Pros

  • Intrusion detection capabilities
  • Anti-spyware tools
  • Monitoring tools
  • Cookie management

Cons

  • Default configurations are either too permissive or too restrictive
  • Expensive
  • Customized configuration requires networking expertise