
OpenVPN CloudConnexa / VPN and ZTNA as a Service
OpenVPN Inc.Reviews from AWS customer
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
109 reviews
from
External reviews are not included in the AWS star rating for the product.
OpenVPN
What do you like best about the product?
Its provide high security to our organisation . through then openvpn we can access organisation url anywhere with high security. it is also ease to use .its implemention is also user frindly to our organisation.
What do you dislike about the product?
some time it require high technical skill to implement into any organisation. its costly.
What problems is the product solving and how is that benefiting you?
by implementing OpenVPN into my our organisation leads high security and protech our customer data save and secure . Also No one can access our customer data without admin permission thats why we can use OpenVPN into our organisation.
Secure, Reliable, and Easy-to-Manage Cloud VPN Solution
What do you like best about the product?
Connecting remote teams securely across various locations is made easy using OpenVPN CloudConnexa. Even in complex contexts, the platform is incredibly easy to use and deploys quickly. One significant benefit is its scalability, which allows us to quickly add or remove users and devices as needed. I particularly value the robust encryption, thorough logging, and granular control over access policy management. Troubleshooting is simple because the documentation is clear and the support staff is quick to respond. All things considered, it offers enterprise-level protection at a relatively affordable price.
What do you dislike about the product?
The primary issue is the sporadic latency that occurs while connecting from locations distant from OpenVPN servers. This can marginally impair performance for apps that require a lot of bandwidth. Although it works well, the UI may use some dashboard personalization and a more contemporary look. Additionally, as compared to larger competitors, the comprehensive reporting and analytics options are a little more limited. Lastly, although the support materials aid in bridging this gap, the first learning curve for administrators who are unfamiliar with VPN technology can be somewhat steep.
What problems is the product solving and how is that benefiting you?
The problem of ensuring that scattered teams have safe, dependable remote access to corporate resources is being resolved by OpenVPN CloudConnexa. It guarantees that workers from various places can connect securely without disclosing private systems to the general public. Additionally, it makes it easier to control user access, enforce uniform security regulations, and simplify the upkeep of on-premise VPN servers. The advantages include more productivity for remote workers, easier IT management, and comfort in knowing that our conversations and data are safeguarded by centralized controls and robust encryption.
easy to implement
What do you like best about the product?
easy to implement, good documentation with basic understanding using doc any engineer can deploy to small or big org
What do you dislike about the product?
Presales team technical knowledge is not upto the mark, should not take a day or two to resolve basic query.
What problems is the product solving and how is that benefiting you?
connecting different environment with single connection
Easy to use set it and forget it
What do you like best about the product?
Easy to use I have to use it every day for work I can set it to automatically turn on each day.
What do you dislike about the product?
No issues that I can think of. Its easy to use and it always running in the background.
What problems is the product solving and how is that benefiting you?
Working in finance you need to be able to tailor your vpn to ensure you can access certain sites such as 3ds this enabled us to change our details quickly and effectively.
How an Agent helped me along the way!
What do you like best about the product?
Very direct service with strong levels of security.
What do you dislike about the product?
There hasn't been a negative with their service so I don't have a dislike.
What problems is the product solving and how is that benefiting you?
Operating as our VPN they are the security we utilize to access a portion of your service.
Great Experience with OpenVPN Support – Quick and Clear Answers
What do you like best about the product?
Setting it up was quick, and I didn’t need to do anything too technical. It helps me and my team everyday connect securely from anywhere. I also really like how everything is managed in one place. The support team is great too—they reply fast and are very helpful
What do you dislike about the product?
I would have appreciated it if the app connected automatically when the computer starts, instead of needing to click a button each time. But honestly, that’s just a small thing—I’m only mentioning it because the review asked for something I dislike
What problems is the product solving and how is that benefiting you?
It solves the problem of needing a safe connection when I’m working remotely or on public Wi-Fi.
Amazing product with marvelous support
What do you like best about the product?
Easy to setup and configure. Technical support team very responsive and knowledgeable to resolve issues. Performance through the VPN tunnel is very good.
What do you dislike about the product?
Although the pricing looks fair for this wonderful product, when you have to convert the $US price to local currency at a rate of almost 20:1 it is a bit expensive.
What problems is the product solving and how is that benefiting you?
Secure access for a distributed team to distributed servers and services. CloudConnexa is adding a big layer of protection.
My 3 year journey with OpenVPN CloudConnexa
What do you like best about the product?
Over the past three years of our CloudConnexa journey, we've surpassed 1,000 active connections, a testament to the platform’s seamless integration capabilities and, most importantly, the reliability of those connections.
What do you dislike about the product?
One drawback I’ve experiencing is that creating multiple new network connections through the UI can be time-consuming, as each network must be created sequentially rather than in bulk.
