Top Endpoint Detection and Response (EDR) Solutions

Endpoint security is a cornerstone of IT security, so our team put considerable time and thought into this list of top endpoint detection and response (EDR) vendors.

IT security isn’t just about raw test scores, although independent testing is very important in our view. It’s also the advanced features that provide additional protection, the ease of implementation and use, management control of endpoints and threats, value and support, and so we rate EDR products in all those areas. Generally, the more you pay, the more advanced features you get, and many vendors offer multiple levels of products at different price points.

One important trend to note: endpoint protection platforms (EPP) and endpoint detection and response (EDR) products are rapidly converging, so one thing EDR buyers should look for is a product that combines both, or gets EPP and EDR tools to work together as seamlessly as possible. All our top EDR products have that feature.

We rated more than 30 EDR products in seven key areas and measured 130 data points for each vendor to come up with our list of 12 top EDR vendors and 10 honorable mentions. For more on our methodology and ratings, see our Methodology section.

So with that context, here are our picks for top EDR products, followed by honorable mentions.

Top EDR products

CrowdStrike Falcon

CrowdStrike Falcon is popular with analysts and users alike – and it came out on top in our analysis too. Falcon is near the top in raw security scores, but when factoring in the product’s advanced features, it wound up with an overall Detection score well above any other vendor on this list. It also scored high in Response, Management, Ease of Use, and Support. Pricing is above average, but as all EDR products save millions of dollars in breach and remediation costs, price is relative, and well-executed advanced features pay for themselves. Falcon offers almost all the standard features you’d expect in a top EDR product, although automated remediation costs extra. Web content filtering and VPN aren’t offered, and for encryption it merely reports on the status of Windows BitLocker, but none of those features are widely offered enough to be considered a standard EDR feature. Users score it high in capabilities, implementation, cloud-based management, and Linux and technical support, among other areas. But CrowdStrike’s biggest strength is the additional services offered with Falcon, including threat hunting, vulnerability assessment and more. In short, CrowdStrike is for those willing to pay for advanced features that are hard to beat.

Pros:

  • Happy customers
  • Easy cloud-based implementation
  • Advanced features that deliver

Cons:

  • Can get pricey
  • A few vendors have higher raw independent test scores – but in any other product, we’d place that in the “Pros” section
  • Web content filtering and VPN needs would have to be met in other ways

 

Detection

Response

Management

Deployment

Ease of use

Value

Support

CrowdStrike

4.7

4.7

4.5

4.6

4.6

4.7

4.8

 

Check Point Software SandBlast

Check Point’s SandBlast offering was tied for second overall on the strength of its top-notch security and support at a good price. It received the highest score in Ease of Use and came in second in Management, and its automated response capability is also good, making it a strong candidate for smaller companies or those with less sophisticated security teams. In NSS Labs testing, SandBlast handled everything thrown at it, with the sole exception of targeted (hand-crafted) attacks, where it stopped 40%. It offers full-featured management, although users report some challenges with implementation. Check Point also offers a remarkably full-featured product for a price that’s toward the lower end of EDR products, with custom rules the only missing piece. There may be cheaper products and there may be more advanced ones, but none offer better security for the price. It’s a good match for companies of all sizes seeking strong endpoint security at a good price point, particularly those who want their EDR solution to do some of the work for them.

Pros:

  • Automated response
  • Ease of use and management
  • Full-featured at reasonable cost

Cons:

  • Custom rules missing
  • Some implementation challenges reported

 

Detection

Response

Management

Deployment

Ease of use

Value

Support

Check Point

4.4

4.6

4.7

4.1

4.9

4.6

4.5

 

SentinelOne

SentinelOne tied for second overall, with top scores in Detection, Deployment and Value. SentinelOne users are among the happiest in the EDR space, and they have good reason to be. The product’s automated response features are rated highly by users, which could make SentinelOne a good choice for smaller companies and those without a sophisticated security team. Security scores are good, and SentinelOne even came out on top in the second round of MITRE testing – that’s no small feat, as participants are basically trying to stop Russian nation-state hackers across 140 areas. Missing features include full-disk encryption, VPN, mobile support and web content filtering, and rogue device discovery can be had at an additional cost, but as only about half of top vendors offer those, it would be hard to call them standard features. SentinelOne isn’t the cheapest EDR product on the market, but even there, price is often cited as a reason for buying. A good choice for companies willing to pay for advanced features without sweating the details too much.

Pros:

  • Automated response
  • Strong security at a reasonable price
  • Good security for less sophisticated teams

Cons:

  • Missing features: full-disk encryption, VPN, mobile support, web content filtering
  • Rogue device discovery offered at an additional cost
  • Not for those buying on price alone, but otherwise a good value

 

Detection

Response

Management

Deployment

Ease of use

Value

Support

SentinelOne

4.5

4.8

4.4

4.6

4.5

4.8

4.5

 

F-Secure

F-Secure, headquartered in Helsinki, matched Palo Alto for the highest independent test scores. The company offers some of the best security on the EDR market for a price that’s about average, with some of the highest scores in the MITRE evaluations. It gets high scores for Ease of Use and Value too. F-Secure boasts a solid lineup of advanced features, but they can come at an additional cost: vulnerability monitoring, custom rules, advanced threat hunting, rogue device discovery, rollback, VPN. Still, the list of features is pretty thorough. Users report some difficulty with implementation, but support and services are there if you need them. In short, if top-notch security is a requirement, F-Secure is a good one to add to your shortlist.

