	{"id":10159,"date":"2013-03-12T07:10:18","date_gmt":"2013-03-12T15:10:18","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=10159"},"modified":"2015-03-26T15:37:38","modified_gmt":"2015-03-26T22:37:38","slug":"whats-the-difference-between-a-hardware-and-software-firewall","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/","title":{"rendered":"What&#8217;s the Difference Between a Hardware and Software Firewall?"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10439\" title=\"Hardware-software-blog-header\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Hardware-software-blog-header.jpg\" alt=\"\" width=\"600\" height=\"375\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Hardware-software-blog-header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Hardware-software-blog-header-150x93.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Hardware-software-blog-header-300x187.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>You\u2019ll often hear, when a security wonk recommends layered security, that you should be using a \u201chardware or software firewall.\u201d What\u2019s the difference? How or why would you choose one over the other? The truth is, many people have both in their networks. Each performs a slightly different function, and both offer slightly different types of protection.<\/p>\n<h3>What the Heck is a Firewall?<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10447\" title=\"Firewall\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Firewall.jpg\" alt=\"\" width=\"550\" height=\"376\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Firewall.jpg 550w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Firewall-150x102.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Firewall-300x205.jpg 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/p>\n<p>Some of you may be wondering what a firewall even is. Simply put, firewalls look at the Internet traffic going in and out of your machine. You can instruct them to block certain traffic or allow other kinds. Sometimes you can choose to do this automatically without the firewall asking, and sometimes you can choose to have the firewall ask you first before blocking.<\/p>\n<p>Firewalls can take more \u201ctuning\u201d than other types of security software. Everyone\u2019s situation and systems are different, so no one configuration fits everyone. And these differences may also depend on context&#8211;you will probably want different protection in one location than in another.<\/p>\n<p><strong>Hardware Firewalls<\/strong><\/p>\n<p>Businesses often have dedicated hardware firewalls that have a host of different tools to help block threats at the periphery of the network. This way, they can filter email and web traffic (among other things) for everyone without having to bog down anyone\u2019s machine too much.<\/p>\n<p>At home, many people have a broadband router that acts in the same way. In essence, this is your \u201chardware firewall\u201d for a home network. These are configurable, if you\u2019re inclined towards tinkering, to give you a lot of power to decide what sorts of traffic will be allowed within the boundaries of your network.<\/p>\n<p><strong>Software Firewalls<\/strong><\/p>\n<p>But your home computers are not always within your home network, which is why having a software firewall gives you the ability to take additional protection with you, wherever you go.<\/p>\n<p>Our latest software firewall, <a href=\"https:\/\/www.intego.com\/virusbarrier#\/net-barrier-2013\">Intego NetBarrier 2013<\/a>, knows this. It also knows you have different concerns for protection depending on your location. It will ask you when you connect to a new network, whether you\u2019re at home, work, or in a public place, so you have three separate profiles ready to go. These distinct settings give you three different levels of protection that are based on levels of trust.<\/p>\n<p>In any situation, you need a basic level of protection, but there are instances where you\u2019ll need a little or a lot more. Below are some examples.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-10449\" title=\"home-work-public-settings\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/home-work-public-settings.jpg\" alt=\"\" width=\"550\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/home-work-public-settings.jpg 550w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/home-work-public-settings-150x81.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/home-work-public-settings-300x163.jpg 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/p>\n<h3>Firewall Protection When You\u2019re in Public<\/h3>\n<p>In a public location (like a hotel, coffee shop, or airport), there will be a lot of people connected to the same network as you. Those people aren\u2019t known or trusted, there are no corporate rules about what software they can and can\u2019t use, and there could be people there who are up to no good.<\/p>\n<p>Let\u2019s say you\u2019re flying to Las Vegas for a fun little weekend getaway. On your way to the airport you stop at your favorite caf\u00e9 for a quick bite to eat. While you\u2019re there, you fire up your laptop and check if you can snag a seat closer to the front of the plane. (No luck, your flight\u2019s fully booked.)<\/p>\n<p>Once you get to the airport, you make your way through security and kill time at your gate by logging onto the free airport Wi-Fi to check your email and update your social networking profiles (\u201cWaiting to board the plane. Vegas, here I come!\u201d). When it\u2019s time to get settled onto the plane, you realize your flight is Wi-Fi-equipped, so once you get the go-ahead, you pull out your laptop and listen to some music while doing some online shopping.