With over 3 million people trusting us, PureVPN strives to be the best. Here’s how we at PureVPN seek to win your trust.
2- Ensuring your online security is our constant priority at BokorVPN.
3- Explore the security measures we implement and the validation/testing practices we utilize to maintain the utmost security for your data at all times.
BokorVPN's infrastructure incorporates a robust authentication mechanism at every level. Access to our VPN servers is managed through a centralized access manager, evaluating access requests. Once approved, time-bound access is granted with a one-time password (OTP). Additionally, our code repository is secured using Multi-Factor Authentication. IP whitelisting is a mandatory requirement for accessing our infrastructure.
Our engineering process prioritizes security assessments from the Epic/Grooming phase until the application goes live. The code review process adheres to the 'four-eye' principle, involving multiple teams in reviewing code before merging into release and master branches. We integrate a security scanning tool for static code assessment into our continuous integration (CI) process, addressing identified bugs before production rollout. Additionally, we engage a reputable third party to conduct application security assessments using advanced testing methodologies.
To prevent any traffic leakage from the VPN tunnel, BokorVPN has developed open-source tools designed to test for leakages, conveniently accessible on our website.
Components of client-side applications running in privilege mode for essential functionality, such as adding firewall rules, undergo protection measures, including memory protection, strong authentication, and permitting only authorized actions to non-privileged users.
Our automated vulnerability management program conducts weekly scans, addressing reported vulnerabilities promptly. Any ad hoc vulnerabilities reported randomly undergo testing and swift resolution across the entire infrastructure. Our employees subscribe to CVE announcements for all in-production software to bolster the Vulnerability Management Program. Furthermore, policy compliance scans are regularly scheduled to monitor security baseline configurations continuously.
We've deployed an intrusion detection and prevention system across our infrastructure and cloud assets to proactively counteract attacks and receive timely alerts for potentially malicious events. All traffic is directed through a Web Application Firewall, effectively mitigating platform attacks such as DDoS and web application attacks.
BokorVPN has instituted a comprehensive penetration testing program. Our employees are tasked with penetration testing our infrastructure and apps during engineering streams. Additionally, a trusted third-party firm is engaged to conduct thorough testing across all platforms.
At BokorVPN, our application and infrastructure deployment is entirely automated, eliminating the human element from the process. International security benchmarks are integral to our security baseline configuration at BokorVPN. We deploy hardened images using automated configuration management tools.
All firewalls are set to deny traffic by default, allowing only authorized protocols and intended traffic after undergoing the change assessment process.
For relevant tasks, dedicated workstations are utilized to access production systems, ensuring they are hardened for specific functions. This approach enables us to deliver optimal services to our users with embedded quality and security assurance. All services and operations operate under the least privileged model to minimize the attack surface.
Monitoring agents are incorporated into the configuration baseline to ensure automated compliance and integrity of critical files.
Our web architecture is segregated, with website servers devoid of hosting any data and having no direct access to databases. We adhere to best practices by implementing API gateways with limited exposure, allowing only intended data views. The attack surface is further minimized by restricting consumer interaction with business logic.
Users are prohibited from exporting any personally identifiable information of consumers. User systems are subject to a device security policy, utilizing predefined hardened images.
Endpoint security controls are in place to counteract the spread of malware and host system attacks. Rigorous URL monitoring ensures the blocking of potentially malicious sites.
Regular system patching is carried out through an automated tool. Endpoint security features include host-based network firewalls, intrusion detection and prevention systems, security baseline benchmarking, application control, restricted access to removable storage, privilege ID control, and ongoing host monitoring through a centralized solution.
All personnel, encompassing both employees and contractors, actively participate in the BokorVPN security awareness program from the moment they join the company until they pursue opportunities beyond BokorVPN. We prioritize ensuring that all employees and contractors comprehend the security requirements at BokorVPN, emphasizing that cybersecurity is an integral aspect of their work philosophy.