Pros:

  • Top security
  • Full lineup of advanced features, but some cost extra
  • Ease of use and value

Cons:

  • Advanced features can cost extra
  • Some implementation challenges

 

Detection

Response

Management

Deployment

Ease of use

Value

Support

F-Secure

4.5

4.4

4.3

4.4

4.7

4.7

4.4

 

Palo Alto Networks Cortex XDR

Palo Alto Networks matched F-Secure for the highest independent test scores, with strong results from both NSS Labs and MITRE. And that security can be had for a price that’s about average. Palo Alto’s Cortex XDR system is priced solidly in the midrange of EDR products, where a majority of vendors seem to price their EDR offerings. NSS Labs found that the product handled all manner of attacks, including handcrafted (targeted attacks), and Palo Alto came out on top in the first round of the rigorous MITRE ATT@CK evaluations, and in the top two or three in the just-released second round results. The only weak spot in the NSS tests was social exploits embedded in documents, where Palo Alto stopped just over 60% of attacks. Alerting capabilities are solid, and AI and behavioral analytics track threats across endpoints, the network and the cloud. Users report some issues with integration and support, and some of the less common EDR features are missing: vulnerability monitoring, patch management, web content filtering, rogue device discovery, rollback. Strong integration with Palo Alto firewalls and technologies could limit the product’s market to current Palo Alto customers, but anyone seeking top security and a product that goes beyond endpoints should take a look.

Pros:

  • Top scores in third-party security tests
  • Ability to handle advanced attacks
  • AI and behavioral analytics, strong alerting capabilities
  • Tracks threats across endpoints, networks and cloud

Cons:

  • vulnerability monitoring, patch management, web content filtering, rogue device discovery, and rollback are missing features
  • Management and implementation can be complicated
  • Palo Alto customers make up a big part of the market; need for broader visibility

 

Detection

Response

Management

Deployment

Ease of use

Value

Support

Palo Alto

4.4

4.6

4.3

4.3

4.4

4.4

4.5

 

Kaspersky

Kaspersky’s EDR offering offers solid security at bargain-basement prices, which also makes the product one of the more popular ones on the market. It’s a feature-rich product too, with an additional cost for VPN the only noteworthy omission. Users like the product’s automation features that surface the most critical issues, investigation and response capabilities, top-notch research, ease of implementation and use, and support. Some users have said the product can be resource-intensive, straining CPUs, and Kaspersky’s raw score in the just-released second round of MITRE testing was below average. The Moscow-based company has also moved much of its data processing to Switzerland to ease any suspicions about ties to the Russian government. A good choice for any company looking for solid security and ease of use on a budget.

Pros:

  • Solid security for a low price
  • Feature-rich
  • Ease of use
  • Support

Cons:

  • Can be resource-intensive
  • VPN costs extra
  • Underwhelming MITRE round two evaluation

 

Detection

Response

Management

Deployment

Ease of use

Value

Support

Kaspersky

4.2

4.3

4.2

4.2

4.7

4.7

4.7

 

Microsoft Defender Advanced Threat Protection

Microsoft has invested significantly in its security capabilities and in-house development, and the result was an impressive performance in both rounds of the rigorous MITRE ATT@CK evaluations. By virtue of including its endpoint security software in Windows 10, Microsoft is number one in deployed endpoints, but the company is taking the Mac and Linux markets seriously too, and has also addressed licensing concerns by making Defender Advanced Threat Protection available as a standalone EDR product or as part of a suite. Microsoft turned in top-tier performances in the first two rounds of MITRE ATT@CK evaluations, proof that the software giant intends to be a player in endpoint security. Management and Ease of Use were two areas the product scored high in. Defender ATP is feature-packed, with analyst workflow the lone missing feature, and rogue device discovery and VPN available for an additional cost. With its integration into Windows source code, the product is a natural for Windows environments, but the product’s strong security makes it a contender elsewhere too.

Pros:

  • Strong security
  • Windows source code integration
  • Management and ease of use
  • Lots of standard features like vulnerability and configuration management

Cons:

  • Analyst workflow a missing feature
  • Rogue device discovery and VPN cost extra
  • Some reports that it can get pricey

 

Detection

Response

Management

Deployment

Ease of use

Value

Support

Microsoft Defender ATP

4.5

4.1

4.8

3.9

4.6

4.5

4.3

 

Trend Micro

Apex One, Trend Micro’s combined EPP/EDR offering, scores highest in value, not surprising since it’s priced at the low end of the EDR market. With a top-tier performance in the just-released second round of MITRE evaluations, it’s one of the biggest bargains in the market. Apex One’s combination of low cost and good security effectiveness gave it one of the best total cost of ownership (TCO) scores in NSS Labs testing last year. Office 365 and Google G Suite integration are a focus, a plus for cloud office suite users. There have been some issues with deployment, and users have reported occasionally needing to manually remove malware found by the product. A number of features are missing or cost extra, like patching, device control, analyst workflow, custom rules, and rollback, but as the product is at the low end of the pricing spectrum, those features can be added at a pretty reasonable cost when available. Apex One should be considered by those seeking strong security on a budget.

