The spyware scanner worked well and the report was clear and usable. Each feature subsection contains a customization option that provides another level of feature detail. ![]() The sliders work well and are clear and simple to use. You also can easily see which programs are currently active.Įach major feature uses a slider control to set the security level for that feature. Here it displays the level of trust each program has and the access granted by ZoneAlarm. In this tab you can view the programs with which ZoneAlarm has interacted. The program control section of the UI is busy but informative. Other pages of the interface are clearer and the ZoneAlarm UI designers provide plenty of information. Still, it works well once you learn how to navigate it. It uses a page and tab metaphor (as do many other security applications) but the implementation isn’t slick or clear like other packages I’ve tested. It worked more like a web interface than a desktop application. The main UI is busy and initially struck me as a bit dated. At the end of the installation, you’re asked to join DefenseNet. Still, registration should be a background process and not something the user is hit with more than once. A company can also track the conversion rate from purchase to install. When a user registers, not only does a company get information that will allow it to sell direct, but it also is able to better track how many people are using their software. I understand why software companies want users to register and use online services. The installer does require a system reboot but before the reboot, you’re told about more services ZoneAlarm offers. Registration is always irritating and I was annoyed about entering personal information before the product was even installed.Īt the end of the installation, you’re prompted again for registration information. The second screen in the install wizard asked for registration information. Installation went smoothly but it requires a fair amount of interaction from the user. However, it did leave behind a significant amount of registry entries. The uninstaller verified permission to uninstall (so a virus or malware doesn’t uninstall it without you knowing about it) and cleaned up the disk quite well. The uninstaller cannot be run by rerunning the installer therefore uninstalling requires a trip to the Windows Control Panel or Start Menu (ZoneAlarm puts a link to the uninstaller in their menu listing). The installer writes roughly 33Mb to the hard disk and creates almost 200 registry keys. Power users will love the advanced ‘firewall rules’ that can be written and general users will find the level of protection worth the money. It will be hard to beat the feature richness and robust implementation of the well-rounded firewall. The general user will find the product simple enough to install it and forget it. Power users will love the extensive flexibility of the firewall. While it’s easy to get lost in the many layers of options and dialogs, most users can proceed by modifying a few top-level properties and ignoring the customization buttons that almost every screen provides. The user interface is busy but reasonably clear. Once installed the product ran with a very small memory footprint and performed admirably in my test. Registration is not required but a post-install reboot is. I encountered none of the uninstall problems that people have complained about in the past. The product installs easily enough, although it requires more user interaction than I care to give. The product makes good use of this model and implements it effectively. Terms like “security zones,” “lockdown,” “perimeter security,” and “alarm” are very apropos when attempting to understand the ZoneAlarm model. ![]() ![]() ZoneAlarm is distinct in that it leverages a security approach common in some military and civilian scenarios. ZoneAlarm Pro by Check Point Software Technologies is a competitive security package that has carved a niche as a robust firewall that can be customized to your specifications.
0 Comments
Leave a Reply. |