What problems is the product solving and how is that benefiting you?
In our business, we connect thousands of small business locations to our platform. OpenVPN Cloud has been instrumental in enabling a VPN model for these locations with minimal configuration effort, allowing us to scale quickly and securely.
Impressed with the latest security features (Shield needs work)
What do you like best about the product?
All in all, lately there have been quite a few improvements (beta features), especially around security. As a customer, it gives a lot of confidence that the service is being actively improved.
Specific features I really like:
- Location Context. If you only operate from certain countries, this is a quick no-brainer to turn on. You can customise with access groups to further limit (e.g., all your devs are based in the UK, whilst the sales team is based in the US).
- Device Posture. It's easy to create policies like "only allow Windows 11+, with Defender, and Full Disk Encryption" to connect to the VPN or to specific subnets.
- "Device Verification with Learn and Enforce" + "Device allowances number" + "device posture" makes sure that only the devices you want are allowed on the VPN.
- "DNS Logs" paired with "Log Streaming" is great for forwarding vpn logs to a centralized SIEM for alerting and investigations.
- It integrates well with Google as the IDP with SAML. Also, the mapping of IdP groups to OpenVPN Groups, which you can then use to restrict access to specific subnets (e.g., members of devs@company.com have access to subnets X & Z, whilst members of admins@company.com can access subnets X, Z, & Y).
- Shield, which does some filtering even with split tunneling turned on. More on improvements later.
- Good how-to guides and great & prompt support from the engineers!
Specific features I really like:
- Location Context. If you only operate from certain countries, this is a quick no-brainer to turn on. You can customise with access groups to further limit (e.g., all your devs are based in the UK, whilst the sales team is based in the US).
- Device Posture. It's easy to create policies like "only allow Windows 11+, with Defender, and Full Disk Encryption" to connect to the VPN or to specific subnets.
- "Device Verification with Learn and Enforce" + "Device allowances number" + "device posture" makes sure that only the devices you want are allowed on the VPN.
- "DNS Logs" paired with "Log Streaming" is great for forwarding vpn logs to a centralized SIEM for alerting and investigations.
- It integrates well with Google as the IDP with SAML. Also, the mapping of IdP groups to OpenVPN Groups, which you can then use to restrict access to specific subnets (e.g., members of devs@company.com have access to subnets X & Z, whilst members of admins@company.com can access subnets X, Z, & Y).
- Shield, which does some filtering even with split tunneling turned on. More on improvements later.
- Good how-to guides and great & prompt support from the engineers!
What do you dislike about the product?
At the moment, "Shield" seems to be targeting metrics more than security. Domains and traffic only show aggregated data, useful for stats and trends, but it lacks the granularity that would make it useful during an incident response.
For example: Shield > Overview > Blocked traffic: only shows the category "Vulnerability/Exploits" and, when double-clicked, it shows the device name (useful), a percentage (useful for stats but not for investigations), a count (marginally useful for investigations as you can determine how many users hit it), but the most important aspects are missing: which domain was being resolved and when it was visited (or resolved). I'd like better visibility of which specific domains each user/device has visited, with timestamps, which would greatly help incident responses. Ideally, you would have:
{
timestamp (currently missing),
domain (currently missing),
reason for blocking/flagging/severity/class (present but needs improvements),
device_id (present),
user_id (present)
}
And I'd love those entries to then be forwardable to an external SIEM via the Log Forwarding.
For example: Shield > Overview > Blocked traffic: only shows the category "Vulnerability/Exploits" and, when double-clicked, it shows the device name (useful), a percentage (useful for stats but not for investigations), a count (marginally useful for investigations as you can determine how many users hit it), but the most important aspects are missing: which domain was being resolved and when it was visited (or resolved). I'd like better visibility of which specific domains each user/device has visited, with timestamps, which would greatly help incident responses. Ideally, you would have:
{
timestamp (currently missing),
domain (currently missing),
reason for blocking/flagging/severity/class (present but needs improvements),
device_id (present),
user_id (present)
}
And I'd love those entries to then be forwardable to an external SIEM via the Log Forwarding.
What problems is the product solving and how is that benefiting you?
It's a VPN, so grants users remote access to (cloud) infra. It's easy to deploy, seems to consistently improve its security features, great (human!) support, and it's quite cost-effective
Very Satisfied
What do you like best about the product?
THey went beyond the call to solve my issue.
What do you dislike about the product?
I don't have a bad experience. My route was a bit out of date and I was unable to use the service.
What problems is the product solving and how is that benefiting you?
Remote access to an industrial PLC and Webserver. They were not able to help as the router was a lower version
showing 1 - 10