For 15 years, Outpost Firewall Pro has set the standard for firewall protection. An award-winning solution, it consistently posts the highest industry ratings for inbound and outbound traffic protection as well as data leak prevention. All this without impacting your computer’s performance!
Keeps ports closed
Outpost keeps the main ports shut to prevent unsafe connections.
Blocks incoming targeted attacks
Outpost defends your online privacy against hackers and targeted attacks with a tailored attack detection module.
Prevents “calling home”
Outpost filters outbound traffic and prevents malware from “calling home”, or transmitting your data to hackers.
Makes PCs invisible
Outpost runs in stealth mode, so your PC appears offline to hackers and can’t respond to potentially harmful requests.
Keeps your private information private
Outpost makes sure there are no data leaks, so your files - documents, photos, videos, emails, and more - remain protected.
Forget freezes and slowdowns
Outpost stands for "quiet" protection for your PC, undemanding on computer resources. Outpost does its job and doesn't slow your system down.
Safeguards your PC against hackers and data leaks.
Prevents targeted attacks from local networks and the Internet.
Blocks new and sophisticated malware before your antivirus can identify it.
System and Application Guard
Secures IDs and passwords used with most popular applications against unauthorized access. Protects key system settings and program data from misuse.
Self-protection against malware
Outpost is equipped with proven self-protection against deactivation by malware.
Advanced activity monitoring shows real-time program activity and connection status.
Easy-to-view protection status with instant access to updates and license information under "My Security" tab.
Two-way firewall to keep network connections secure, featuring inbound and outbound traffic protection, Attack Detection, IP BlockList and an updatable list of blocked IPs.
Enable or disable protection modules accessible in just one click from within the revamped Settings menu.
The Tools menu now incorporates Network activity, Used Ports, Online Activity, Process activity, File and Registry monitor, Attacks blocked and Event viewer — all under the same roof.
This tab shows the chart of currently used ports, so the user can close a port promptly in case of suspicious activity.
File and Registry Activity
File and Registry Activity Monitor enables on-demand recording of system events.
The Update tab reveals your protection status and provides an opportunity of instant update for presets and configuration files.