UK FTP and HTTP performance with CyberGhost hovered just under 5MB/s (40Mbit/s). Testing endpoints in the Netherlands yielded around 7MB/s (56Mbit/s), while in the United States, we managed just 2MB/s (16Mbit/s). This is passable for standard web browsing and video streaming but could be a bottleneck if you have a fast internet connection and want to download large files while connected to your VPN. These scores are slightly slower than they were earlier in the year – remember that any speed test only provides a snapshot of a brief period of time.
Users utilize mobile virtual private networks in settings where an endpoint of the VPN is not fixed to a single IP address, but instead roams across various networks such as data networks from cellular carriers or between multiple Wi-Fi access points.[31] Mobile VPNs have been widely used in public safety, where they give law-enforcement officers access to mission-critical applications, such as computer-assisted dispatch and criminal databases, while they travel between different subnets of a mobile network.[32] Field service management and by healthcare organizations,[33][need quotation to verify] among other industries, also make use of them.
Websites using Google Analytics and various advertising networks can very well track and identify visitors based on a variety of different inputs with their browser (see browser fingerprinting). Therefore it’s best to use a VPN in conjunction with a secure browser configured for more privacy. See my guides: secure browser (an overview of different browsers) and also Firefox privacy, which deals with privacy configurations, tweaks, and add-ons.
A VPN can be described as an encrypted tunnel that shuttles your internet activity between your PC or phone and a host server. While the internet is a public space, a VPN works by extending an invisibility cloak across the user's activity and allows people to send and receive data in a mostly-anonymous manner. In the simplest terms, a VPN makes it hard for someone to track your activity.
VPNs are necessary for improving individual privacy, but there are also people for whom a VPN is essential for personal and professional safety. Some journalists and political activists rely on VPN services to circumvent government censorship and safely communicate with the outside world. Check the local laws before using a VPN in China, Russia, Turkey, or any country with with repressive internet policies.
Mobile VPNs are designed and optimized to ensure a seamless user experience when devices are switching networks or moving out of coverage. It generally has a smaller memory footprint, and because of that, it also requires less processing power than a traditional VPN. Therefore, it enables your applications to run faster while the battery pack is able to last longer.
Some users will also want to research a VPN provider’s peer-to-peer (P2P) file-sharing policies. There are VPNs that block torrents. Others turn a blind eye to them, but will sell you out in a heartbeat should you be up to no good. P2P is not our main focus here, but we will note in each review whether a particular provider allows file sharing or not.
Subscription VPN Providers usually take your privacy a bit more seriously, since you’re paying for the service. It’s unusual for them to show ads, although whether they do logging or store data about your usage varies from company to company. They usually offer free trials so you can give the service a shot first, but remember: just because you’re paying for a service doesn’t mean you shouldn’t do your homework.

As we previously noted, we don’t recommend relying on our picks to get around geographic restrictions on copyrighted content. The practice is likely illegal, and it violates the terms of service of your ISP, VPN, and content provider. On top of that, it often doesn’t work—we couldn’t access Netflix over any of the services we tried, and of the four streams we loaded on BBC iPlayer, only two worked a few days later.

A P device operates inside the provider's core network and does not directly interface to any customer endpoint. It might, for example, provide routing for many provider-operated tunnels that belong to different customers' PPVPNs. While the P device is a key part of implementing PPVPNs, it is not itself VPN-aware and does not maintain VPN state. Its principal role is allowing the service provider to scale its PPVPN offerings, for example, by acting as an aggregation point for multiple PEs. P-to-P connections, in such a role, often are high-capacity optical links between major locations of providers.
Individuals that access the internet from a computer, tablet or smartphone will benefit from using a VPN. A VPN service will always boost your security by encrypting and anonymizing all of your online activity. Therefore, both private and business users can benefit from using a VPN. Communications that happen between the VPN server and your device are encrypted, so a hacker or website spying on you wouldn't know which web pages you access. They also won't be able to see private information like passwords, usernames and bank or shopping details and so on. Anyone that wants to protect their privacy and security online should use a VPN.
IVPN excels at trust and transparency, the most important factors when you’re choosing a virtual private network. After interviewing IVPN’s CEO, we’re convinced that IVPN is dedicated to its promises not to monitor or log customer activity. But a trustworthy VPN is only as good as its connections, and in our tests IVPN was stable and fast. IVPN apps are easy to set up and use with secure OpenVPN connections on Windows, macOS, Android, iOS, plus a few other platforms. Extra features like automatic-connection rules and kill switches to block data on unsecured connections add protection and value that make it worth a slightly higher price than some competitors.
A popular VPN service, TorGuard has servers in over 50 countries and enables users to unblock websites and get around censorship. This ensures that wherever you are in the world, there is bound to be a TorGuard server near you. By default, the service enables users to make five simultaneous connections. This lets users run the service on all their devices. To better protect users, the service has a kill switch. However, this feature is not available on mobile devices. Likewise, a Domain Name System leak protection works on Windows and OS X.
With the increasing use of VPNs, many have started deploying VPN connectivity on routers for additional security and encryption of data transmission by using various cryptographic techniques.[34] Home users usually deploy VPNs on their routers to protect devices, such as smart TVs or gaming consoles, which are not supported by native VPN clients. Supported devices are not restricted to those capable of running a VPN client.[35]

