How MSPs can strengthen security through firewall modernisation

By Sam Manjarres, Director of Product Marketing at WatchGuard Technologies.

  • Friday, 13th March 2026 Posted 1 hour ago in by Sophie Milburn

One of the most persistent and underestimated sources of cybersecurity risk is from network devices that have reached end of life (EOL). We often see organisations that have continued to rely on these years after vendor support and security updates have ended. This leaves them with an expanding attack surface that adversaries increasingly know how to exploit.

A significant portion of breaches can be traced back to outdated firewalls and network infrastructure, because unpatched firmware and legacy architectures make compromise far easier than most organisations realise.

For managed service providers (MSPs), this calls for more than tactical upgrades. It is an opportunity to guide clients toward a more resilient and future-proof security posture. EOL devices should not be viewed just as aging hardware. They fundamentally affect an organisation’s ability to prevent, detect and respond to threats.

Replacing a firewall is often seen as a routine refresh. However, when a device reaches EOL, the main issue is not its age; it is its inability to support today’s networks. Encrypted traffic now dominates network activity; users work across on-premises, remote and cloud environments; applications are distributed; and threats change and move quickly with speed and precision.

Legacy firewalls are typically not able to inspect encrypted traffic at scale without degrading performance. They struggle to enforce consistent policies across diverse user locations, operate with limited visibility and are unable to properly integrate with endpoint, identity and network telemetry. Under these conditions, the device is an ineffective control point. And it is a predictable, and well-understood target for attackers.

Recognising this helps MSPs shift the conversation so that modernisation becomes more than a hardware refresh. It is about ensuring architectural integrity.

Establishing a baseline for modern security

To get it right, modernisation has to start with a comprehensive audit that extends far beyond creating a hardware inventory. There has to be an understanding of how the environment actually behaves. For example, how traffic moves, when demand spikes, where latency emerges and where legacy configurations create blind spots.

Assessing real throughput gives clarity about whether devices are performing near their limits. Examining response times under load reveals hidden bottlenecks. Reviewing concurrent connections and access patterns uncovers misalignments between infrastructure and user behaviour. And with this data, MSPs can rightsize recommendations and design infrastructures that accurately reflect operational reality.

An audit-driven approach also ensures that upgraded environments support modern requirements, without introducing new performance or security gaps. This includes secure VPNs with multi-factor authentication and the demands of hybrid work.

Upgrading to enable service expansion

Modern firewalls need to function as part of an integrated security ecosystem. They connect with secure wireless access, segmentation strategies, identity-aware controls and centralised cloud-based management.

Centralised management will reduce configuration drift and ensure that policy enforcement is consistent, even as environments scale. Automated updates close gaps that older devices routinely leave open. The ability to integrate signals from firewalls, endpoints, access points and authentication services speeds detection and response, enabling a more intelligent and unified approach to security.

We are seeing that with these capabilities, MSPs are able to reduce manual maintenance and turn their focus toward continuous improvement, threat readiness and strategic consultation. For them, firewall modernisation is a foundation for service evolution rather than a one-off upgrade.

By approaching infrastructure refresh with a strategic lens, MSPs unlock capabilities that legacy devices simply cannot support. Modern environments allow for a wider range of advanced threat detection capabilities and broader coverage in areas such as intrusion prevention and malware analysis. They provide the performance needed to inspect encrypted traffic without sacrificing user experience, ensuring that security remains strong even under heavy load.

Remote access also becomes more secure and resilient through improved handling of encrypted sessions and remote desktop traffic. Newer platforms benefit from firmware improvements and new security functions. These enhancements improve an organisation’s defensive posture and reduce dependence on manual interventions.

Redefining the role of the MSP

Firewall modernisation gives MSPs the opportunity to expand their role. Instead of being viewed as providers who respond to failures or refresh cycles, MSPs can position themselves as architects of ongoing resilience. This involves helping clients understand risk from an architectural perspective and designing infrastructures that scale with evolving work patterns, while reducing incidents through a combination of visibility, control and operational maturity.

By doing this, MSPs strengthen their clients’ defences and lay the groundwork for offering higher-value services. The transition away from EOL infrastructure needs to be seen as part of a strategic transformation. One that shapes the future of the client’s security posture and the role of the MSP in guiding it.

Ultimately, retiring outdated hardware is a good starting point for the action needed to build better environments that are capable of evolving quickly.

 

By James Gillies, Head of Cyber Security at Logicalis UK&I.
By Penny Heyes, Chief Operating Officer and Co-Founder, and David Clarke, Chief Technology Officer...
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.
By Lorenzo Romano, CEO of GCX Managed Services
By Nadir Merchant, General Manager, IT Operations Suite, Kaseya.
Jamie Akhtar, CEO and Co-Founder of CyberSmart
By Richard Mitchell, Head of Channel, ThreatAware