Average Ratings 41,009 Ratings
Average Ratings 1 Rating
Description
Secure your organization from costly data breaches while meeting essential compliance requirements, such as ISO 27001, GDPR, and HIPAA. Our software-based VPN solution is easy to deploy alongside your existing systems, giving you a powerful and adaptable tool for securing your enterprise network.
Our VPN Professional plan allows your team to connect securely to your local networks and cloud-based services. And with granular segmented control over who can connect to dedicated VPN servers and Gateways (logical groupings of dedicated servers), you can ensure your staff can access the resources they need (but only what they need).
All of our business plans use robust industry-standard AES-256 or ChaCha20 encryption to ensure your data remains secure. You can further strengthen your organization's security with enforced two-factor authentication (2FA) and seamless login through single sign-on (SSO) with SCIM support for automated user provisioning.
Our global high-performance (mainly 10 Gbps) server network is one of the largest in the world, and is part of the trusted Proton ecosystem — a suite of fully open source, end-to-end encrypted services built by the creators of Proton Mail and designed specifically to keep your business secure.
Description
Tails is a lightweight operating system designed to safeguard users from surveillance and censorship. By utilizing the Tor network, Tails ensures your online privacy and helps you bypass restrictions. Experience the Internet in its true form by booting your computer from a Tails USB stick rather than using Windows, macOS, or Linux. One of the key features of Tails is that it leaves no trace on the host machine once it is shut down. Additionally, Tails comes equipped with a variety of applications tailored for working with sensitive documents and secure communication. Each component in Tails is designed for immediate use and is configured with security in mind. You can obtain Tails at no cost, and independent security researchers are able to validate its security measures. Built on a Debian GNU/Linux foundation, Tails is widely employed by activists to maintain their anonymity, circumvent censorship, and communicate safely. Journalists, along with their sources, rely on Tails for sharing sensitive information and accessing the Internet in risky environments. Survivors of domestic violence also benefit from Tails, as it provides a means to escape surveillance in their homes. This versatility makes Tails an essential tool for anyone needing privacy and security in their online activities.
API Access
Has API
API Access
Has API
Integrations
Adheart
Android TV
Apple tvOS
Fire OS
Google Chrome
Mozilla Firefox
Proton Drive
Proton Meet
Proton Pass
SSuite NetSurfer
Integrations
Adheart
Android TV
Apple tvOS
Fire OS
Google Chrome
Mozilla Firefox
Proton Drive
Proton Meet
Proton Pass
SSuite NetSurfer
Pricing Details
$6.99/user/month
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Proton AG
Founded
2014
Country
Switzerland
Website
proton.me/business/vpn
Vendor Details
Company Name
Tails
Founded
2009
Website
tails.boum.org
Product Features
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Proxy Servers
Anonymous
Automatic IP Rotation
Data Center Proxies
Geo-Targeting
Mobile Proxies
Reporting / Analytics
Residential Proxies
SSL
Whitelisted IPs
VPN
Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label