product selectorHandpicked by NetThreat

NetThreat is a vendor-neutral company. We supply a variety of solutions as we appreciate that there is no one-box-fits-all solution to IT security.

Our business is based on relationship. The vendors we select are not only those who provide the highest level of security, but also those who are focused on developing positive relationships with you and us. This enables us to provide you with an excellent level of pre and post-sales support. 

Many of our vendors provide a variety of solutions to the issues your business may face. Please don't hesitate to contact us for advice on how to select the best option to suit your requirements. It's what we're here for!

SonicWall-logo-final.png our sonicwall site »

SonicWall provides intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks.

Preventing cyber crime for over 25 years, defending small and medium size businesses and enterprises worldwide. Supplying some of the most powerful and feature-rich security devices to over 500,000 businesses in more than 150 countries around the world.

NetThreat are proud to be a SonicWall Gold Partner and the largest SonicWall reseller in Europe.

95% of firewall breaches are caused by misconfiguration. Read more HERE about how we can help you make the most of your investement and maximise your security.

icon33our watchguard site »

WatchGuard build affordable, all-in-one network and content security solutions to provide defence in depth for corporate content, networks and the businesses they power.

Ultra-fast UTM security using best-of-breed services, the WatchGuard T-Series delivers a powerful collection of tools for the business network.


black text logo





 Check Point Software Technologies is a multinational provider of software and combined hardware and software products for IT security, including network securityendpoint securitymobile securitydata security and security management

KnowBe4 logo 2





91% of data breaches start with a phishing attack.

Phishing is the #1 method of distributing ransomware with 4,000 daily attacks occurring during 2016, a 300% increase from the year before. Most attacks are preventable with awareness and training. 

KnowBe4 tests and trains your staff to identify and stop attempts to steal your data.

storagecraft products



StorageCraft provides recovery solutions for complete protection of business IT environments.

The StorageCraft Recovery Solution gives you tools to back up your systems, applications, and data, replicate them locally or in the cloud, and restore everything from a single file to complete systems throughout your network. 

Physical or virtual, Linux or Windows, you won't find a faster, more reliable way to recover.

knowwho products



KnowWho, powered by Safenet, is a revolutionary alternative to traditional authentication solutions. Hosted in the cloud, it allows you to take advantage of the security that two-factor authentication provides, without the expense of installing a solution within your network.

Ideally suited to integration into our remote access and firewall solutions, as well as your established network services. KnowWho boasts flexible deployment and payment options on a quarterly or annual basis.

eset products


ESET Endpoint Encryption

Data is an integral part of modern business. When data is moved from place to place, whether it’s via the internet or physical storage, it is vulnerable.

Proactively protect your data with Endpoint Encryption.


VASCO is a world leader in strong authentication and e-signature solutions, specializing in online accounts, identities and transactions. As a global software company, VASCO serves a customer base of approximately 10,000 companies in 100 countries, including more than 1,700 international financial institutions.

NetThreat Top Tips and Advice

How to Select a Firewall

So once you've checked out the vendors available and decided on a manufacturer, how do you decide which unit is most suitable for your business? Here are our top three tips to ensure value for money:

1. Consider lifespan: Typically we would expect your new device to be suitable for 4-5 years.  How do you expect your business / internet usage to develop in this time?

2. Things are not always as they seem: Bear in mind that published statistics are achieved in a lab and performance varies greatly depending on what services are being used so always factor this into your decision on which unit is most suitable.

3. Get the most for your money: UTM boxes are at their most cost effective when delivering a variety of security functions. Consider what functions your device will provide for you; Security, Content Control, Reporting, Remote Access and more (potentially negating the need for other solutions). Remember these will affect the performance and capacity of the device.

Oh, and there is a number 4:

4. Call us: We're happy to spend the time talking through the considerations and helping guide you to the most suitable appliance.

Watch Out for Offers

Most of our vendors provide promotions and special offers to encourage a move to their latest appliance. Many of these offers are available for owners of competitors' units. More information about some of the options available can be found on our individual vendor websites or feel free to contact us to find out more.