Viruses and malware hosted on web pages, email phishing attacks, spam, virus infested emails, and other threats are now all part of a regular repertoire of sophisticated blended attacks that bypass traditional firewalls with ease. Small businesses have been the ones most seriously affected as small businesses, unlike their enterprise counterparts, often lack the time and resources to fully harden and secure their networks from these threats.
Moreover, such threats have signaled a change in the threat landscape: previously, threats to small businesses could largely be considered “push” type threats wherein hackers specifically targeted small businesses – a relatively rare occurrence given the prevalence of larger and richer targets in the medium and large business space. However, the advent of Web 2.0 technologies and cloud computing has largely shifted the threat landscape to one characterized largely by “pull” attacks wherein end users use Web 2.0 and cloud computing technologies to “pull” threats into the organization.
Because comprehensive network security solutions require an abundance of processing power to examine network traffic in real time, existing SMB all-in-one security solutions often use rudimentary security technologies that trade comprehensiveness for speed. True security must satisfy the requirements in both speed and coverage.