The majority of small businesses will already have a router, but a firewall is specifically designed to protect your network. With more complex threats, the functionality and features of firewalls and routers have evolved to include services such as intrusion prevention (IPS), antivirus, web filtering and anti-spam; often – all in one box.
With so many vendors, models and features, costs range from a few hundred pounds to several thousand – what represents good value? What does your business need? How much does a small business firewall cost? Read more
The Dark Web is a hidden universe contained with the ‘Deep Web’ which is the portion of the internet that is hidden from conventional search engines, Government surveillance and regulatory oversight. The ‘Deep Web’ is estimated to be at least 550 times larger than the traditional internet, and it is growing every day. Read more
This article may grow over time as new features and market terms develop.
When you read a small business firewall data sheet or brochure, you may be confused by the terminology or lost in the wealth of performance metrics quoted. This problem is often made worse when different vendors use subtly different terms or use a different basis to assess performance!
What figures matter when selecting a firewall? Which feature sets should you be most concerned about, and those that, frankly – shouldn’t matter so much! This article will define those items, explain the significance and outline how to map this against a challenge or risk within your business.
If your business has a need to enhance its firewall or network security, or you need assistance in selecting the right firewall solution – speak to MTG and our team of firewall engineers.
In previous articles, we have explained the benefits of internal network firewalls, also known as internal segmentation firewalls. The primary purpose is to secure internal network traffic, particularly between sites, functional areas or departments. Another common use is to provide an additional level of protection for sensitive areas of your network (i.e. databases, R&D) or high-risk areas (i.e. development environments, staging areas).