IVPN excels at trust and transparency, the most important factors when you’re choosing a virtual private network. After interviewing IVPN’s CEO, we’re convinced that IVPN is dedicated to its promises not to monitor or log customer activity. But a trustworthy VPN is only as good as its connections, and in our tests IVPN was stable and fast. IVPN apps are easy to set up and use with secure OpenVPN connections on Windows, macOS, Android, iOS, plus a few other platforms. Extra features like automatic-connection rules and kill switches to block data on unsecured connections add protection and value that make it worth a slightly higher price than some competitors.
Usually, it's the free services that throttle your usage in these ways. Some paid services will offer a trial, where you can transmit up to a certain data cap before being asked to sign up as a paying customer. That's actually pretty cool, because it gives you a chance to try out the performance of their service before paying, but it also gives the vendor a chance to make the money necessary to operate the service.
When we say that in theory VPNs can’t be intercepted, that’s because VPNs are like any other form of security: if you use them on a device that’s already been compromised by malware such as keyloggers or other security threats then they can’t do their job properly. If you’re on Windows, then good quality, up to date anti-virus software isn’t a luxury. It’s absolutely essential.
In the ongoing digital transformation sweeping across IT networks, factors such as automation, visibility, and security will continue to tighten their grip on enterprise IT architecture, especially in high-traffic use cases such as campus networks. Both technology and business leaders need to find a healthy balance between offering flexible business solutions and their ability to manage … Continue Reading...
A VPN client is software that runs on your device in order to securely connect it to a VPN server. All major platforms (Windows, macOS, Android, iOS, and Linux) come with a built-in VPN client that can be configured manually, although OpenVPN always requires a third party client to be installed. Most VPN services now offer custom clients and apps, which are the easiest way to use their service as they come pre-configured with all the correct settings. They also typically offer a range of funky and useful features that are not available by simply manually configuring the built-in VPN client. To clear up any confusion, a ''VPN client'' and a ''VPN app'' are exactly the same thing. Traditionally, the word client is used for desktop software and the word app for mobile software, but it is becoming increasingly common to talk about VPN apps on the desktop. The terms are interchangeable.
My recommendation, and the protocol I most often choose to use, is OpenVPN. OpenVPN is a non-proprietary, open-source implementation of a VPN communication layer protocol. It's well-understood, well-regarded, generally quite secure, and robust. In addition, it has the benefit of being able to communicate over port 443, which is the standard port for https communication, which means almost all firewalls will allow OpenVPN traffic -- and most won't even be able to detect that a VPN is being used.
Also worth consideration is Windscribe. For your money you’ll get fast speeds, streamlined access to popular streaming services via dedicated endpoints, an unlimited number of simultaneous connections, and the ability to share your encrypted connection (if your wireless router supports this). Kaspersky Secure Connection proved to be a little faster than Windscribe and its subscription rates are a little more generous, too.
The more locations a VPN provider houses servers, the more flexible it is when you want to choose a server in a less-congested part of the world or geoshift your location. And the more servers it has at each location, the less likely they are to be slow when lots of people are using the service at the same time. Of course, limited bandwidth in and out of an area may still cause connections to lag at peak times even on the most robust networks.
Even if a company is at fault for deceptive marketing practices, it still has to comply with legal requests for whatever information it does have. Jerome told us, “In the U.S., however, there is a big difference between a request for data regularly stored for business purposes and a demand that a company retain information. VPN providers are not required to keep records just in case law enforcement might need them some day.” That means many companies could provide a list of their customers, but if they practice what they preach when it comes to no-logging policies, innocent customers looking for privacy shouldn’t get swept up in these requests.