Pros:

  • Price, value and TCO
  • Cloud office support
  • Strong security

Cons:

  • Missing features: analyst workflow, custom rules, rollback
  • Features that cost extra: patch management, full-disk encryption, device control, threat intelligence feed integration, VPN
  • Some deployment issues
  • Some reports of malware needing to be removed manually

 

Detection

Response

Management

Deployment

Ease of use

Value

Support

Trend Micro

4.5

4.3

4.5

3.4

4.5

4.7

4.4

 

VMware Carbon Black

Ease of Use and Value were the areas VMware Carbon Black scored highest in, perhaps a little surprising for a product priced in the middle of the pack. Users are pretty high on the product’s capabilities, which were solid enough to give it a very good TCO score in NSS Labs testing last year. Security is good too, with solid scores in NSS Labs and MITRE testing. One downside is that a number of features that might be expected in a mid-to-high end product are missing or cost extra: vulnerability monitoring, device control, guided investigation, advanced threat hunting and rollback among them. Predictive Security Cloud is the flagship offering, with options for threat hunting and response, and audit and remediation, and is popular with sophisticated security teams, but those needing more standard features may find value in Carbon Black too.

Pros:

  • Ease of use and product capabilities are strengths
  • Well integrated EPP and EDR
  • Advanced threat hunting may cost extra, but it’s well done

Cons:

  • Features that cost extra: advanced threat hunting, vulnerability monitoring and patch management
  • Features not offered: full-disk encryption, web content filtering, device control, guided investigation, rollback, VPN
  • Despite relative value, a few users report that the product can get pricey

 

Detection

Response

Management

Deployment

Ease of use

Value

Support

VMware Carbon Black

4.3

4.4

4.2

4.4

4.5

4.6

4.3

 

Symantec

Now owned by Broadcom, the EDR market leader hasn’t been resting on its laurels, not that any vendor could afford to in such a competitive market. Symantec Endpoint Security (SES), the vendor’s combined EPP-EDR offering, offers advanced features such as vulnerability remediation, threat hunting and targeted attack analytics. Response, Management, Ease of Use and Value were all good, indications that Symantec has put together a solid product. Pricing can range from low-cost to very expensive, depending on features selected. Standard features include vulnerability and patch management, device control, analyst workflow, guided investigation, custom rules, advanced threat hunting, rogue device discovery and more. Full-disk encryption, web content monitoring and threat intelligence feed integration are available at extra cost, while rollback isn’t offered, the only missing feature on our 28-item checklist. Symantec recently posted a very good raw score of 85% in the second round of MITRE testing, but as quite a few detections were made by MSSP only, we expect that Symantec’s EDR and services teams are getting together to make sure that both products get maximum benefit from the MITRE evaluations. Symantec has made some good choices and gets solid marks from users across the board. A comfortable choice that gets the job done.

Pros:

  • Many standard features: vulnerability and patch management, device control, analyst workflow, guided investigation, custom rules, advanced threat hunting, rogue device discovery
  • Good security
  • Overall balanced scores

Cons:

  • Full-disk encryption, web content monitoring and threat intelligence feed integration are available at extra cost
  • Rollback isn’t offered
  • Pricing can be high
  • Can be resource-intensive on endpoints

 

Detection

Response

Management

Deployment

Ease of use

Value

Support

Symantec

4.2

4.5

4.5

3.9

4.5

4.5

4.4

 

Bitdefender

Bucharest-based Bitdefender is popular with small and mid-sized businesses that want their endpoint security to do a lot of the work for them, and Bitdefender GravityZone can do that with machine learning, behavioral monitoring, risk analytics and automated remediation. Those features come at a cost, however, and for a product that can get pricey, a number of advanced features are missing, like guided investigation, threat intelligence feed integration and custom rules. Patch management, full-disk encryption, and rogue device discovery can be had at a premium. Security is good, with solid scores in NSS Labs and MITRE evaluations. Bitdefender is one that SMBs should be taking a look at, and even some enterprises too, as the company has basic and advanced offerings for both SMBs and enterprises.

Pros:

  • Good security
  • Popular with SMBs
  • Good automation features

Cons:

  • Missing: guided investigation, threat intelligence feed integration, custom rules
  • Available at a premium: patch management, full-disk encryption, rogue device discovery
  • Can get pricey

 

Detection

Response

Management

Deployment

Ease of use

Value

Support

Bitdefender

4.5

4.1

4

4

4.5

4.5

4.5

 

BlackBerry Cylance

Rounding out our top vendor list is Cylance, acquired by BlackBerry last year. One standout feature is its automated response abilities, and users are also high on the ability of CylancePROTECT EPP and CylanceOPTICS EDR to stop ransomware and unknown threats. NSS Labs and MITRE scores have been solid, but the product can be pricey. Threat hunting and custom rules are some of the advanced EDR features offered, but a number of advanced features are missing, like behavioral detection, patch management, full-disk encryption, web content filtering, guided investigation, rogue device discovery, and rollback. OPTICS in particular may present some implementation challenges, but users are generally pleased with the results. In short, a product for enterprises willing to pay extra for protection against unknown threats, but that extra cost may pay for itself in reduced remediation time.

