Skip to content
FIREGATE™
  • Home
  • ProductsExpand
    • Firegate Home
    • Firegate Home Virgin
    • Firegate Pro
    • Firegate Pro Virgin
    • Firegate Business
    • Firegate Business Virgin
  • SupportExpand
    • Register Product
    • Video Library
    • FAQ
    • DocumentationExpand
      • Firegate Overview
      • Getting Started
      • Installation Guide
      • Security Architecture
      • VPN & Access Model
      • Updates & Maintenance
      • Troubleshooting
  • Contact
  • 0
FIREGATE™DEATCH

Getting Started

  • How Firegate Works

Network Protection

  • Firegate Real-Time Threat Detection Dashboard
  • The Ultimate Perimeter for Home Offices and Elite Gamers
  • Enterprise Power for the Modern Edge
  • Business-Grade Network Protection
  • Complete Cyber Protection for Your Business
  • Cyber Protection for Vulnerable Users
  • Zero Trust by Design
  • Total Home Cyber Protection
  • Network-Level Malware Behaviour Detection
  • No Cloud. No Data Collection.
  • Keeps Unsafe Websites Out
  • Ad & Tracker Blocking
  • A Cleaner Network Feels Faster

Firegate for Me?

  • Firegate for Law Firms, Dental Practices & Sensitive Data Holders
  • Firegate Business for Public Wi-Fi Providers
  • Firegate for Small Offices
  • Firegate for Large Families & Smart Homes
  • Firegate-Pro for Gamers
  • Firegate for Home Office Professionals
  • Security-Aware, Non-Technical Users
  • Public Wi-Fi and Customer Networks
  • Elderly and Vulnerable Users
  • The Ultimate Perimeter for Home Offices and Elite Gamers
  • Small Offices, Medical Clinics, Law Firms, and Professional Services
  • Families with Children and Connected Households
View Categories
  • Home
  • Help Centre
  • Network Protection
  • Firegate Real-Time Threat Detection Dashboard

Firegate Real-Time Threat Detection Dashboard

3 min read

Firegate Real-Time Threat Detection Dashboard #

The Firegate Security Box continuously monitors network traffic and protects devices by blocking malicious activity before it reaches the internal network. The dashboard shown above provides a real-time overview of how Firegate detects threats, drops malicious traffic, and monitors overall network activity.

This telemetry demonstrates how Firegate operates as an inline security gateway positioned between the modem and router. By analysing all incoming and outgoing traffic, Firegate can detect suspicious behaviour and prevent attackers from interacting with devices inside the network.


Threats Detected by Firegate #

The large red panel labelled “Threats Detected by Firegate” displays the total number of malicious probes detected during the monitoring period. In the example shown, Firegate identified 65 threat events targeting the network.

These events often originate from automated internet scanners, botnets, or malicious systems attempting to discover vulnerable devices. Such probes are extremely common on the public internet and may attempt to exploit open ports, weak services, or misconfigured network devices.

Because Firegate operates inline at the network edge, these threats are detected immediately and handled before they reach internal systems.


Dropped Threat Activity #

The “Firegate Dropped Threats” graph shows how many malicious packets or connection attempts were blocked over time. When Firegate’s intrusion prevention engine detects suspicious traffic, the system immediately drops the connection.

This ensures that malicious actors cannot establish communication with devices inside the network. The graph provides a clear visual representation of how frequently these blocked attempts occur and how attack activity fluctuates throughout the day.


Threat Detection Rate #

The “Firegate Threat Rate” panel displays how frequently threats are being detected during the monitoring window. This metric highlights the constant background noise of automated attacks that occur across the internet.

Even residential or small business networks are regularly targeted by scanning tools looking for vulnerable systems. Firegate continuously analyses this activity and identifies malicious behaviour in real time.


Network Activity Monitoring #

The “Firegate Network Activity” graph shows the volume and pattern of network traffic passing through the Firegate system. Monitoring traffic patterns helps identify abnormal behaviour that may indicate compromised devices, unusual connections, or potential security incidents.

Understanding normal network activity is important because deviations from this baseline can signal suspicious behaviour that requires further investigation.


Intrusion Prevention System (IPS) #

Firegate uses an enterprise-grade Intrusion Prevention System (IPS) powered by the Suricata detection engine. This system analyses network packets and evaluates them against thousands of known attack signatures and behavioural detection rules.

When suspicious activity is identified, Firegate automatically blocks the traffic and records the event in the system logs. This automated response allows Firegate to stop threats without requiring manual configuration or intervention.


Automated Protection at the Network Edge #

Firegate is designed to bring enterprise-level network protection to homes, remote workers, and small businesses. Once installed between the modem and router, the system begins analysing traffic immediately.

Protection operates automatically in the background, continuously monitoring network activity and blocking malicious traffic before it reaches internal devices.

The dashboard provides visibility into how Firegate actively defends the network perimeter against the constant stream of threats present on the modern internet.

Updated on 17 March 2026

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest

Powered by BetterDocs

Table of Contents
  • Firegate Real-Time Threat Detection Dashboard
    • Threats Detected by Firegate
    • Dropped Threat Activity
    • Threat Detection Rate
    • Network Activity Monitoring
    • Intrusion Prevention System (IPS)
    • Automated Protection at the Network Edge

QuantumSabre Ltd.

Firegate Cybersecurity System

31 Leigh Common
Welwyn Garden City
AL7 4NL, United Kingdom

Legal & Registration

Company No: 15099899
VAT No: GB 483779726
CE & UKCA Compliant
© 2025 QuantumSabre Ltd.

Connect

  • Facebook
  • TikTok
  • YouTube
  • Email Support

Company

About Us Contact Us Terms of Service Privacy Policy Refund & Warranty Cookie Policy
Products Firegate Home Firegate Home Virgin Firegate Pro Firegate Pro Virgin Firegate Business

© 2026 FIREGATE

Review My Order

0

Subtotal

Taxes & shipping calculated at checkout

Checkout
  • Home
  • Products
    • Firegate Home
    • Firegate Home Virgin
    • Firegate Pro
    • Firegate Pro Virgin
    • Firegate Business
    • Firegate Business Virgin
  • Support
    • Register Product
    • Video Library
    • FAQ
    • Documentation
      • Firegate Overview
      • Getting Started
      • Installation Guide
      • Security Architecture
      • VPN & Access Model
      • Updates & Maintenance
      • Troubleshooting
  • Contact
  • 0

Notifications

Search