If you download and upload content, movies, and games on a daily basis, PureVPN is a choice with notably fast downloading and uploading speeds. Compared to other VPNs that get the same speed (like Astrill), it's considerably more affordable. PureVPN has more than 500 servers spanning across 140 countries and impeccable access in China — and may be the only option available in some places. Pure VPN is also extremely accessible when it comes to devices: It's compatible with Windows, Mac, iOS, Android, Chrome, and Firefox, as well as apps for media streaming devices like Android TV, Amazon Fire TV Stick, and Kodi. So, if nothing else, it's one of the most versatile of the bunch. Though Mashable dubbed it one of the best due to its speed and how many things it can do, Reddit users insist that it is not a trustworthy choice. Multiple Redditors claim that PureVPN lies to users about not logging their information or search history when they really do. Some also believe that PureVPN uses spammers and claim that a lot of positive feedback about PureVPN on Reddit are from fake accounts. Reddit user cloudhat writes:
TorGuard’s signup and payment process is also fine but not stellar. Compared with that of IVPN, the checkout process is clunky, and using a credit or debit card requires entering more personal information than with our top pick. The easiest option for anonymous payments is a prepaid debit card bought locally. Otherwise, like most providers, TorGuard accepts a variety of cryptocurrencies, PayPal, and foreign payments through Paymentwall. That last service also allows you to submit payment through gift cards from other major retailers. We don’t think this method is worth the hassle for most people, but if you have some money on a fast-food gift card you don’t want, turning it into a VPN service is a nice option.

While you're connected to a VPN, all your network traffic passes through this protected tunnel, and no one—not even your ISP—can see your traffic until it exits the tunnel from the VPN server and enters the public internet. If you make sure to only connect to websites secured with HTTPS, your data will continue to be encrypted even after it leaves the VPN.
Many VPN services also provide their own DNS resolution system. Think of DNS as a phone book that turns a text-based URL like "pcmag.com" into a numeric IP address that computers can understand. Savvy snoops can monitor DNS requests and track your movements online. Greedy attackers can also use DNS poisoning to direct you to bogus phishing pages designed to steal your data. When you use a VPN's DNS system, it's another layer of protection.
For those who are unaware, net neutrality is the much-discussed concept that ISPs treat web services and apps equally, and not create fast lanes for companies that pay more, or require consumers to sign up for specific plans in order to access services like Netflix or Twitter. Federal net neutrality rules would ensure that the internet effectively continues to operate the way it has for its entire existence.
We didn’t audit any VPN services ourselves (though IVPN, our top pick, offered to arrange such an exercise), but we did ask detailed questions about each service’s operations as a way to judge whether a company was acting in good faith. Good faith is important, because there aren’t many avenues to penalize a VPN company that isn’t following through on its promises. In the US, companies making false claims about their products are policed by the Federal Trade Commission, and to some extent state attorneys general. Joseph Jerome at CDT told us that companies violating their own privacy policy or claims about logging would be “a textbook example of a deceptive practice under state and federal consumer protection laws,” and in theory, “the FTC could seek an injunction barring the deceptive practice as well as potentially getting restitution or other monetary relief.”
Providers can also log less-specific data about when or how often you connect to your VPN service. In some cases, these logs are a routine part of server or account management, and can be responsibly separated and scrubbed. In other cases, VPN providers take note of every connection and use that information to actively police individual customers. Though it’s reasonable for companies to protect their networks from abuse, it becomes a dealbreaker when companies keep extensive connection data for a longer period of time. Some VPN companies we spoke with explained how a log might note your current connection for authentication purposes, but that log is deleted as soon as you disconnect. This kind of “live log” isn’t a concern, and even those culled every few hours—or as long as the end of each day—shouldn’t be confused with logs of your traffic and online destinations.
Server switching is a feature -- offered by most VPN service providers -- that allows you to change what region or country you're going to connect to. Most providers allow you to switch as often as you'd like (although you usually have to disconnect, then change your configuration, and reconnect). This may be useful if you're trying to hide your location, or if you're running into some communications glitches on the server you're currently using.
NordVPN’s customer service is also quite good. They offer 24/7 live chat support directly through their website and many support guides and tutorials. Right now NordVPN is extending the 75% discount price exclusively for three-year plans. All subscriptions come with a 30 day money-back guarantee, allowing you to try the service risk free. [Learn more >]
Downloading Files: Yes, let’s be honest – many people use VPN connections to download files via BitTorrent. This can actually be useful even if you’re downloading completely legal torrents – if your ISP is throttling BitTorrent and making it extremely slow, you can use BitTorrent on a VPN to get faster speeds. The same is true for other types of traffic your ISP might interfere with (unless they interfere with VPN traffic itself.)
Early data networks allowed VPN-style connections to remote sites through dial-up modem or through leased line connections utilizing Frame Relay and Asynchronous Transfer Mode (ATM) virtual circuits, provided through networks owned and operated by telecommunication carriers. These networks are not considered true VPNs because they passively secure the data being transmitted by the creation of logical data streams.[3] They have been replaced by VPNs based on IP and IP/Multi-protocol Label Switching (MPLS) Networks, due to significant cost-reductions and increased bandwidth[4] provided by new technologies such as digital subscriber line (DSL)[5] and fiber-optic networks.
×