Pros:

  • Automated remediation
  • Time-saving response and management capabilities
  • Stops unknown threats

Cons:

  • Missing features: behavioral detection, patch management, full-disk encryption, web content filtering, guided investigation, rogue device discovery, rollback
  • Some implementation challenges
  • Can be pricey

 

Detection

Response

Management

Deployment

Ease of use

Value

Support

BlackBerry Cylance

4.2

4.4

3.6

3.4

4.5

4.4

4.5

 

Honorable mentions

“Honorable mention” in no way means these vendors are second tier. In fact, many of them have posted impressive scores in rigorous third-party testing. Vendors in this category are more likely to have an offering that is best for specific uses cases, or are emerging and worthy of consideration.

Sophos: Sophos Intercept X had a strong showing in NSS Labs testing last year and is priced toward the low end of EDR products, making it a security bargain. Users have had their complaints – false positives, implementation and performance overhead are a few – but you won’t find many complaints about its security performance. We’d like to see Sophos join the MITRE ATT@CK evaluations to confirm that strong security. In the meantime, it remains a bargain worth considering.

McAfee MVISION: A relative newcomer to the EDR market, McAfee has been quick to offer advanced features such as behavioral blocking, credential theft monitoring, rollback options and more. McAfee scored among the leaders in Value and posted a solid performance in the first round of the rigorous MITRE ATT@CK evaluations, but didn’t fare as well in the second round. McAfee has the pedigree to continue to evolve in the EDR (and any security) market, so they’re one to watch. Certainly one for McAfee users to consider, as well as others.

Elastic/Endgame: A recent acquisition combining two strong security companies – Endgame in endpoint security and Elastic in SIEM – makes Elastic a vendor to keep an eye on. MITRE and NSS Labs scores were particularly impressive, so anyone valuing strong security should have a look.

Cybereason: An up and coming vendor with an impressive vision for the future, Cybereason scored well in the first round of MITRE ATT@CK evaluations and roughly average in the second round, serving notice that this next-gen EDR vendor is for real.

Cisco AMP for Endpoints: Solid security at bargain prices; particularly well matched for Cisco shops. We’d like to see Cisco join the MITRE evaluations, which are rapidly becoming a standard measure in the field.

FireEye: Positioned more as a security platform vendor, but EDR is part of that platform, and with a solid performance in both rounds of the MITRE ATT@CK evaluations, it’s one worth considering, particularly if you’re looking to add other services to your EDR system.

Fortinet/enSilo: Fortinet may be best known for its firewalls, but with a low-cost, solid, easy-to-use EDR offering and the recent acquisition of the more advanced enSilo, the company is one to watch in the EDR space.

WatchGuard/Panda: A recent acquisition combines Panda’s strong EDR security, which received high marks from NSS Labs, with WatchGuard’s strength in firewalls and network security.

Comodo: Strong test results from NSS Labs and solid user reviews should bring Comodo some notice. Users report some challenges with implementation and ease of use, but otherwise satisifed.

ESET: An established EDR vendor with a strong presence with SMBs and a global reach.

Methodology and ratings

We analyzed third-party test data, user reviews, product features, analyst reports and reseller pricing, and winnowed an initial list of more than 30 EDR vendors to come up with our list of 12 top vendors and 10 honorable mentions.

Here’s an explanation of our ratings categories, in order of our weighting:

  • Detection: Not just whether the EDR product stops a high percentage of threats, but also whether it offers advanced features to protect more than a traditional endpoint security platform might, such as threat hunting, correlation and fileless threat detection, and user opinions of the product’s capabilities.
  • Response: How well the product removes threats, alerts security teams and guides response. Advanced features, such as automatically surfacing the most important threats and guided investigation, are also considered.
  • Management: Ease of use plays a role here, but more important are features that give a security team control over endpoints, such as vulnerability assessment, patching, endpoint control and more.
  • Ease of use: The higher the score, the more suitable the product may be for SMBs or less experienced security teams.
  • Support: Everyone contacting support has a problem that needs solving, so responsiveness matters.
  • Value: Value isn’t just price – where a product is truly low-cost, we note that, but value is also about advanced features and high security that cost less than competing products, and save companies data breach costs and security staff time in the process.
  • Deployment: Not just how easy a product is to implement, but also how well it integrates with user environments and how easy it is to deploy new endpoints.

.

How Our Fight to Outsmart Internet Censorship Started

Rodrigue Hajjar has been with TunnelBear for six years. He started as a contract developer and has since led initiatives spanning the distribution, discoverability, and connectivity of our core VPN platform. Rodrigue now sits as Director of VPN at TunnelBear. In the article below, he reflects on a significant day of his tenure with us, where he witnessed TunnelBear’s eagerness to use its tech savvy to fight censorship. Most importantly, ‘Rod’ lays out what that means for the sleuth moving forward.