<\/p>\n<p>By the time you get to your destination, you\u2019re desperate to get to your hotel and wash the travel funk off you. Once you\u2019ve checked into your room, you connect to the hotel\u2019s WiFi so you can check your email, and you also pull up your social networking accounts one last time to post an update (\u201cArrived in Vegas! So excited!\u201d). Then you shower, change, and spend the night out on the town.<\/p>\n<p>In the time it took for you to travel to your destination, you accessed a public WiFi network four times. How many hundreds of people were on those same public networks every time you logged on? If you&#8217;re not protected, anyone on that same network can easily eavesdrop on what you\u2019re doing and gain access to your account or your machine itself. They could access any of the data on your machine or snarf your login credentials for any site you visited that wasn\u2019t encrypted.<\/p>\n<p>This security breach could put you and your friends (through the information in your address book or your social networking profile) at risk for identity theft. That\u2019s why when you\u2019re in public, you need the highest level of protection \u2013 particularly from people within that same, local network.<\/p>\n<h3>Firewall Protection When You\u2019re at Work<\/h3>\n<p>When you\u2019re at work, you will have a lot of co-workers and colleagues on the same network. Those people are more trusted, and you may need to share certain files or folders with them. But there is still an additional layer of risk, as networks are big places and you might not know the guys in the Design department or the company next door to yours. Plus, businesses are popular targets for data theft and other cybercrime.<\/p>\n<p>In this case, let\u2019s say you have a big deadline for that year-end financial report. You need help from a couple of your co-workers to get all the data you need. But this isn\u2019t something you want people in other departments (or guests to the network) to be able to see, especially before it\u2019s time for you to present the data to your boss. Because businesses are always a tempting target for information theft, you need extra protection both from your local network and outside attacks from the Internet.<\/p>\n<p>You need to be able to choose whether to allow traffic within your local network, like your co-workers, without letting in people who don\u2019t need (or really shouldn\u2019t have) access to your files.<\/p>\n<p>You may also have things on your machine you would like to block when you\u2019re at work. Some games and chat programs can try to log you in automatically, which can be embarrassing if a chat message pops up when you\u2019re in the middle of presenting the results of that financial report.<\/p>\n<p>You can block these applications from connecting to the Internet while you\u2019re at work and save yourself having to remember to turn them off every weekday morning. With the work profile, you get a different level of protection, both locally and on the Internet, to meet your specific needs.<\/p>\n<h3>Firewall Protection When You\u2019re at Home<\/h3>\n<p>When you&#8217;re at home, you likely trust the people on your network since they&#8217;re probably family members. And as home-time is often play-time, you won\u2019t want as many restrictions on what traffic can come and go to the Internet.<\/p>\n<p>Say Grandma is visiting and you want to share pictures of the kids. You can easily allow her to share your picture directory. And you can unwind with a bit of Angry Birds therapy after work.<\/p>\n<p>This level is the most trusted and won\u2019t get in your way when it comes to doing the things you enjoy. But it will still protect you and your family from predators on the Internet that try to steal your data or use your computer for nefarious purposes. Your home network won\u2019t allow hackers who view the typical home user as easy pickings for data theft to enter your computer undetected or uninvited.<\/p>\n<h3>Firewalls are Your Friend<\/h3>\n<p>One of the best things about software firewalls, aside from their portability, is their ability to view the network activity at the level of the different applications trying to connect within your network or to the Internet.<\/p>\n<p>At every level, <a href=\"https:\/\/www.intego.com\/virusbarrier#\/net-barrier-2013\">NetBarrier<\/a> will prompt you whenever it finds a new program trying to connect from your machine to make sure this is something you want running on your machine. If it\u2019s something you did not mean to run (such as malware), you can block it outright. If it\u2019s something you chose to run, you can decide whether you only want it to connect while you\u2019re at home or if you would also like to use this program at work or in public.<\/p>\n<p>You can also use this ability to view the traffic at the application level, to choose when and where certain programs can connect to the Internet. For instance, say you\u2019re trying to view your friend\u2019s skiing video on Facebook and it\u2019s moving so slowly you might as well be watching the movement of glaciers. By checking which applications are also taking up bandwidth, you can choose to temporarily stop them and get that download moving at a more reasonable pace.<\/p>\n<p>All in all, firewalls are a great way to filter the traffic coming into and out of your machine and to help protect you against the unknown. Combined with other security tools, like <a href=\"https:\/\/www.intego.com\/virusbarrier\">anti-malware<\/a> to help protect you against suspicious and known malicious behavior, you can greatly decrease the possibility of cybercriminals being able to access your machine.<\/p>\n<p><strong>Further Reading:<\/strong><\/p>\n<ul>\n<li><a title=\"What\u2019s the Difference Between Incoming and Outgoing Firewall Protection?