Given our global customer base, it is imperative that our employees, suppliers, and contractors grasp the significance of cybersecurity measures in safeguarding customer data. We meticulously screen our employees and contractors against both human and technical security requirements, including assessing the security clearance of employees and verifying third-party security compliance certificates for vendors and partners.
Indeed, in this section, we will dissect the four primary factors that enable BokorVPN to safeguard your data from leaks.
External auditors from KPMG have certified us as a 'no-log' VPN Service Provider, conducting random checks to ensure that we do not log any VPN data from our customers.
What does 'no-log' mean for you?
It signifies that we do not retain any data generated when you use BokorVPN. We have no visibility into your online activities, and there is no linkage back to you whatsoever. For additional insights into how KPMG evaluates BokorVPN, you can refer to this article: 'BokorVPN Excels KPMG’s Always-On Audit Setting an Industry Benchmark.' When you seek customer support, our Customer Success Agents can only access your account through a pre-approved IP address and verify their identity through Multi-Factor Authentication (MFA). We utilize a third-party payments provider for processing your BokorVPN subscription, ensuring that we do not have access to any of your credit card details or payment information.
In 2021, we relocated the legal jurisdiction of BokorVPN to the British Virgin Islands.
As a result, we are not under any legal obligation to retain any form of data.
For further details on the reasons behind our headquarters move, you can explore this article: 'BokorVPN Moves From Hong Kong To British Virgin Islands.
The GDPR (General Data Protection Regulation) outlines a set of rules mandating businesses to safeguard the personal data of individuals using their online services and resources.
It is a legal obligation for us to adhere to these rules, which encompass seeking your consent before sharing any of your BokorVPN customer data with third parties. Failure to comply could result in severe consequences. These regulations were instituted in 2018, and we have consistently ensured BokorVPN's compliance since their implementation.
For a detailed understanding of our privacy policy, you can review it here:
These keys play a crucial role in safeguarding your usage of BokorVPN by helping prevent cyber threats, such as the unauthorized acquisition of your password through a Brute Force attack.
Currently, this additional (though not essential, but forward-thinking) layer of BokorVPN protection is accessible only to users in the following areas:
- Australia
- Canada
- Netherlands
- UK
- USA
Rest assured, we are actively working on extending this feature to all BokorVPN users, regardless of their location.
We are dedicated to constructing a safer and more equitable internet for everyone. This commitment involves candidly sharing insights into how we navigate challenges, whether they involve emergencies or intellectual property.
To access all our transparency reports, simply click the ‘See all reports’ button below.
Indeed, law enforcement agencies have the authority to request data from any individual.
Nevertheless, we do not retain any data that can lead to your direct identification.
As of December 1, 2023:
You are encouraged to revisit this page monthly to ascertain whether there have been any law enforcement requests.
We ensure accountability by having an external entity monitor our operations. This practice safeguards the integrity of BokorVPN, ensuring we can consistently deliver a uniquely safe and private VPN experience for you.
Verified by a Leading Auditor
for the Fourth Consecutive Time
We’ve set an industry standard with our fourth consecutive evaluation of the no-log policy conducted by a renowned audit firm. The recent comprehensive technical assessment encompassed VPN servers, configurations, and supporting infrastructure across various locations.
Our dedication to user transparency and data protection stands strong. In alignment with this commitment, we willingly undergo periodic independent technical assessments to affirm our adherence to the privacy policy.
Aligned with the VPN Trust Initiative (VTI), we are dedicated to advancing a safer digital landscape. As a participant in VTI, we take a leading role in enhancing online security, fostering trust, and promoting understanding for all VPN users. Join us on the journey toward a more secure Internet, where the synergy of security and trust creates a seamless experience.
Explore our commitment and the impactful initiatives of VTI in more detail by reading this article:
If BokorVPN doesn’t meet your expectations within the first 31 days, let us know, and we’ll provide you with a full refund.
Copyright Bokor Vpn © 2023. All rights reserved