It was February 14, 2014, and our standup didn’t feel the same. Ryan looked at us with an expression I didn’t recognize. I began to worry: are we in financial trouble? Is someone quitting? Whatever it is, it would be the first disruption I’d witnessed at TunnelBear, and the first time I’d seen him this nervous.

He explained that Venezuela’s protests escalated yet again. The country was averaging 35 protests a day, with surveillance and censorship also on the rise. Social media websites, including Twitter, were blocked, preventing Venezuelans from sharing their experience or denouncing injustices.

Finally, Ryan asked us: “Can we give free data to all Venezuelan users?”

Just a few months earlier, TunnelBear donated free data to people in Turkey, as they were going through a period where social networks were blocked. We were keen to help our allies but new to this space. And although we saw how much our contribution helped, we didn’t yet know it would lead to something much bigger.

In 2014, TunnelBear was a tiny bootstrapped business with five employees including myself. I hadn’t been in Canada a full year yet, and as someone who believes the opportunities we get in life today are largely dictated by the country we’re born in, I was attracted to our mission of working to make the internet a safer place for everyone, no matter where they are.

Despite the infancy of our company and the financial risks associated with Ryan’s ask, we decide to go for it.

Donating bandwidth to Venezuelans was a turning point for TunnelBear. It helped solidify our mission to fight censorship and make the internet a safer place for everyone. Since that day, anti-censorship development has become a regular part of our jobs, leading to new features like “Closest Tunnel” (now “Fastest Tunnel”) and “Intelli-Bear”. All of these efforts allowed us to load balance and route traffic so we can better handle similar censorship events. A few notable examples include helping circumvent Turkey’s Twitter ban and giving free bandwidth to Iran amid protests.

These events helped us prepare for a growing global censorship threat. We’ll be announcing more anti-censorship updates in the following months, and are hiring talented individuals to join a dedicated anti-censorship team:

If you’re excited by the idea of working on a dedicated anti-censorship development team, please don’t hesitate to reach out. We can’t wait to hear from you.

Conspiracy theorists stupidly attacking 5G antennas

Samsung Galaxy Fold review camera sample 5G antenna

You can surmise most of what this article is about from the headline alone. Before I get into the whole story, let me start with this for the folks who won’t read past this paragraph: 5G antennas are not harmful to humans. 5G signals don’t spread COVID-19. In fact, 5G signals are totally safe, just like the 4G, 3G, and 2G signals we’ve all been using for decades.

With that out of the way, let’s talk about these folks who are attacking and, in some cases, setting fire to 5G antennas around the world. The trend started in the United Kingdom first, with reports of at least 60 masts damaged by sometimes dozens of people. Similar incidents also happened throughout Europe.

Related: What to look for in your perfect 5G plan and network

Now, the Department of Homeland Security here in the United States is reportedly issuing warnings to various mobile network operators that the phenomenon is coming Stateside (via ABC News). The DHS said that there have already been “arson and physical attacks against cell towers in several US states.”

Along with the overall alert to mobile operators, the DHS is also giving advice on how to better safeguard against future attacks on 5G antennas as well as cell towers in general.

Why are people attacking 5G antennas?

The most prevalent piece of “evidence” conspiracy theorists cite to back up their absolutely false claims against 5G antennas (and other pieces of mobile technology, including cell phones) is that radiation is bad for human health. Since there is radiation sourced from networking equipment, networking equipment must be bad.

While yes, radiation at various levels could be incredibly harmful to you, the type of radiation involved in 5G, cell phones, hotspots, etc. — not to mention the teeny tiny amount of that radiation — is totally safe.

You would be in more danger visiting a UV tanning booth than you would be standing near a 5G antenna for hours.

You can read an in-depth report on that topic from our very own Robert Triggs here, which is absolutely incredible at debunking pretty much every 5G myth out there. It’s essential reading if you are even slightly concerned about 5G, mmWave, cell phone antennas, etc.

Related: 5G is not going to microwave your brain: All the myths, debunked

Recently, though, fear of 5G antennas has been fueled by the COVID-19 pandemic. Conspiracy theorists cite two new pieces of “evidence” to back up their totally wrong claims:

  • Some of the places where 5G is readily available saw high numbers of COVID-19 cases.
  • The timing of the rollout of 5G kind of lines up with the beginnings of the COVID-19 pandemic.

Both of these bits of “evidence” can be easily dismantled with a simple “correlation does not imply causation” response. However, to take things a step further, you can read all about how wrong the first claim is here and then head here to read about how false the second claim is.

Please don’t attack any cell equipment

What’s sad about these recent attacks on 5G antennas and other related networking equipment is that they put other people in real danger — far more danger than any 5G signal ever could. Not only could the fires hurt people but the lack of network access for first-responders could prevent them from being able to do their jobs.

If you or anyone you know is being swayed by 5G conspiracy nonsense, please read up on the matter from trusted, science-based sources. The best fight against misinformation is actual information.

