The Analogy
Your Router Is Literally Your Property’s Protection From The Outside World.

It is where the outside Internet is stopped, vetted, and then “let in” as per programming policies… just like a guard with an approved “guest list.”

Your Router Is Your First Line of Defense!

With most current Small Business-type routers, your inbound traffic is always somewhat “screened” to determine whether they are allowed to be let in. To some extent—depending on how sophisticated your router actually is—the Inbound Web Traffic is also “screened” to verify any level of threat or risk to your property.
Current Security Routers – aka Next-Generation Firewalls (NGFWs) – Actually Check In Daily With Multiple Sources To Get The Most Current Lists Of Threats And Cyber-Criminals To Make Sure All Known Threats – And Even Potential Threats – Are Always Blocked…
Another thing Only Current “NEXT GEN” Routers do, is they will actually “Live Monitor” all Network and Internet traffic (or network “visitors”) to verify that “someone they let in, thinking they were safe,” isn’t actually trying to do you harm or steal any of your information.

With that in mind, another powerful aspect of Current “NEXT GEN” Routers, is they will actually Thoroughly Inspect All Of Your Exiting Internet Traffic (or network “visitors”) to verify that “someone they let in, thinking they were safe,” isn’t actually trying to quietly connect to a nefarious, malicious, or other questionable site.
To make this analogy make more sense…
Think of the Gateway Router as the Gates and Fences around your property with a specific Guard Shack for Entering “Visitors” and a separate Guard Shack for Exiting “Visitors.”
As for the “Fencing,” these are INPENETRABLE WALLS… Meaning, there’s only one way in to your property (or Business Network), and that’s through the Entry Guard Shack.
At this Entry Guard Shack, all Network “Visitors” are – for this analogy’s sake – Fingerprinted, DNA Sampled, Retina Scanned, Full-Body X-Rayed and Checked Against the Known Threats Logs. If they’re “cleared” for Entry, they will not only be Tagged, but they will also have a Security Escort with them at all times, constantly watching what they do, how they behave and what emotions they show during their visit.
All “Visitors” Exiting the property, must exit through another Guard Shack where they are again run through all of the Security Protocols and patted down just to make sure they didn’t steal any soap from the washroom while they were in there.
How this analogy translates into the Real World…
Just imagine if you receive a WORD document or an EXCEL sheet via email, or download it off the Internet. Upon the initial Inbound Security Checks, everything passes. But, you then open the document and realize you want to modify, mark-up, add-to, etc. the document and to do that you have to click on an option within the file that says “ENABLE EDITING.”
The exact millisecond you Enable Editing, taking that document from a PROTECTED-VIEW (or READ-ONLY File) you’ve removed the Microsoft restrictions and are allowing any hidden files (aka macro’s) like Worms, Viruses, or other kinds of Malware to now run.
Most of the time, these types of nefarious macro’s will try to connect to an external website to build-out a fully functional cyber attack, because they can’t really hide the full code from the Inbound Security Checks.
But because our Next-Gen Firewalls also have the Exiting Guard Shack, these types of Malicious Visitors are stopped dead in their tracks, before they can even connect.
Our Recommendations
We recommend the Dell SonicWall Security Appliances (Routers) which deliver a far superior level of protection (A Truly Enterprise Level Of Protection) for a Small Business price…
With SonicWall TZ-Series Routers you get: Best In Class Advanced Threat Protection,
Much Stronger (More Secure) VPN, Deep Packet Inspection, and Constant Updates:

- Unified Threat Management
- Gateway Anti-Virus
- Gateway Anti-Spyware
- Gateway Anti-Spam
- Gateway Anti-Malware
- Intrusion Prevention
- Content Filtering
- Deep Packet Inspection
- And Global Geo-IP Filtering and Blocking








“Open Garage”