Security in the IoT era

By 2020, the average home will have more than 35 connected devices.1 SRM secures your perimeter at the router level and shields the whole network against cyber attacks.

Threat Prevention

Utilizing business-grade intrusion prevention technology, this package inspects the incoming and outgoing traffic of your network and blocks malicious packets from passing through. 2

Identify the weakest links

See which devices in your network have triggered high-severity events. You can then decide whether they need a virus scan or should be temporarily blocked from the Internet.

Review recent trends & statistics

A summary of the security events that occurred in the past 7 or 30 days lets you understand which regions or IPs the attacks came from the most.

Define your own security policies

Review signatures and tweak the corresponding actions for your environment. You can also white-list specific IPs in case of false alarms.

Enjoy stellar performance

Intelligently designed to make threat detection more efficient, Threat Prevention allows you to enjoy a high level of security with minimal impact to Internet speeds.

DNS & IP threat intelligence

SRM’s Safe Access package leverages several databases to block domain names and IPs identified as related to dangerous websites, malware, Internet attacks, phishing, and more. At the same time, it provides you with detailed logs on the user or device that attempted to access them.

Google Safe Browsing

A service that has been keeping over three billion devices safer, Google Safe Browsing is now integrated into every Synology Router. This extends its protection against malware, unwanted software, and social engineering to all types of devices and platforms in your network. 3

Stay protected

With a track record of averaging 1.2 software updates per month and 5.6 CVE fixes per update, Synology helps you ensure that your router is always properly equipped to confront emerging threats. Other security mechanisms implemented include:

Dual-stack firewall

Support for a dual-stack (IPv4/IPv6) firewall enables businesses to secure their network when gradually transitioning to IPv6. Tools such as Geo-IP blocking also allows them to quickly set up firewall policies based on their specific requirements.

Auto-block & two-factor authentication

Automatically block an IP address after repeated unsuccessful login attempts. Two-factor authentication is available for setting up an extra layer of access security.

Automatic security database update

All security databases used in SRM, such as Threat Prevention signatures, IP filter, and Google Safe Browsing databases are updated as soon as new data become available and don’t have to rely on the updates of the entire SRM.


  1. Cisco VNI Report, Strategy Analytics.
  2. Currently available on RT2600ac and RT1900ac only. External storage is required.
  3. Google Safe Browsing is currently a beta feature on SRM.