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-incoming-and-outgoing-firewall-protection\/\" target=\"_blank\">What&#8217;s the Difference Between Incoming and Outgoing Firewall Protection?<\/a><\/li>\n<li><a title=\"Why You Need an Outbound Firewall\" href=\"https:\/\/www.intego.com\/mac-security-blog\/why-you-need-an-outbound-firewall\/\" target=\"_blank\">Why You Need an Outbound Firewall<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>You\u2019ll often hear, when a security wonk recommends layered security, that you should be using a \u201chardware or software firewall.\u201d What\u2019s the difference? How or why would you choose one over the other? The truth is, many people have both in their networks. Each performs a slightly different function, and both offer slightly different types [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":10443,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,11],"tags":[283],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"You\u2019ll often hear, when a security wonk recommends layered security, that you should be using a \u201chardware or software firewall.\u201d What\u2019s the difference?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What&#039;s the Difference Between a Hardware and Software Firewall? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"You\u2019ll often hear, when a security wonk recommends layered security, that you should be using a \u201chardware or software firewall.\u201d What\u2019s the difference?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-12T15:10:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-03-26T22:37:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Hardware-software-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Hardware-software-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Hardware-software-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/\",\"name\":\"What's the Difference Between a Hardware and Software Firewall? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#primaryimage\"},\"datePublished\":\"2013-03-12T15:10:18+00:00\",\"dateModified\":\"2015-03-26T22:37:38+00:00\",\"description\":\"You\\u2019ll often hear, when a security wonk recommends layered security, that you should be using a \\u201chardware or software firewall.\\u201d What\\u2019s the difference?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What&#8217;s the Difference Between a Hardware and Software Firewall?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"What&#8217;s the Difference Between a Hardware and Software Firewall?\",\"datePublished\":\"2013-03-12T15:10:18+00:00\",\"dateModified\":\"2015-03-26T22:37:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#webpage\"},\"wordCount\":1598,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Hardware-software-thumb.jpg\",\"keywords\":[\"Firewall\"],\"articleSection\":[\"Recommended\",\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"You\u2019ll often hear, when a security wonk recommends layered security, that you should be using a \u201chardware or software firewall.\u201d What\u2019s the difference?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/","og_locale":"en_US","og_type":"article","og_title":"What's the Difference Between a Hardware and Software Firewall? - The Mac Security Blog","og_description":"You\u2019ll often hear, when a security wonk recommends layered security, that you should be using a \u201chardware or software firewall.\u201d What\u2019s the difference?","og_url":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-03-12T15:10:18+00:00","article_modified_time":"2015-03-26T22:37:38+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Hardware-software-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Hardware-software-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Hardware-software-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/","name":"What's the Difference Between a Hardware and Software Firewall? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#primaryimage"},"datePublished":"2013-03-12T15:10:18+00:00","dateModified":"2015-03-26T22:37:38+00:00","description":"You\u2019ll often hear, when a security wonk recommends layered security, that you should be using a \u201chardware or software firewall.\u201d What\u2019s the difference?","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What&#8217;s the Difference Between a Hardware and Software Firewall?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"What&#8217;s the Difference Between a Hardware and Software Firewall?","datePublished":"2013-03-12T15:10:18+00:00","dateModified":"2015-03-26T22:37:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#webpage"},"wordCount":1598,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Hardware-software-thumb.jpg","keywords":["Firewall"],"articleSection":["Recommended","Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-a-hardware-and-software-firewall\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/Hardware-software-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2DR","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10159"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=10159"}],"version-history":[{"count":14,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10159\/revisions"}],"predecessor-version":[{"id":39217,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10159\/revisions\/39217"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/10443"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=10159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=10159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=10159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}