ThreatSTOP Blog

Expanding Third-Party VPN Control for Stronger Corporate Network Protection

Written by Joel Esler | April 22, 2025

Unauthorized VPN usage can pose a serious risk to corporate networks. Employees or other users may unknowingly tunnel malicious traffic or bypass critical security policies with unsanctioned third-party VPN solutions. ThreatSTOP is committed to helping organizations tackle these concerns by providing precise and customizable VPN control within our Protective DNS and IP Defense platforms.

We are excited to announce expanded coverage of third-party VPN providers. The following additions are now part of our growing lineup for more granular VPN control:

BoxPN

Browsec

CryptoStorm

Easy-Hide-VPN

FastestVPN

AirGap

AirVPN

Anonine

Avast SecureLine VPN

FrootVPN

FrostVPN

GhostPath

IPVanish

Ivacy

IVPN

Mullvad VPN

OctoVPN

OVPN

VPNSecure

VPNTunnel

VyprVPN

Windscribe

ZeroTier

Perfect Privacy

PrivadoVPN

PrivateVPN

PureDome

PureVPN

SlickVPN

StrongVPN

TorGuard

Turbo VPN

VPN Unlimited

VPN Gate

Each provider is assigned its own “target” inside our threat intelligence infrastructure. That means you have the flexibility to select which VPNs to block or allow based on your organization’s needs. By using ThreatSTOP’s DNS Defense Cloud or DNS Defense on-premises solutions, you can proactively enforce these VPN restrictions at the DNS level. Meanwhile, IP Defense enables you to manage network blocks at the IP layer on firewalls, routers, or other IP-based systems.

 

Why Third-Party VPN Control Matters

Mitigate unauthorized data exfiltration: Unsanctioned VPNs can create hidden channels for moving sensitive data out of the network.

Prevent policy bypass: Users might unintentionally or intentionally bypass corporate security policies when using unapproved VPNs.

Enhance visibility: Knowing which VPNs connect to your network gives you deeper insight into potential threat vectors.

The protections used to block or allow these VPNs are crafted by the ThreatSTOP Security, Intelligence, and Research (SIR) team. They not only address VPN control, but also shield against malware command and control, invalid traffic, peer-to-peer communications, data exfiltration, phishing, spam, Distributed Denial of Service (DDoS) activity, and more.

 

Proactive Protection Across All Environments

ThreatSTOP’s Protective DNS offerings (DNS Defense Cloud and DNS Defense) work seamlessly to provide a proactive approach to network security. Combined with our IP Defense solution, you gain comprehensive control over your network traffic, stopping threats in real time before they become costly incidents.

For those interested in joining the ThreatSTOP family, or to learn more about our proactive protections for all environments, we invite you to visit our product page. Discover how our solutions can make a significant difference in your digital security landscape. We have pricing for all sizes of customers. Get started with a Demo today!

 

Connect with Customers, Disconnect from Risks

 

 

How This Content Maps to the MITRE ATT&CK Framework

Technique/ID

Technique Name

Relevance

T1090

Proxy

Third-party VPNs can act as proxies for malicious traffic or policy evasion.

T1133

External Remote Services

Unauthorized VPNs provide external remote access to internal resources, bypassing standard security controls.

T1048

Exfiltration Over Alternative Protocol

VPN traffic can obscure data exfiltration, making it harder to detect unauthorized data transfers.

T1568

Dynamic Resolution

DNS-based VPN connections can dynamically resolve to different IPs, complicating threat detection and blocking at scale.