OpenVPN / Tunnelblick – auto retry connection with credential error

How can I get OpenVPN on MacOS to auto-retry a connection with a credential error?

I’d like to run the connection on startup and keep it connected without user interaction. I expect a disconnection on the ISP’s side to happen every now & then.

 

I’m using tunnelblick to manage connections and keep the connection running.

When the client gets disconnected and tries to reconnect, the server often doesn’t realise the user was disconnected, and as it only allows one connection per user it gives a login failure.

This would be fine if tunnelblick auto-retried the connection, but it asks for confirmation instead. The client machine isn’t always physically accessible when this happens so it will stay disconnected until a user manually authorises the reconnection.

خرید فیلترشکن

How to Watch Solar Opposites Anywhere Online

Finding Rick and Morty a little tame? Then r-rated animated series Solar Opposites is the show you’ve been waiting for.

However, you can only stream the Hulu Original if you have a US IP address. If you’re not in the US, you’ll need a VPN to access Hulu and watch this hilarious cartoon.

Not all VPNs can beat Hulu’s geoblocks and anti-VPN technology, but I’ve tested 300 vendors to find the ones that will guarantee a reliable connection and smooth streaming.

Check out the streaming abilities of my recommended premium VPNs for FREE by taking advantage of the money-back guarantees they offer. Change your mind during the guarantee term and a full refund is yours, hassle-free.

How to Watch Solar Opposites from Anywhere in Under 2 Minutes

  1. Pick a reliable VPN. I suggest NordVPN, as its lightning speeds and unblocking abilities are ideal for streaming.
  2. Download and install the VPN software. Connect to a US server.
  3. Head to Hulu and log in or sign up to enjoy the antics of Korvo and his family. If you’re a new user, you’ll need a US payment method or gift card.

Start Streaming Solar Opposites Now!

Why You Need a VPN to Watch Solar Opposites

Hulu has some of the toughest geo-restrictions around, which prevents users with a non-US IP address from accessing its content.

A premium VPN allows you to connect to a US server, which hides your actual location and replaces it with a US IP address. Hulu is fooled into believing you’re in the US and you can now stream Solar Opposite from anywhere.

5 Best VPNs for Watching Solar Opposites

My VPN recommendations are proven to work with Hulu. If you’re having trouble streaming Solar Opposites, just disconnect from your current US server and try another.

NordVPN Devices

  • 5,800+ global servers, 1,800+ US servers
  • SmartPlay for beating geoblocks
  • Superfast speeds and unrestricted bandwidth
  • 30-day money-back guarantee
  • 24/7 live chat customer service
  • Works with: Hulu, پراکسی iPlayer, Disney+, Netflix, Amazon Prime Video, Shudder
  • Compatible with: Windows, Android, iOS, macOS, Linux, browsers, routers

NordVPN’s huge US network of over 1,800 servers makes it a great VPN for streaming Solar Opposites with Hulu. This means you’re unlikely to connect to a congested server which can slow speeds.

Plus, such server variety gives you access to a vast number of IP addresses, making it harder for Hulu to detect that you’re using a VPN.

The SmartPlay feature furthers your chances of a reliable connection to Hulu by routing your traffic through a geoblock-busting server. I’m pleased to report that SmartPlay successfully connected me to Hulu several times.

See for yourself how quickly SmartPlay can have you watching Solar Opposites before committing to NordVPN with a 30-day money-back guarantee.

Smooth streaming is guaranteed thanks to NordVPN’s blazing speeds. With several of NordVPN’s US servers, my streaming speeds actually increased to over 50 Mbps. Lag and buffering was not a problem for me, even when fast-forwarding through Solar Opposites to get to my favorite parts.

Six simultaneous device connections are allowed with your NordVPN account. This includes a wide range of smartphones, computers, tablets, and even routers.

Get help with setup or connecting to Hulu by contacting NordVPN’s 24/7 live chat, which I found very helpful and friendly. NordVPN also has an extensive knowledge base of easy-to-follow guides and tutorials.

Want to know more? Explore our NordVPN review to see the full results of our research and testing.

Limited time offer: Get up to 70% off

Stream Solar Opposites with NordVPN!

  • 3,000+ global servers, 20+ US locations
  • Lightning-fast speeds and unlimited bandwidth
  • Built-in speed test
  • Excellent 24/7 live chat
  • 30-day money-back guarantee
  • Works with: Hulu, پراکسی iPlayer, Netflix, Crunchyroll, Amazon Prime Video, Sling TV, ITV Hub
  • Compatible with: Windows, macOS, iOS, Android, Linux, routers, browsers

ExpressVPN’s unbeatable network speeds allow for the smooth streaming of Solar Opposites on Hulu. I know this for a fact as I tested ExpressVPN’s US servers to stream several Hulu shows and the 82 Mbps speeds ensured I experienced no buffering, lag, or frozen pixels.

Don’t take my word for it, test out the lightning-fast speeds of ExpressVPN for yourself with a risk-free 30-day money-back guarantee.

From ExpressVPN’s 20+ US server locations, I selected three random servers, and with each one I could blast through Hulu’s geoblocks. Thanks to speedy connections, I was watching Solar opposites in vibrant HD in minutes.

