Company Website

Ratings and Reviews 198,253 Ratings

Total
ease
features
design
support

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Media

Media

Integrations Supported

ADrive Enterprise
Alchem-e Dashboard
Azure Marketplace
CloudConnexa
Domotz
Google Authenticator
Google Workspace
IPFire
JumpCloud
Kamatera
Live Proxies
Microsoft Authenticator
Netdata
Oracle Identity Management
RapidVPN
Rublon
Skycloak
SolusIO
SpendHound
V-Key Smart Authenticator

Integrations Supported

ADrive Enterprise
Alchem-e Dashboard
Azure Marketplace
CloudConnexa
Domotz
Google Authenticator
Google Workspace
IPFire
JumpCloud
Kamatera
Live Proxies
Microsoft Authenticator
Netdata
Oracle Identity Management
RapidVPN
Rublon
Skycloak
SolusIO
SpendHound
V-Key Smart Authenticator

API Availability

Has API

API Availability

Has API

Pricing Information

Free Up to 3 Users - $11/month
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

OpenVPN

Date Founded

2001

Company Location

United States

Company Website

openvpn.net

Company Facts

Organization Name

NCP engineering

Date Founded

1987

Company Location

Germany

Company Website

www.ncp-e.com/en/

Categories and Features

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Proxy Servers

Anonymous
Automatic IP Rotation
Data Center Proxies
Geo-Targeting
Mobile Proxies
Reporting / Analytics
Residential Proxies
SSL
Whitelisted IPs

VPN

Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label

Categories and Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

IoT

Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Mobility

App Management
Barcode Scanning
Compliance Management
Content Management
Data Collection
Data Management
File Management
Forms Automation
Mobile Messaging
Remote Access
Remote Systems Monitoring

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Single Sign On

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

Unified Communications

Audio / Video Conferencing
Calendar Management
Call Recording
Call Routing
Chat / Messaging
Fax Management
File Sharing
Mobile Access
Multi-User Collaboration
Voice Mail

VPN

Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label

Popular Alternatives

Popular Alternatives

UTunnel VPN and ZTNA Reviews & Ratings

UTunnel VPN and ZTNA

Secubytes LLC
UTunnel VPN and ZTNA Reviews & Ratings

UTunnel VPN and ZTNA

Secubytes LLC
Private Internet Access (PIA) Reviews & Ratings

Private Internet Access (PIA)

Private Internet Access
Perimeter 81 Reviews & Ratings

Perimeter 81

Check Point Software Technologies