Disclosure:
Professional Reviews

vpnMentor contains reviews that are written by our community reviewers, and are based on the reviewers' independent and professional examination of the products/services.

• Ownership

vpnMentor is owned by Kape Technologies PLC, which owns the following products: ExpressVPN, CyberGhost, ZenMate, Private Internet Access, and Intego, which may be reviewed on this website.

• Affiliate Commissions

vpnMentor contains reviews that were written by our experts and follow the strict reviewing standards, including ethical standards, that we have adopted. Such standards require that each review will be based on an independent, honest and professional examination of the reviewer. That being said, we may earn a commission when a user completes an action using our links, which will however not affect the review but might affect the rankings. The latter are determined on the basis of customer satisfaction of previous sales and compensation received.

• Reviews Guidelines

The reviews published on vpnMentor are written by experts that examine the products according to our strict reviewing standards. Such standards ensure that each review is based on the independent, professional and honest examination of the reviewer, and takes into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings we publish may take into consideration the affiliate commissions we earn for purchases through links on our website.

Despite all of the technologies and efforts invested in protecting an organization’s network, the reality is that there will ultimately be some malware or hacker that breaches the security of the network. When (not if) that occurs, how vulnerable are your applications and the data they process? In my interview with Rusty Carter, Vice Presiden...
Arxan – Protecting Your Applications at Every Level
Carl Herberger has gone from protecting his country on the battlefield to protecting his customers in cyberspace. As the Vice President of Security Solutions at Radware, Carl is very committed and passionate about security and that comes through very clearly in our interview. In our discussion, Carl provides an overview of all of Radware’s pr...
Radware – Staying Ahead of the Bad Guys
While many people have heard of Bitcoins or cryptocurrency, far fewer people are familiar with the underlying technology called “blockchain.” However, blockchain and systems based on them are starting to get more and more attention – and not just for digital currencies. Peter Kirby, the Chief Executive Officer and Co-Founder of Factom, explai...
Factom – Using Blockchain to Help the Mortgage Industry
The IEEE is the world's largest technical professional organization for the advancement of technology and its Computer Society is the largest society within the IEEE. The fields of interest of its members cover all major areas of computing and information technology, including computer hardware, software, multimedia, IT, security, networking, mo...
IEEE Computer Society – It is Not Just About the Technology
More and more companies today are subject to strict compliance and regulatory requirement regarding much of the data that they store in their system. In general, data privacy is becoming a greater concern for most enterprises. Cliff White, the CTO of Accellion explains how his company’s kiteworks platform secures these documents, while at the sa...
Accellion – Securing and Sharing Your Documents Wherever They May Be
Carsten Willems, the CEO & co-founder of VMRay, has been developing malware detection sandboxes for many years. During that time, he has seen many different approaches, each with their inherent flaws or limitations. However, his latest VMRay Analyzer uses an agentless hypervisor approach that is both fast and very difficult to be evaded by m...
VMRay – The Hypervisor-Based Sandbox That Cannot be Detected
While there is no question in anyone’s mind that companies must provide increased amount of security training to their employees, it is not always obvious what is the best way to do that. In this interview, Kurt Wescoe, the Chief Architect at Wombat Security Technologies, explains his company’s specific approach to security training. Their metho...
Wombat Security Technologies – Security Training to Change Behavior
BeyondTrust is convinced that the greatest cause of enterprise data breaches is the fact that users abuse the privileged level of access permission given to them, i.e. admin or root access. Sometimes this abuse is malicious and sometimes it is accidental – but it is always a bad thing. The BeyondTrust platform and tools address what is known as ...
BeyondTrust – Making Sure Users Don’t Abuse Their Privileged Access Permissions
As Ameesh Divatia, the co-Founder and CEO of Baffle, likes to say, we need to accept that data breaches are a fact of computing life today. However, his company’s goal is to make these breaches irrelevant by efficiently encrypting data wherever it may be, so that even if there is a security breach, the data will be unavailable and unusable. A...
Baffle – Protecting Your Databases From Breaches
Did you know that the revenues of the online computer gaming industry are larger than that of the Hollywood and music industries combined? With that much money at stake, it is not the least bit surprising that online games are the targets of many, many sophisticated attacks and attempts at fraud. As Matthew Cook, Co-Founder Product Developmen...
Panopticon Labs – Making Online Gaming Safe and Fun