A security product that protects resources on one network from intruders from other networks by restricting network traffic flows. They are often separate devices that sit on your computer network, but can be software that exists on another computer (such as on a laptop).