F-Secure Freedome VPN review
Easy to use, effective and reasonably priced, but lacks advanced settings
F-Secure's Freedome VPN client is available for PC, Mac, Android and iOS, but you can't configure it with a router.
The software is straightforward, offering a choice of 27 locations majoring on Europe and North America there are only three Asian locations, while Central and South America aren't represented at all. There's a 14-day trial, after which yearly licences cost 40, 50 or 58 for three, five or seven devices.
In our limited testing, Freedome was among the best-performing VPN services. We experienced a small (1%) packet loss, but little slow-down in ping or connection speed when connected to F-Secure's London servers.
Our connection passed probes at DNSleaktest.com and scored highly at Whoer.net. A UK server connection let us watch iPlayer content, while this was one of only three services through which we could also view Netflix US content. Like most VPN services we tested, Freedome blocks P2P traffic in some regions a slightly heavy-handed way of ensuring its own legal compliance.
The Freedome client has almost no advanced settings, but it includes additional, software-based features including tracking and browser protection, and a private search engine. Based in Finland, it benefits from EU data-protection and commerce laws, yet is also outside the 14-eyes surveillance group.
F-Secure accepts anonymous payments and claims not to log usage or store user data. The service has strong privacy and is potentially effective at defeating geo-blocks. However, it's probably best suited to consumers and small firms due to its lack of advanced features.
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now