of any problem with the monitored criteria, such as when an antivirus program is not up-to-date or is offline.

<span class="mw-page-title-main">Kaspersky Anti-Virus</span> Antivirus solution

Kaspersky Anti-Virus is a proprietary antivirus program developed by Kaspersky Lab. It is designed to protect users from malware and is primarily designed for computers running Microsoft Windows and macOS, although a version for Linux is available for business consumers.

ZoneAlarm Secure Wireless Router Z100G is a discontinued Unified Threat Management security router for the home and SOHO market.

<span class="mw-page-title-main">AVG Technologies</span> Brand of cybersecurity, privacy, performance and utility applications

AVG Technologies is a brand of cybersecurity, privacy, performance and utility software applications for desktop computers and mobile devices developed by Avast, a part of Gen Digital. AVG was a cybersecurity software company founded in 1991 and it merged into Avast following an acquisition in 2017. It typically offers freeware, earning revenues from advertisers and from users that upgrade to paid versions for access to more features.

<span class="mw-page-title-main">Comodo Internet Security</span>

Comodo Internet Security (CIS) is developed and distributed by Comodo Group, a freemium Internet security suite that includes an antivirus program, personal firewall, sandbox, host-based intrusion prevention system (HIPS) and website filtering.

MS Antivirus is a scareware rogue anti-virus which purports to remove virus infections found on a computer running Microsoft Windows. It attempts to scam the user into purchasing a "full version" of the software. The company and the individuals behind Bakasoftware operated under other different 'company' names, including Innovagest2000, Innovative Marketing Ukraine, Pandora Software, LocusSoftware, etc.

<span class="mw-page-title-main">Trend Micro Internet Security</span>

Trend Micro Internet Security is an antivirus and online security program developed by Trend Micro for the consumer market. According to NSS Lab comparative analysis of software products for this market in 2014, Trend Micro Internet Security was fastest in responding to new internet threats.

References

  1. ZoneAlarm Release History
  2. "Globes English - Check Point to acquire Zone Labs for $205m". Archived from the original on March 5, 2016. Retrieved November 11, 2015.
  3. Check Point press release Disk encryption
  4. "Check Point ZoneAlarm Free Firewall 2017".
  5. "Check Point ZoneAlarm PRO Firewall 2017".
  6. Hales, Paul (2006-01-22). "Is your firewall spying on you?". theinquirer.net. Archived from the original on March 12, 2010. Retrieved 2017-01-07.{{cite web}}: CS1 maint: unfit URL (link)
  7. Zone Labs responds to spyware allegations at the Wayback Machine (archived October 25, 2006)
  8. Dignan, Larry (2007-12-18). "ZoneAlarm toolbar bundle raises a ruckus". zdnet.com. Retrieved 2017-01-07.
  9. Leyden, John (2010-09-20). "ZoneAlarm slammed for scarewarey marketing". Theregister.co.uk. Retrieved 2010-11-09.
  10. Protalinski, Emil (2010-09-22). "ZoneAlarm caught using fake antivirus scare tactics". Arstechnica.com. Retrieved 2010-11-09.
  11. Pegoraro, Rob. "ZoneAlarm gives people a new reason to hate security software". Voices.washingtonpost.com. Retrieved 2010-11-09.