Guest Post: NordVPN Discusses Their Recent Independent Security Audit

This October, NordVPN has completed an application security audit. The in-depth application penetration test was conducted by an independent auditor VerSprite, one of the leading cybersecurity consulting firms, which specializes in finding threats, risks, and vulnerabilities in application software.

“This audit made our apps even stronger. After the initial test, our developers followed the auditor’s recommendations and implemented a few changes,” explains Ruby Gonzalez, NordVPN’s Head of Communications. “We intend to regularly audit our service in the future.”

NordVPN’s application penetration test covered NordVPN’s API endpoint and Clients Panel, mobile apps for iOS and Android, and desktop applications for Windows and macOS.

The VerSpirte’s penetration testing methodology is based on real-world attack simulations by a malicious actor. Auditors focused on identifying high-impact vulnerabilities that could lead to IP leaks, breaching confidential user data, and overall privilege escalation.

Just recently NordVPN received another good evaluation during the extensive VPN test by the AV-TEST GmbH. The independent research institute for IT security from Germany distinguished NordVPN for its speed, security, and bypassing censorship.

A year ago, NordVPN completed another third-party audit. Then PricewaterhouseCoopers AG (Switzerland) performed an industry-first audit of NordVPN’s no-logs policy.

At the moment NordVPN is used by over 12 million users worldwide and has over 5,000 servers in 60 countries. This year, Panama-based company announced three new tools: a new-generation password manager NordPass, a powerful file encryption tool NordLocker, and a VPN solution for businesses and teams NordVPN Teams.

One Response to “Guest Post: NordVPN Discusses Their Recent Independent Security Audit”

  1. I like your article, great points you mentioned. I already use NordVPN Teams with my colleagues and we’re happy to have it in our office.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: