Disclosure:
Professional Reviews

vpnMentor contains reviews that are written by our community reviewers, and are based on the reviewers' independent and professional examination of the products/services.

• Ownership

vpnMentor is owned by Kape Technologies PLC, which owns the following products: CyberGhost, ZenMate, Private Internet Access, and Intego, which may be reviewed on this website.

• Affiliate Commissions

While vpnMentor may receive commissions when a purchase is made using our links, this has no influence on the reviews content or on the reviewed products/services. We provide direct links to purchase products that are part of affiliate programs.

• Reviews Guidelines

The reviews published on vpnMentor are written by experts that examine the products according to our strict reviewing standards. Such standards ensure that each review is based on the independent, professional and honest examination of the reviewer, and takes into account the technical capabilities and qualities of the product together with its commercial value for users, which may also affect the product's ranking on the website.

The security threats faced by small and mid-sized organizations are no different from those faced by much larger organizations. However, smaller organizations have proportionately smaller security budgets for technology and expert security staff making it very challenging. That is why turning to a proven managed security services provider (MSSP) becomes an attractive option. In my...
A Website Application Firewall (WAF) works as a layer of protection between a website application and the visitors browsing the website. Application firewalls go beyond the metadata of the packets transferred at the network level, focusing on the data that is being transferred. WAFs were created to understand the type of data allowed for each...
As Magnus Malmström, vice president of products at Nexus Group tells us, Nexus is an established European security company that underwent a significant “makeover” a year ago. They now focus on providing total security solutions – both hardware and software – to meet today’s current and emerging security requirements.  This includes empowering the modern workforce...
Although is not yet a household name, it may very well become one very soon. In my discussion with Paul Barnes, Senior Director of Product Strategy at Webroot, I learned that Webroot is the current leader in both retail sales share in the US and has the highest Net Promoter score for security software. Webroot...
No matter how technically savvy one might be, we still come across terms that we don’t know or are not sure we completely understand. Simply doing a Google search for the term can return an overwhelming amount of information, not all of which is 100% accurate. Furthermore, many of the popular definitions that are returned...
“As the age of the workforce drops, employees expect all work-related functions and corporate information to be available on their phones or other mobile devices.” Perhaps more than anything else, this statement sums up the current state of corporate mobile computing today. However, as Mark Lorion, President and General Manager of Apperian, tells us, many...
Most of us are too busy having fun on social media to recognize the many dangers that lurk there. We have gotten into the habit of sharing everything, which could easily lead to significant information falling into the wrong hands. This is true both for our personal information as well as for confidential company information....
As soon as I started speaking with Ori Eisen, the founder and CEO of Trusona, I felt a surge of energy in the room. I quickly discovered the reasons for that energy: (1) Ori is a naturally enthusiastic guy,  (2) Ori is extremely passionate about eliminating the use of passwords, and (3) we were speaking...
Most efforts at security today focus on keeping out the “bad guys” and building strong walls to prevent attackers from getting within reach of sensitive corporate assets. However, what happens if attackers do manage to break through the various barriers? What if the attackers are already legitimately inside the corporate rings of defense? Most security...
Do we really need yet another enterprise threat detection system? If you are in the healthcare field, the answer is a resounding yes! In this interview, Protenus co-founder and President Robert Lord outlines very clearly how the security and privacy needs of electronic health records are very different from traditional enterprise security issues. Moreover, the...