Norton VPN  VPN Review

Reviewed Mar 31, 2025 at 12:20pm
Writing modified Mar 02, 2026 at 12:25pm
Tested using Methodology v0.10.1 
Norton VPN
7.8
Torrent 
5.5
Private Browsing 
5.0
Policies & Practices 
6.2
Security 
7.4
Speed 
 0

Norton VPN is a service offered by Norton, a US-based company owned by Gen Digital. It's a fairly straightforward service without a particularly comprehensive feature set, but it still has the basics like P2P (torrent) support, geolocation switching, and no data limits.

It's available as part of the Norton 360 security suite or as a standalone service. For more details, see the Differences Between Variants section.

Our Verdict

7.8
Torrent 

Norton VPN is good for torrenting. It has acceptable security that keeps your IP address and DNS queries hidden while you use it. That said, the kill switch doesn't function properly, as it allows you to reconnect to the internet outside the VPN tunnel after a system reboot or a loss of internet. It has no registration options that preserve your anonymity, as you must provide an email address and password to create an account and use a personally identifiable payment method. Fortunately, it has no data limits and allows you to download torrents.

Pros
  • Proper TLS implementation doesn't leave you vulnerable to man-in-the-middle attacks.

  • Doesn't leak your IP address or DNS queries.

Cons
  • No registration options that preserve anonymity.

  • Kill switch doesn't function reliably.

5.5
Private Browsing 

Norton VPN is a disappointing service for private browsing. While its policies contend the company doesn't retain any user traffic, the service does retain other information about your device's hardware and usage information from the VPN client. Norton's parent company has a long history of controversies and legal actions that also make it difficult to trust. Technically speaking, the VPN effectively keeps your IP address and internet traffic hidden, but the kill switch doesn't work effectively, leaking some of your traffic in the case of a software crash.

Pros
  • Doesn't leak your IP address or DNS queries.

Cons
  • No registration options that preserve anonymity.

  • Parent company has a long history of controversies.

  • Company collects and retains hardware and application data.

5.0
Policies & Practices 

Norton VPN has poor policies and business practices. While it has a no-logging policy that's been verified by independent security audits, its privacy policy indicates that the company collects and retains other application and hardware data from your device. Additionally, its parent company has a long history of controversy and legal actions, making it difficult to place full trust in.

Pros
None
Cons
  • Parent company has a long history of controversies.

  • Company collects and retains hardware and application data.

6.2
Security 

Norton VPN has acceptable security. It doesn't leak your IP address or DNS queries while you're connected to it, and it has proper TLS implementation, protecting you from man-in-the-middle attacks. Unfortunately, its kill switch doesn't work as intended, as it leaks some unencrypted traffic upon rebooting your system and after a software crash. This is a concern if you need all your traffic to be encrypted after a system crash.

Pros
  • Proper TLS implementation doesn't leave you vulnerable to man-in-the-middle attacks.

  • Doesn't leak your IP address or DNS queries.

Cons
  • Kill switch doesn't function reliably.

7.4
Speed 

We're testing this VPN's speed on an ongoing basis and will update this verdict when we have more data. See the Performance section of the review to look at the data we've collected so far.

  • 7.8
    Torrent
  • 5.5
    Private Browsing

  • Performance Usages

  • 5.0
    Policies & Practices
  • 6.2
    Security
  • 7.4
    Speed
  • Changelog

    1.  Updated Mar 02, 2026: 

      We've added text throughout the review to correspond with the new privacy tests in Test Bench 0.10.

    2.  Updated Jan 23, 2026: 

      We've updated the text throughout the review to reflect the changes from test bench 0.10.1.

    3.  Updated Jan 23, 2026: We've updated this review to Test Bench 0.10.1! This is a minor update to how we conduct our speed tests. Read the changelog for more info.
    4.  Updated Jan 15, 2026: We've updated our review to Test Bench 0.10! This update focuses on privacy and evaluates the trustworthiness of a VPN in keeping your personal information private. Read the changelog for more details.

    Check Price

    Differences Between Sizes And Variants

    Norton VPN offers three different plans that come bundled with additional features. We bought and tested the standard plan.

    Plan Maximum Devices Antivirus Password Manager Cloud Storage Parental Controls Dark Web Monitoring
    Standard 5 No No No No No
    Plus 5 Yes Yes 10GB No Yes
    Ultimate 10 Yes Yes 50GB Yes Yes

    Note that Norton Secure VPN also comes bundled in some tiers of the Norton 360 security suite.

    Popular VPN Comparisons

    Norton VPN offers middle-of-the-pack performance compared to other VPNs on the market. While it keeps your IP address and DNS queries hidden while you're connected to it, its kill switch doesn't work properly. That means if your computer restarts or your internet connection drops, unencrypted traffic can leak, exposing your IP address. Also, it doesn't have additional features like multi-hop and lacks feature parity across platforms, so your experience will differ significantly depending on which device you use. On top of that, Norton's privacy policy indicates they collect more data from you than many competing services, and its parent company, Gen Digital, has a history of controversies and legal actions that make the service difficult to trust.

    To see which services we recommend, check out our articles on the best VPNs, best VPNs for Windows PCs, or the best VPNs for privacy.

