Disclosure:
Professional Reviews

vpnMentor contains reviews that are written by our community reviewers, and are based on the reviewers' independent and professional examination of the products/services.

• Ownership

vpnMentor is owned by Kape Technologies PLC, which owns the following products: CyberGhost, ZenMate, Private Internet Access, and Intego, which may be reviewed on this website.

• Affiliate Commissions

While vpnMentor may receive commissions when a purchase is made using our links, this has no influence on the reviews content or on the reviewed products/services. We provide direct links to purchase products that are part of affiliate programs.

• Reviews Guidelines

The reviews published on vpnMentor are written by experts that examine the products according to our strict reviewing standards. Such standards ensure that each review is based on the independent, professional and honest examination of the reviewer, and takes into account the technical capabilities and qualities of the product together with its commercial value for users, which may also affect the product's ranking on the website.

Leon Schumacher, the Co-Founder and CEO of pretty Easy privacy, is extremely focused on one – and only one – goal. He wants to make email privacy simple to deploy for companies and individuals. He is convinced that by doing so, the current adoption of email encryption will rise significantly from its current (“ridiculously low”) rate of 0%-2%. ...
pretty Easy privacy – Effective Email Privacy That is Easy to Deploy
What started as a university research project has evolved into a leading commercial product for Chris Kruegel, the co-founder and Chief Executive Officer of Lastline. Alternating between academia and industry, Chris has enhanced and evolved his original malware detection sandbox and engine into a full-fledged enterprise breach protection platfor...
Lastline – Keeping Everyone Safe in a Bigger Sandbox
When most people hear the word “forensics” they think of police investigations and TV shows like CSI and Law and Order.  However, in the rapidly expanding world of computer security, digital forensics is playing an ever-increasingly important role alongside security intelligence gathering. Ondrej Krehel founded LIFARS in 2013, after spending ...
LIFARS – Proactive and Reactive Cybersecurity Solution
There is no doubt that user identity, authentication, and authorization is becoming increasingly critical to application development today. Most developers still implement these functions by building them from scratch or using very primitive identity frameworks. Matias Woloski, the CTO & Co-founder of Auth0, wants to make it much simpler to ...
Auth0 – Making it Easy to Implement Identity Features
Just about every enterprise and organization today has in place a large assortment of security devices, software, and procedures to respond to security threats. What they are often lacking, however, is enough trained security personnel to execute the necessary actions. What they are really lacking is time – and when it comes to responding to sec...
Phantom – Automating Threat Response Across Devices and Applications
The idea of biometric identification replacing passwords as the standard method of identifying users has moved from a future technology in movies to common usage in our daily lives. Once Apple introduced fingerprint sensing in the iPhone 5S, biometric sensing entered the mainstream and is now utilized daily by millions of mobile device users. ...
VKANSEE – High-Resolution Fingerprint Sensors
It is no secret that the use of open source software components is growing at a very rapid pace. This is true for both young startup companies as well as established enterprise developers. The developers that incorporate these open source components need to somehow stay on top of the many licensing issues and security vulnerabilities of these co...
Black Duck Software – Managing and Securing  Your Open Source Software
The story of BankVault is a story of pivots. What started as a supercomputing project to create self-evolving IT infrastructure, went through a pivot that resulted in a new type of cyber technology.  It initially targeted SMB’s (Small and Medium Businesses) to stop bank account takeovers by cyber criminals but it has now broadened its focus solv...
BankVault.com – You Can’t Hack Something That Doesn’t Exist
Lior Samuelson has been around technology and businesses for many years, but he is particularly passionate about making the Internet a safer place for users – especially those who seek better security and those on the move with their mobile devices.  Lior is the CEO and Chairman of Cyren, a leading provider of cloud-based security solutions. ...
Cyren – Taking Internet Security to the Cloud
When a user visits your company’s website to make a purchase or to apply for an account, how do you know that they are in fact who they claim to be? Are they using a stolen identity or spoofing an existing one? Just about every business today needs to ask these questions, in order to avoid monetary (or other) losses due to identity fraud. Ted...
ThreatMetrix – A Global Identity Network of Users, Machines, and Behaviors