Disclosure:
Affiliate Commissions

While vpnMentor may receive commissions when a purchase is made using our links, this has no influence on the reviews content or on the reviewed products/services. We provide direct links to purchase products that are part of affiliate programs.

• Ownership

vpnMentor is owned by Kape Technologies PLC, which owns the following products: CyberGhost, ZenMate, Private Internet Access, and Intego, which may be reviewed on this website.

• Professional Reviews

vpnMentor contains reviews that are written by our community reviewers, and are based on the reviewers' independent and professional examination of the products/services.

• Reviews Guidelines

The reviews published on vpnMentor are written by experts that examine the products according to our strict reviewing standards. Such standards ensure that each review is based on the independent, professional and honest examination of the reviewer, and takes into account the technical capabilities and qualities of the product together with its commercial value for users, which may also affect the product's ranking on the website.

Despite all of the technologies and efforts invested in protecting an organization’s network, the reality is that there will ultimately be some malware or hacker that breaches the security of the network. When (not if) that occurs, how vulnerable are your applications and the data they process? In my interview with Rusty Carter, Vice President...
Do we really need yet another enterprise threat detection system? If you are in the healthcare field, the answer is a resounding yes! In this interview, Protenus co-founder and President Robert Lord outlines very clearly how the security and privacy needs of electronic health records are very different from traditional enterprise security issues. Moreover, the...
In my discussion with Peter Martini, the President of iboss, he outlines the current trends driving the secure web gateway market, and security software in general. He also outlines several approaches taken by traditional secure web  gateway providers and explains why they fall short and cannot scale to meet the increasing demands of today’s corporate...
Most efforts at security today focus on keeping out the “bad guys” and building strong walls to prevent attackers from getting within reach of sensitive corporate assets. However, what happens if attackers do manage to break through the various barriers? What if the attackers are already legitimately inside the corporate rings of defense? Most security...
The security products offered by GamaSec are so good, they convinced a leading insurance company to offer an insurance policy against data breaches along with GamaSec products.  This is something of which Avi Bartov, co-founder and CEO of GamaSec is particularly proud. He is also proud to be providing affordable, but top-quality security products to...
The vast majority of our confidential information today is stored in emails and in documents. That is why GigaTrust is dedicated to making it both easy and safe to share these documents. Their GigaCloud collaboration platform not only encrypts emails/documents at rest and in transit, but also provides in use protection by manually or automatically...
As soon as I started speaking with Ori Eisen, the founder and CEO of Trusona, I felt a surge of energy in the room. I quickly discovered the reasons for that energy: (1) Ori is a naturally enthusiastic guy,  (2) Ori is extremely passionate about eliminating the use of passwords, and (3) we were speaking...
Most of us are too busy having fun on social media to recognize the many dangers that lurk there. We have gotten into the habit of sharing everything, which could easily lead to significant information falling into the wrong hands. This is true both for our personal information as well as for confidential company information....
Let’s be honest – how many of us think about security risks as we race into a coffee shop to check our email or the latest sports scores? Unfortunately, there are a lot of bad guys out there who know the answer to that question. They are waiting to take advantage of the situation and...
“As the age of the workforce drops, employees expect all work-related functions and corporate information to be available on their phones or other mobile devices.” Perhaps more than anything else, this statement sums up the current state of corporate mobile computing today. However, as Mark Lorion, President and General Manager of Apperian, tells us, many...