    Test Results

    perceptual testing image
    Sort:
    RATINGS
    Category:
    All
    Security
    9.0
    IP And DNS Leaks
    Leak Detected
    No
    In-Browser IP
    No Leak Detected
    In-Browser DNS
    No Leak Detected
    System DNS
    No Leak Detected
    System Traffic
    No Leak Detected
    2.0
    Kill Switch Robustness
    During System Reboot
    Leak Detected
    During Loss Of Internet
    Leak Detected
    Leak Detected
    Yes
    During VPN Software Crash
    No Leak Detected

    The kill switch doesn't work as intended, as network traffic leaks outside the VPN tunnel after a loss of internet connection and a system reboot. This is a concern if you need to keep all of your traffic encrypted at all times.

    8.5
    Man-In-The-Middle Attacks
    TLS Interruption Risk
    No Evidence
    Proper BGP Implementation
    No

    Like most VPN services, Norton Ultra VPN doesn't implement BGP properly on all its servers.

    Privacy
    4.3
    Privacy Policy
    No-Log Policy
    0
    Privacy Policy Audit
    7.5
    Legal & Security Events
    10
    Last Review Date
    2025-NOV-17

    While Norton VPN claims not to log your internet traffic, its privacy policy indicates that the company does collect and retain connection events, application events, hardware information, and app usage metadata. It's not specified whether this data is anonymized or how it's otherwise stored. Norton has, however, published independent audits that confirm the company handles user data in accordance with its policies.

    5.6
    Company Practices
    Parent & Affiliate Companies
    6.0
    Marketing Claims & Practices
    8.4
    Communication Transparency
    8.4
    Security Audits
    1.0
    Privacy By Default
    7.0
    Terms Of Service
    0
    Last Review Date
    2025-NOV-17

    Norton is owned by Gen Digital (formerly Symantec Corporation and NortonLifeLock Inc.), a cybersecurity company that has existed in different forms since 1982. The company has a long history of controversies and lawsuits, ranging from data breaches to patent infringement. There are several other cybersecurity companies in Gen Digital's portfolio that offer VPN services, including Avira, Avast, and AVG, and Noton's privacy policy indicates that your personal data can be transferred to any subsidiary within the corporate umbrella.

    Norton hasn't published any independent audits of its security infrastructure, but Gen Digital does offer a bug bounty program. The VPN's terms of service heavily favor the company, mandating arbitration, banning class action lawsuits, allowing the company to terminate accounts without cause, and can change without notice.

    5.4
    Registration
    Email Required
    Yes
    Password Required
    Yes
    Cryptocurrency
    No
    Cash
    No

    Users online have occasionally reported payment processing issues. We also experienced an issue where Norton's site couldn't process our credit card payment. We had to call customer support and have our payment information processed manually by the agent. Overall, this process was long, cumbersome, and decidedly not private since we had to share de-anonymizing personal information.

    You can pay with a credit card, PayPal, or Google Pay.

    Performance
    7.6
    Download Speed
    Without VPN
    1,158 Mbps
    With VPN
    231 Mbps
    Speed Difference
    -926.9 Mbps

    We're testing this VPN's performance on an ongoing basis, and will update the text for the download speed, upload speed, and latency tests when we have more data.

    7.8
    Upload Speed
    Without VPN
    997 Mbps
    With VPN
    305 Mbps
    Speed Difference
    -692.3 Mbps
    6.1
    Latency
    Download Latency Without VPN
    142 ms
    Download Latency With VPN
    259 ms
    Download Latency Difference
    117 ms
    Upload Latency Without VPN
    143 ms
    Upload Latency With VPN
    414 ms
    Upload Latency Difference
    271 ms
    Combined Latency Consistency
    ±53 ms
    Features
    9.5
    Downloads
    Torrent (P2P)
    Yes
    Data Limit
    N/A
    6.2
    Platform Support
    Windows
    Yes
    macOS
    Yes
    Linux
    No

    This VPN offers mobile apps for iOS and Android.

    Protocols
    WireGuard
    Yes
    OpenVPN Over UDP
    Yes
    OpenVPN Over TCP
    No
    IPSec With L2TP
    No
    IPSec With IKEv2
    Yes
    Proprietary Protocol(s)
    Mimic

    Mimic is a proprietary, closed-source protocol that obfuscates traffic by masking itself as an HTTPS connection. Norton advertises that it doesn't require additional configuration, uses less power, resists quantum attacks, and establishes connections quickly. We didn't test this protocol, but other reviews online have found that it has security vulnerabilities.

    6.8
    Simultaneous Devices
    Advertised Max Simultaneous Connections
    5
    Simultaneous Locations
    Yes
    Tested Simultaneous Connections
    5

    Norton VPN's ultimate plan includes an advertised maximum of 10 devices.

    7.9
    Destinations
    Countries
    40
    Countries With Multiple Cities
    7
    Server Choice
    No
    6.1
    Split Tunneling
    Disabling Of VPN For Specific Apps
    Yes
    Enabling Of VPN For Specific Apps
    No
    Splitting Based On Address
    No
    Ping Local Address - Same Subnet
    Yes
    Ping Local Address - Different Subnet
    No

    This VPN has a setting that advertises the ability to access local devices while connected to it, but we weren't able to access anything on a different subnet on our local network, even with the setting enabled.

    0.0
    Headless Setup
    Headless WireGuard Connection
    No
    Headless OpenVPN Connection
    No