ExpressVPN apps are compatible with a huge number of devices and you can connect five to the VPN at once. This means you can share your subscription with friends and stream Solar Opposites together.

You can even stream on some devices that don’t support an ExpressVPN app thanks to the MediaStreamer feature. By following one of the many simple tutorials on the ExpressVPN website, I was able to stream Solar Opposites on my LG Smart TV in minutes.

Customer service doesn’t end with tutorials. Hands-on help is available around-the-clock via friendly and helpful 24/7 live chat.

Want to know more? Explore our ExpressVPN review to see the full results of our research and testing.

This won’t last long: Get 49% off AND 3-months free

Stream Solar Opposites with ExpressVPN!

Surfshark

  • 1,700+ global servers 20+ US server locations
  • Unlimited bandwidth and fast speeds
  • Quick Connect feature
  • 24/7 live chat
  • 30-day money-back guarantee
  • Works with: Hulu, Netflix, Sky Go, پراکسی iPlayer, HBO, ITV Hub, Amazon Prime Video
  • Compatible with: macOS, iOS, Linux, Android, Windows, routers, browsers

Speedy and reliable, the Surfshark global network includes server locations in over 20 US cities. I was able to beat Hulu’s geo-restrictions with servers in every one I tested.

Plus, by using the Quick Connect feature, I was automatically connected to the fastest US server. My speeds dropped slightly from a starting speed of 55.73 Mbps to 53.26 Mbps, but that’s still more than enough to stream Solar Opposites in HD.

Test the Quick Connect feature before making a commitment to Surfshark with a 30-day money-back guarantee. You’ll also be able to test the VPN on all your gadgets as Surfshark has great device compatibility and the rare perk of unlimited simultaneous connections.

Binge-watch the entire season of Solar Opposites without worrying about a lost connection courtesy of unlimited bandwidth and data. I streamed with Hulu for hours and Surfshark kept up – not a single dropped connection and no long loading times.

The customer support team is available day and night via 24/7 live chat. When I asked a few questions about Surfshark’s service, I wasn’t waiting long for a response.

Want to know more? Explore our Surfshark review to see the full results of our research and testing.

Get a 2-year plan discounted by 83%

Stream Solar Opposites with Surfshark!

  • 700+ servers worldwide, 8 US server locations
  • Beat geoblocks with the Chameleon protocol
  • Great streaming speeds and unlimited bandwidth
  • 24/7 live chat support
  • 30-day money-back guarantee
  • Works with: Hulu, پراکسی iPlayer, Netflix, Amazon Prime Video, Apple TV+, Disney+
  • Compatible with: Windows, macOS, iOS, Android, Linux, and some routers

VyprVPN’s server network may be on the smaller size, but it’s high-speed servers in eight US cities provide hassle-free streaming of Solar Opposites.

I tested several US servers and consistently experienced speeds of over 55 Mbps – way over the 5 Mbps required to stream in HD. I experienced no buffering or lag and enjoyed a crystal clear picture when watching Solar Opposites.

Want to test out streaming with VyprVPN? Take advantage of the 30-day money-back guarantee to try out all the VPN’s features with absolutely no risk.

Dynamic server switching stops any dropped connections or a dip in performance by automatically moving you to another US server should your current one become overcrowding. Binge-watch Solar Opposites worry-free.

You’re guaranteed a reliable connection to Hulu thanks to the Chameleon Protocol, which disguises your VPN data as regular data, to help you slip past geoblocks. I had no issue connecting to Hulu and streaming Solar Opposites on every US server I tried.

Keep the entire household occupied with VyprVPN’s five simultaneous connections, so you can stream Solar Opposites and other great Hulu content in peace.

This premium VPN is compatible with a wide range of devices, but if you are having any trouble with installation, you can get in touch with the customer service team through email or 24/7 live chat support.

Want to know more? Explore our VyprVPN review to see the full results of our research and testing.

Hurry and get up to 81% off

Stream Solar Opposites with VyprVPN!

  • 150+ servers in 60 countries, 14 US servers
  • Designated streaming servers
  • Reliable streaming speeds
  • 30-day money-back guarantee
  • Live chat and email support
  • Works with: Hulu, پراکسی iPlayer, Netflix, Amazon Prime Video, Disney+
  • Compatible with: Routers, browsers, Linux, macOS, Windows, iOS Android, Kodi

A low-cost VPN with plenty of power, PrivateVPN is a great choice for streaming Solar Opposites online with Hulu.

PrivateVPN operates a compact network with just 14 US servers, but I had no problem connecting to Hulu with each one I tried, including the designated streaming servers.

Put the unblocking powers of PrivateVPN to the test with absolutely no upfront cost with a 7-day free trial. It also offers a 30-day money-back guarantee.

The speeds of US servers can vary, but with a few US servers, I was regularly achieving speeds around 10 Mbps. While the speeds could have been better, I could still enjoy Solar Opposites with no buffering or lag. Unlimited bandwidth also allows you to watch as much as you want with no worries about data caps.

