Unauthorized VPN usage can pose a serious risk to corporate networks. Employees or other users may unknowingly tunnel malicious traffic or bypass critical security policies with unsanctioned third-party VPN solutions. ThreatSTOP is committed to helping organizations tackle these concerns by providing precise and customizable VPN control within our Protective DNS and IP Defense platforms.
We are excited to announce expanded coverage of third-party VPN providers. The following additions are now part of our growing lineup for more granular VPN control:
• BoxPN
• Browsec
• CryptoStorm
• Easy-Hide-VPN
• FastestVPN
• AirGap
• AirVPN
• Anonine
• Avast SecureLine VPN
• FrootVPN
• FrostVPN
• GhostPath
• IPVanish
• Ivacy
• IVPN
• Mullvad VPN
• OctoVPN
• OVPN
• VPNSecure
• VPNTunnel
• VyprVPN
• Windscribe
• ZeroTier
• Perfect Privacy
• PrivadoVPN
• PrivateVPN
• PureDome
• PureVPN
• SlickVPN
• StrongVPN
• TorGuard
• Turbo VPN
• VPN Unlimited
• VPN Gate
Each provider is assigned its own “target” inside our threat intelligence infrastructure. That means you have the flexibility to select which VPNs to block or allow based on your organization’s needs. By using ThreatSTOP’s DNS Defense Cloud or DNS Defense on-premises solutions, you can proactively enforce these VPN restrictions at the DNS level. Meanwhile, IP Defense enables you to manage network blocks at the IP layer on firewalls, routers, or other IP-based systems.
Why Third-Party VPN Control Matters
• Mitigate unauthorized data exfiltration: Unsanctioned VPNs can create hidden channels for moving sensitive data out of the network.
• Prevent policy bypass: Users might unintentionally or intentionally bypass corporate security policies when using unapproved VPNs.
• Enhance visibility: Knowing which VPNs connect to your network gives you deeper insight into potential threat vectors.
The protections used to block or allow these VPNs are crafted by the ThreatSTOP Security, Intelligence, and Research (SIR) team. They not only address VPN control, but also shield against malware command and control, invalid traffic, peer-to-peer communications, data exfiltration, phishing, spam, Distributed Denial of Service (DDoS) activity, and more.
Proactive Protection Across All Environments
ThreatSTOP’s Protective DNS offerings (DNS Defense Cloud and DNS Defense) work seamlessly to provide a proactive approach to network security. Combined with our IP Defense solution, you gain comprehensive control over your network traffic, stopping threats in real time before they become costly incidents.
For those interested in joining the ThreatSTOP family, or to learn more about our proactive protections for all environments, we invite you to visit our product page. Discover how our solutions can make a significant difference in your digital security landscape. We have pricing for all sizes of customers. Get started with a Demo today!
Connect with Customers, Disconnect from Risks
How This Content Maps to the MITRE ATT&CK Framework
Technique/ID |
Technique Name |
Relevance |
---|---|---|
T1090 |
Proxy |
Third-party VPNs can act as proxies for malicious traffic or policy evasion. |
T1133 |
External Remote Services |
Unauthorized VPNs provide external remote access to internal resources, bypassing standard security controls. |
T1048 |
Exfiltration Over Alternative Protocol |
VPN traffic can obscure data exfiltration, making it harder to detect unauthorized data transfers. |
T1568 |
Dynamic Resolution |
DNS-based VPN connections can dynamically resolve to different IPs, complicating threat detection and blocking at scale. |