{"id":7626,"date":"2020-07-19T04:26:03","date_gmt":"2020-07-19T11:26:03","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7626"},"modified":"2023-07-10T14:54:54","modified_gmt":"2023-07-10T21:54:54","slug":"do-vpns-have-our-back","status":"publish","type":"post","link":"https:\/\/10.42.32.162\/articles\/do-vpns-have-our-back\/","title":{"rendered":"How Safe are VPN Solutions?"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

\u00a0<\/p>

In our recent report series\u00a0 called \u2018Cyber Risk in Working Remotely<\/a>\u2019\u00a0we examined popular VPN applications and their inherent vulnerabilities. This definitive report <\/a>is an eye-opener for organizations as we analyzed popular applications such as Fortinet<\/strong>, Pulse Secure<\/strong>, Palo Alto<\/strong>, Check Point<\/strong>, SonicWall<\/strong>, OpenVPN<\/strong>, Citrix<\/strong>, Cisco and many others<\/strong>\u00a0for vulnerabilities.<\/p>

Key Findings<\/strong><\/h3>

The report provides a comprehensive study of vulnerabilities that exist in popular VPN solutions<\/p>