Disclosure:
Affiliate Commissions

While vpnMentor may receive commissions when a purchase is made using our links, this has no influence on the reviews content or on the reviewed products/services. We provide direct links to purchase products that are part of affiliate programs.

• Ownership

vpnMentor is owned by Kape Technologies PLC, which owns the following products: CyberGhost, ZenMate, Private Internet Access, and Intego, which may be reviewed on this website.

• Professional Reviews

vpnMentor contains reviews that are written by our community reviewers, and are based on the reviewers' independent and professional examination of the products/services.

• Reviews Guidelines

The reviews published on vpnMentor are written by experts that examine the products according to our strict reviewing standards. Such standards ensure that each review is based on the independent, professional and honest examination of the reviewer, and takes into account the technical capabilities and qualities of the product together with its commercial value for users, which may also affect the product's ranking on the website.

The story of BankVault is a story of pivots. What started as a supercomputing project to create self-evolving IT infrastructure, went through a pivot that resulted in a new type of cyber technology.  It initially targeted SMB’s (Small and Medium Businesses) to stop bank account takeovers by cyber criminals but it has now broadened its...
BeyondTrust is convinced that the greatest cause of enterprise data breaches is the fact that users abuse the privileged level of access permission given to them, i.e. admin or root access. Sometimes this abuse is malicious and sometimes it is accidental – but it is always a bad thing. The BeyondTrust platform and tools address...
It is no secret that the use of open source software components is growing at a very rapid pace. This is true for both young startup companies as well as established enterprise developers. The developers that incorporate these open source components need to somehow stay on top of the many licensing issues and security vulnerabilities...
Lior Samuelson has been around technology and businesses for many years, but he is particularly passionate about making the Internet a safer place for users – especially those who seek better security and those on the move with their mobile devices.  Lior is the CEO and Chairman of Cyren, a leading provider of cloud-based security...
While there is no question in anyone’s mind that companies must provide increased amount of security training to their employees, it is not always obvious what is the best way to do that. In this interview, Kurt Wescoe, the Chief Architect at Wombat Security Technologies, explains his company’s specific approach to security training. Their methodology...
The idea of biometric identification replacing passwords as the standard method of identifying users has moved from a future technology in movies to common usage in our daily lives. Once Apple introduced fingerprint sensing in the iPhone 5S, biometric sensing entered the mainstream and is now utilized daily by millions of mobile device users. Jason Chaikin,...
Carsten Willems, the CEO & co-founder of VMRay, has been developing malware detection sandboxes for many years. During that time, he has seen many different approaches, each with their inherent flaws or limitations. However, his latest VMRay Analyzer uses an agentless hypervisor approach that is both fast and very difficult to be evaded by malware....
Just about every enterprise and organization today has in place a large assortment of security devices, software, and procedures to respond to security threats. What they are often lacking, however, is enough trained security personnel to execute the necessary actions. What they are really lacking is time – and when it comes to responding to...
More and more companies today are subject to strict compliance and regulatory requirement regarding much of the data that they store in their system. In general, data privacy is becoming a greater concern for most enterprises. Cliff White, the CTO of Accellion explains how his company’s kiteworks platform secures these documents, while at the same...
There is no doubt that user identity, authentication, and authorization is becoming increasingly critical to application development today. Most developers still implement these functions by building them from scratch or using very primitive identity frameworks. Matias Woloski, the CTO & Co-founder of Auth0, wants to make it much simpler to not only implement, but to...