Disclosure:
Professional Reviews

vpnMentor contains reviews that are written by our community reviewers, and are based on the reviewers' independent and professional examination of the products/services.

• Ownership

vpnMentor is owned by Kape Technologies PLC, which owns the following products: ExpressVPN, CyberGhost, ZenMate, Private Internet Access, and Intego, which may be reviewed on this website.

• Affiliate Commissions

While vpnMentor may receive commissions when a purchase is made using our links, this has no influence on the reviews content or on the reviewed products/services. We provide direct links to purchase products that are part of affiliate programs.

• Reviews Guidelines

The reviews published on vpnMentor are written by experts that examine the products according to our strict reviewing standards. Such standards ensure that each review is based on the independent, professional and honest examination of the reviewer, and takes into account the technical capabilities and qualities of the product together with its commercial value for users, which may also affect the product's ranking on the website.

In my discussion with Peter Martini, the President of iboss, he outlines the current trends driving the secure web gateway market, and security software in general. He also outlines several approaches taken by traditional secure web  gateway providers and explains why they fall short and cannot scale to meet the increasing demands of today’s cor...
iboss  – A Single Secure Web Gateway Platform in the Cloud
Despite all of the technologies and efforts invested in protecting an organization’s network, the reality is that there will ultimately be some malware or hacker that breaches the security of the network. When (not if) that occurs, how vulnerable are your applications and the data they process? In my interview with Rusty Carter, Vice Presiden...
Arxan – Protecting Your Applications at Every Level
Carl Herberger has gone from protecting his country on the battlefield to protecting his customers in cyberspace. As the Vice President of Security Solutions at Radware, Carl is very committed and passionate about security and that comes through very clearly in our interview. In our discussion, Carl provides an overview of all of Radware’s pr...
Radware – Staying Ahead of the Bad Guys
While many people have heard of Bitcoins or cryptocurrency, far fewer people are familiar with the underlying technology called “blockchain.” However, blockchain and systems based on them are starting to get more and more attention – and not just for digital currencies. Peter Kirby, the Chief Executive Officer and Co-Founder of Factom, explai...
Factom – Using Blockchain to Help the Mortgage Industry
The IEEE is the world's largest technical professional organization for the advancement of technology and its Computer Society is the largest society within the IEEE. The fields of interest of its members cover all major areas of computing and information technology, including computer hardware, software, multimedia, IT, security, networking, mo...
IEEE Computer Society – It is Not Just About the Technology
More and more companies today are subject to strict compliance and regulatory requirement regarding much of the data that they store in their system. In general, data privacy is becoming a greater concern for most enterprises. Cliff White, the CTO of Accellion explains how his company’s kiteworks platform secures these documents, while at the sa...
Accellion – Securing and Sharing Your Documents Wherever They May Be
Carsten Willems, the CEO & co-founder of VMRay, has been developing malware detection sandboxes for many years. During that time, he has seen many different approaches, each with their inherent flaws or limitations. However, his latest VMRay Analyzer uses an agentless hypervisor approach that is both fast and very difficult to be evaded by m...
VMRay – The Hypervisor-Based Sandbox That Cannot be Detected
While there is no question in anyone’s mind that companies must provide increased amount of security training to their employees, it is not always obvious what is the best way to do that. In this interview, Kurt Wescoe, the Chief Architect at Wombat Security Technologies, explains his company’s specific approach to security training. Their metho...
Wombat Security Technologies – Security Training to Change Behavior
BeyondTrust is convinced that the greatest cause of enterprise data breaches is the fact that users abuse the privileged level of access permission given to them, i.e. admin or root access. Sometimes this abuse is malicious and sometimes it is accidental – but it is always a bad thing. The BeyondTrust platform and tools address what is known as ...
BeyondTrust – Making Sure Users Don’t Abuse Their Privileged Access Permissions
As Ameesh Divatia, the co-Founder and CEO of Baffle, likes to say, we need to accept that data breaches are a fact of computing life today. However, his company’s goal is to make these breaches irrelevant by efficiently encrypting data wherever it may be, so that even if there is a security breach, the data will be unavailable and unusable. A...
Baffle – Protecting Your Databases From Breaches