Endpoint Secure Connection

Why use a VPN?

VPN stands for Virtual Private Network. It establishes a tunnel within a so-called “insecure” network such as the internet.

What is a VPN?

To ensure that data exchanges are secure, a VPN performs three functions:

  • Authentication using a key to make sure that the devices are authorized to communicate with each other
  • Data encryption to guarantee the confidentiality of exchanges
  • Data integrity to ensure that data has not been tampered with

Discover the full range of TheGreenBow VPN Clients

We offer the most reliable and versatile range of VPN clients on the market for needs as varied as protecting connections while telecommuting or with connected objects, or even securing data exchanges within a network handling critical communications: they are interoperable with any IPsec or OpenVPN gateway, work with any type of network (Wi-Fi, 3G, 4G, 5G, satellite, etc.), are designed to integrate into any public key infrastructure (PKI) and to be deployed on a large scale.

Our VPN clients are available for Windows, Linux, Android, iOS, and macOS,

macOS

Read more
Protocols
OpenVPN
IPsec IKEv1
IPsec IKEv2
 
Cryptography
AES CBC/CTR/GCM 128-256
SHA2 256-512, DH 14-21
 
Authentication
Pre-shared key, EAP, Certificates
Tokens and smart cards
 
Network
IPv4
IPv6
 
Tunnel
Mode tout le trafic dans le tunnel
Multiple tunnels
 
Service continuity
DPD (Deep Peer Detection)
Redundant gateway
 
Deployment
Silent installation and configuration
Control software from the command line
 
Advanced features
Always-on
Trusted network detection
 
Certifications
Security certifications from ANSSI
Audited software
 
* N/A - Not applicable
 

Linux

Read more
Protocols
OpenVPN
IPsec IKEv1
IPsec IKEv2
 
Cryptography
AES CBC/CTR/GCM 128-256
SHA2 256-512, DH 14-21
 
Authentication
Pre-shared key, EAP, Certificates
Tokens and smart cards
 
Network
IPv4
IPv6
 
Tunnel
Mode tout le trafic dans le tunnel
Multiple tunnels
 
Service continuity
DPD (Deep Peer Detection)
Redundant gateway
 
Deployment
Silent installation and configuration
Control software from the command line
 
Advanced features
Always-on
Trusted network detection
 
Certifications
Security certifications from ANSSI
Audited software
 
* N/A - Not applicable
 

Linux Certified

Read more
Protocols
OpenVPN
IPsec IKEv1
IPsec IKEv2
 
Cryptography
AES CBC/CTR/GCM 128-256
SHA2 256-512, DH 14-21
 
Authentication
Pre-shared key, EAP, Certificates
Tokens and smart cards
 
Network
IPv4
IPv6
 
Tunnel
Mode tout le trafic dans le tunnel
Multiple tunnels
 
Service continuity
DPD (Deep Peer Detection)
Redundant gateway
 
Deployment
Silent installation and configuration
Control software from the command line
 
Advanced features
Always-on
Trusted network detection
 
Certifications
Security certifications from ANSSI
Audited software
 
* N/A - Not applicable
 

Windows standard

Read more
Protocols
OpenVPN
IPsec IKEv1
IPsec IKEv2
 
Cryptography
AES CBC/CTR/GCM 128-256
SHA2 256-512, DH 14-21
 
Authentication
Pre-shared key, EAP, Certificates
Tokens and smart cards
 
Network
IPv4
IPv6
 
Tunnel
Mode tout le trafic dans le tunnel
Multiple tunnels
 
Service continuity
DPD (Deep Peer Detection)
Redundant gateway
 
Deployment
Silent installation and configuration
Control software from the command line
 
Advanced features
Always-on
Trusted network detection
 
Certifications
Security certifications from ANSSI
Audited software
 
* N/A - Not applicable
 

Windows Enterprise

Read more
Protocols
OpenVPN
IPsec IKEv1
IPsec IKEv2
 
Cryptography
AES CBC/CTR/GCM 128-256
SHA2 256-512, DH 14-21
 
Authentication
Pre-shared key, EAP, Certificates
Tokens and smart cards
 
Network
IPv4
IPv6
 
Tunnel
Mode tout le trafic dans le tunnel
Multiple tunnels
 
Service continuity
DPD (Deep Peer Detection)
Redundant gateway
 
Deployment
Silent installation and configuration
Control software from the command line
 
Advanced features
Always-on
Trusted network detection
 
Certifications
Security certifications from ANSSI
Audited software
 
* N/A - Not applicable
 

Windows Enterprise Certified

Read more
Protocols
OpenVPN
IPsec IKEv1
IPsec IKEv2
 
Cryptography
AES CBC/CTR/GCM 128-256
SHA2 256-512, DH 14-21
 
Authentication
Pre-shared key, EAP, Certificates
Tokens and smart cards
 
Network
IPv4
IPv6
 
Tunnel
Mode tout le trafic dans le tunnel
Multiple tunnels
 
Service continuity
DPD (Deep Peer Detection)
Redundant gateway
 
Deployment
Silent installation and configuration
Control software from the command line
 
Advanced features
Always-on
Trusted network detection
 
Certifications
Security certifications from ANSSI
Audited software
 
* N/A - Not applicable
 
 

macOS

Read more

Linux

Read more

Linux Certified

Read more

Windows standard

Read more

Windows Enterprise

Read more

Windows Enterprise Certified

Read more
 
Protocols
OpenVPN -
IPsec IKEv1 - -
IPsec IKEv2
 
Cryptography
AES CBC/CTR/GCM 128-256
SHA2 256-512, DH 14-21
 
Authentication
Pre-shared key, EAP, Certificates
Tokens and smart cards - -
 
Network
IPv4
IPv6 - -
 
Tunnel
Mode tout le trafic dans le tunnel
Multiple tunnels - -
 
Service continuity
DPD (Deep Peer Detection)
Redundant gateway -
 
Deployment
Silent installation and configuration - -
Control software from the command line - -
 
Advanced features
Always-on - - - -
Trusted network detection - - - -
 
Certifications
Security certifications from ANSSI - - - -
Audited software - - - -
* N/A - Not applicable
  Test Buy Test Buy Buy Test Buy Test Buy Test Buy

Subscribe to our newsletter

Newsletter

X