NordVPN review

NordVPN is great value and offers high levels of security and privacy

Editor's Choice
Price
£49
  • No logging; Broad geographical coverage; Good value
  • Features vary by server

NordVPN is operated under Panamanian jurisdiction, and promises no data logging whatsoever. It meets the other PrivacyTools.io criteria including those for encryption and Bitcoin payments.

You can connect up to six devices on a single account, and configure a supported router for other devices. There's an easily configured kill switch, which immediately stops traffic from selected apps should your VPN connection fail. Almost no inbound ports are blocked, and P2P traffic is allowed on a small sub-group of the claimed total of 557 servers, which spans 49 countries. 

NordVPN's PC app is simple, displaying a list of territories, or a more detailed list of servers grouped into use cases such as 'Ultra-fast TV', VPN and 'double VPN' - an unusual two-step service routing your VPN traffic through a second VPN. DNS leak protection is enabled - and effective - by default, and Whoer.net tests showed no obvious problems on UK servers.

Unfortunately this wasn't the case on every server - we found a wide variation by server in how well our use of a VPN was stealthed, with some servers having been blacklisted at the time of our tests.

While iPlayer content did work, a Netflix crackdown meant that we couldn't stream US content on any server we tried, even using the Smart-Play feature. The need to pick among servers for some features makes NordVPN more cumbersome than most, but otherwise it effectively combines privacy and performance, making it good value.

Featured Resources

Shaping the workplaces of the future

Rise to the challenge

Download now

Enabling a hybrid future

A guide to setting up new working practices

Download now

Seven steps to successful digital innovation and transformation

What to invest in and what to avoid when pursuing digital transformation

Watch now

Defend your organisation from evolving ransomware attacks

Learn what it takes to reduce risk and strengthen operational resiliency

Download now

Most Popular

Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021
GitHub to prohibit code that’s used in active attacks
cyber security

GitHub to prohibit code that’s used in active attacks

7 Jun 2021
WWDC 2021: Apple unveils iOS 15, macOS Monterey and more
iOS

WWDC 2021: Apple unveils iOS 15, macOS Monterey and more

8 Jun 2021