We commissioned a third-party audit for the infrastructure behind our VPNs. Here are the results.
www.malwarebytes.com
For the careful
VPN customer today, so much depends upon a privacy promise, made, too often, by a company without proof.
No-logs policies, modern encryption algorithms, a refusal to store sensitive customer information, and full ownership of servers are just some of the features that contribute to a strong VPN. Yet they’re the same features that are often impossible for any
individual customer to confirm.
This is why it is so important for VPN providers to participate in a third-party audit, which allows external security experts to review the software and hardware that a company has developed and deployed to operate its VPN service. Like a home inspection that exposes signs of damage, a VPN third-party audit exposes the security vulnerabilities that may reside in one of the most important pieces of privacy technology today.
So, we are proud to have participated in our first-ever third-party audit for
the infrastructure that now powers both Malwarebytes Privacy VPN and AzireVPN—the two VPN products that we operate and maintain. This dual structure is the result of our
purchase of AzireVPN in late 2024. Both products use the same server software and hardware to provide customers with VPN connections and encryption services.