Six device connections are allowed at once, so you can share your PrivateVPN connection with the family and they too can stream their favorite restricted shows. I streamed with PrivateVPN on several devices at once with no sacrifice to performance and speed.

Although PrivateVPN’s live chat support is not available 24/7, if you connect to the service during business hours (in Sweden), you can expect a quick and helpful response in minutes.

Want to know more? Explore our PrivateVPN review to see the full results of our research and testing.

Huge discount available now, save 86% on your subscription

Stream Solar Opposites with PrivateVPN!

FAQ

🚧 I’m using a VPN, why has Hulu blocked my connection?

It could be that you’re connected to a server known to Hulu to be from a VPN. Hulu uses anti-VPN technology to prevent users from outside the US from accessing the service.

It’s an easy problem to fix. Simply disconnect from your current US server and connect to another. You should now be able to stream Solar Opposites, but if you’re still having an issue clear your cache and cookies, and restart your device.

Learn more about bypassing VPN blocks here.

🆓 Can I use a free VPN to stream Solar Opposites?

It’s unlikely that a free VPN will be able to bypass Hulu’s geoblocks. Plus, free VPNs often compromise your privacy by collecting and selling your data, as well as expose you to malware, adware, and hackers.

Ensure you stay safe when streaming and enjoy a reliable connection to Hulu by sticking with a trustworthy VPN. Remember, you can try each of my premium VPN recommendations for free for a limited time, with money-back guarantees. Read this article to see why free VPNs are unsafe to use.

📺 Can I unblock other streaming services with my VPN?

Absolutely! Premium VPNs have widespread global server networks that are capable of unblocking dozens of streaming services around the world. Check out the ‘Key Features’ sections of my VPN recommendations to see a selection of streaming services they can access.

Bottom Line

Stream Solar Opposites from anywhere, using a top-rated VPN, such as NordVPN, to bypass Hulu’s geoblocks.

I’ve tested all of my VPN recommendations thoroughly and each will blast through Hulu’s geoblocks and provide the fast server speeds needed for the smooth streaming of Solar Opposites. Test them out for yourself, risk-free with money-back guarantees.

Watch Solar Opposites Now!

Best Practices VPN Routing

Looking for some advice from companies that connect their remote worker devices to the corporate network via VPN. Do most companies implement some form of split tunneling to decrease the load on the corp network or do they prefer all the traffic to pass through the corporate network in order to provide the best protection for the end device?

Maybe this is an all the above question, but just curious if there is a conciseness out there between balancing security and back-end loading?

Thanks,

Bob

خرید فیلترشکن

New Android Malware Steals 2FA Codes and Banking Passwords

May 10, 2020

Android’s reputation has been somewhat tarnished over the years due to the copious amounts of malware that has cropped up for the mobile OS. Sometimes even managing to make its way to Google’s own Play Store. Well, more Android malware has been found, and this time very sophisticated. Dubbed EventBot, security researchers discovered this new malware has the ability to not only steal banking passwords but also 2FA codes. 

A look at EventBot

EventBot works by pretending to be a legitimate Android app, such as Adobe Flash, or Microsoft Word for Android. EventBot then takes advantage of Android’s accessibility features to obtain low-level access to the operating system. EventBot can steal passwords from more than 200 banking and cryptocurrency apps, and can even steal 2FA codes sent via text message. Some of the impacted apps include PayPal, Coinbase, CapitalOne, and HSBC. These stolen passwords are sent back to the malware operator’s servers for future use. 

EventBot can also record every single action on the device. It can even read notifications from other apps, making it easy for the attackers to piece sensitive information together. 

The researchers believe that EventBot is a completely new malware, having found no evidence of copying other currently in-the-wild Android malware. 

EventBot is still evolving 

The security researchers at Cybereason found that over the few weeks they have been monitoring EventBot, it has had constant development. Assaf Dahan, head of threat research at Cybereason told TechCrunch “The developer behind EventBot has invested a lot of time and resources into creating the code, and the level of sophistication and capabilities is really high.”

The security researchers found that every few days, new features were being added to the malware. For example, at one point they found that the malware operators had improved the encryption being used to phone home to the operator’s server. Another added feature was the ability to capture the lock code of the device. Possibly to allow the malware to gain even higher privileges to Android. 

As it currently stands, no one has a clue as to who is behind this new EventBot malware. More investigation will surely take place, but as of now, the operators are doing their very best to obfuscate the source of EventBot. 

How can you avoid EventBot?

The best thing you can do to avoid EventBot is to not download and install apps from unknown sources, such as third-party app stores. Whilst it is true that the Play Store is far from perfect when it comes to keeping malware out, it is often still better curated than other stores. Even when downloading apps from the Play Store, make sure to stick to well-known and verified apps. 

2FA is still important! 

Whilst EventBot can steal 2FA codes via text, 2FA is still by far the best thing you can do to secure your online accounts. Do not be dissuaded due to such malware. 2FA will still protect you from the vast majority of online account hijacking attempts. So, where available, make sure to enable 2FA. Preferably through an app or physical security key, as SMS is not the best authentication method. Though it is still better than nothing, especially as many services only offer SMS 2FA at the moment, particularly banks.