NCP engineering Releases New VPN Clients for macOS Catalina

In Version 4.0, NCP’s macOS Clients Support Dual Stack IPv4/IPv6

SUNNYVALE, Calif.–(BUSINESS WIRE)–#AppleNCP engineering today announced the release of its new macOS Clients version 4.0. The NCP Secure Enterprise macOS Client 4.0, the NCP Secure Entry macOS Client 4.0, and the NCP Exclusive Remote Access macOS Client 4.0 include a network adapter for IPv4/IPv6 and provide full compatibility with macOS Catalina 10.15. The new macOS Clients are also certified by Apple.

NCP has also extended IPv6 support in its VPN client. The IPv4/IPv6 dual stack support enables the use of both IPv4 and IPv6 protocols within the VPN tunnel. Split tunneling can be configured separately for IPv4 and IPv6 protocols. VoIP via IPv4 and IPv6 can also be used in combination with the new virtual network adapter. The handling of DNS requests through the VPN tunnel or in split tunneling configurations past the tunnel has also been improved in the new client.

The NCP Secure macOS Clients are designed as highly secure communication software for use in any remote access VPN environment. Advanced security features include an integrated dynamic personal firewall, data encryption, strong authentication (including fingerprint authentication), multi-certificate support, and IKEv2 support with IKEv2 Redirect.

For user convenience, the client has a modern user interface and an optional FIPS mode that can be selected when installing the client. Administrators can provide an initial configuration for the NCP Secure Enterprise macOS Client, making it considerably easier to deploy the VPN solution. The macOS keychain can also be used as a certificate store.

“Our new macOS Clients provide enhanced security features to prevent unauthorized access on corporate networks and mobile devices,” said Patrick Oliver Graf, CEO of NCP engineering. “An intuitive graphical user interface also shows all connection and security states before and during data connections.”

The NCP Secure Enterprise macOS Client is a component of NCP’s “Next Level Remote Access Technology” and, in combination with the NCP Secure Enterprise Management and the NCP Secure Enterprise VPN Server or the virtual appliance, offers a complete solution for a centrally managed remote access VPN.

The NCP Secure Entry macOS Client is designed for smaller VPN projects with up to 50 mobile workstations without a central management solution. It is compatible with all common IPsec VPN gateways.

Download a full-featured 30-day trial of the NCP Secure Entry macOS Client here: The NCP Exclusive Remote Access macOS Client 4.0, compatible with Juniper Networks® SRX Series firewalls, is also available for download and is administered via NCP Exclusive Remote Access Management.


To learn more, please see the corresponding product pages:

Reach NCP engineering on its blog, VPN Haus, or LinkedIn, Twitter, Facebook or YouTube.

About NCP engineering

Since its inception in 1986, NCP engineering has delivered innovative software that allows enterprises to rethink their remote access, and overcome the complexities of creating, managing and maintaining secure network access for staff.

NCP’s award-winning product line spans the spectrum of remote access, from IPsec/SSL VPNs to endpoint firewalls and network access control (NAC) functions. The company’s products support organizations with complex remote user needs, and that want to leverage the latest end-devices to increase staff productivity, reduce network administration and adapt policy changes on-the-fly. Each solution is interoperable with existing third-party software or hardware.

With global headquarters in Nuremberg, Germany and North American headquarters in the San Francisco Bay Area, the company serves 35,000-plus customers worldwide throughout the healthcare, financial, education and government markets, as well as many Fortune 500 companies. NCP has established a network of national and regional technology, channel and OEM partners to serve its customers. For more information, visit


Caroline Smith

Springboard Public Relations


error: Content is protected !!