Endpoint Secure Connection

Why use a VPN?

VPN stands for Virtual Private Network. It establishes a tunnel within a so-called “insecure” network such as the internet.

What is a VPN?

To ensure that data exchanges are secure, a VPN performs three functions:

  • Authentication using a key to make sure that the devices are authorized to communicate with each other
  • Data encryption to guarantee the confidentiality of exchanges
  • Data integrity to ensure that data has not been tampered with

Discover the full range of TheGreenBow VPN Clients

We offer the most reliable and versatile range of VPN clients on the market for needs as varied as protecting connections while telecommuting or with connected objects, or even securing data exchanges within a network handling critical communications: they are interoperable with any IPsec or OpenVPN gateway, work with any type of network (Wi-Fi, 3G, 4G, 5G, satellite, etc.), are designed to integrate into any public key infrastructure (PKI) and to be deployed on a large scale.

Our VPN clients are available for Windows, Linux, Android, iOS, and macOS. We offer a 30-day free trial to let you discover all their features.

iOS

Read more
Protocols
OpenVPN
IPsec IKEv1 -
IPsec IKEv2
IPv6 support -
 
Cryptography
AES CBC/CTR/GCM 128-256
SHA2 256-512, DH 14-21
 
Authentication
Pre-shared key, EAP, Certificates
Tokens and smart cards N/A *
Advanced authentications (Method 14: ECDSA/RSASSA-PSS, Method 214)
 
Tunnel
All traffic through the tunnel
Multiple tunnels -
 
Service continuity
DPD (Dead Peer Detection)
Redundant gateway
 
Deployment
Silent installation and configuration N/A *
Control software from the command line N/A *
 
Advanced features
Always-on (permanent connection)
Trusted network detection N/A *
Filtering Mode -
 
Compliance with ANSSI recommendations
EAL3+ Common Criteria certification from ANSSI -
Compatibility with IPsec DR referential -
 
* N/A - Not applicable
 

Android

Read more
Protocols
OpenVPN
IPsec IKEv1 -
IPsec IKEv2
IPv6 support
 
Cryptography
AES CBC/CTR/GCM 128-256
SHA2 256-512, DH 14-21
 
Authentication
Pre-shared key, EAP, Certificates
Tokens and smart cards N/A *
Advanced authentications (Method 14: ECDSA/RSASSA-PSS, Method 214)
 
Tunnel
All traffic through the tunnel
Multiple tunnels -
 
Service continuity
DPD (Dead Peer Detection)
Redundant gateway -
 
Deployment
Silent installation and configuration
Control software from the command line N/A *
 
Advanced features
Always-on (permanent connection)
Trusted network detection N/A *
Filtering Mode -
 
Compliance with ANSSI recommendations
EAL3+ Common Criteria certification from ANSSI -
Compatibility with IPsec DR referential
 
* N/A - Not applicable
 
 

iOS

Read more

Android

Read more
 
Protocols
OpenVPN
IPsec IKEv1 - -
IPsec IKEv2
IPv6 support -
 
Cryptography
AES CBC/CTR/GCM 128-256
SHA2 256-512, DH 14-21
 
Authentication
Pre-shared key, EAP, Certificates
Tokens and smart cards N/A * N/A *
Advanced authentications (Method 14: ECDSA/RSASSA-PSS, Method 214)
 
Tunnel
All traffic through the tunnel
Multiple tunnels - -
 
Service continuity
DPD (Dead Peer Detection)
Redundant gateway -
 
Deployment
Silent installation and configuration N/A *
Control software from the command line N/A * N/A *
 
Advanced features
Always-on (permanent connection)
Trusted network detection N/A * N/A *
Filtering Mode - -
 
Compliance with ANSSI recommendations
EAL3+ Common Criteria certification from ANSSI - -
Compatibility with IPsec DR referential -
* N/A - Not applicable
  Test Buy Test Buy

Subscribe to our newsletter