Create a secure virtual network between all users, networks, clouds, and on-prem resources. Get started in 10 minutes. Scale easily. 100% cloud zero-trust network access solution designed for small and medium businesses.
Create Free AccountSee DemoNo card required. Full onboarding support.
BENEFITS
Create a bulletproof defense against breaches with identity based access rules, traffic encryption, MFA, SSO, network segmentation, and other features.
Tap into the resilient network as a service. Operate your own virtual infrastructure with a few clicks through a web interface. High-speed connectivity, anywhere, anytime.
Cut the costs of network security and operations. Get started in 10 minutes with no expert skills needed. 100% cloud solution that scales as your business grows.
Walkthroughs, user guides, top-rated support, and user experience result in an average 4.8/5 user satisfaction rating and 92% likelihood to recommend GoodAccess.
Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.
FEATURES
With access rules, strong authentication, segmentation, and more you can level up your security across on-site and remote locations.
Gateway network
Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.
Threat protection
Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.
Goodaccess app
GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.
branch connectors
The built-in cloud and branch connector enables you to connect your clouds, data centers, and private LANs into your GoodAccess virtual infrastructure easily and securely. You can choose what protocols to use (IPsec, IKEv2, or OpenVPN) depending on your preference or the environment. If you need highly available remote access to your on-prem or cloud systems, you can set up a redundant IPsec or IKEv2 tunnel as a failsafe.
Single sign-on
Simplify identity management and access control with single sign-on (SSO). GoodAccess supports SSO with access credentials from Microsoft Entra ID, Google Workspace, Okta, and other SAML compatible services. SCIM for automated access provisioning is also supported.
threat blocker
Threat Blocker is a native, always-on feature of GoodAccess that prevents users from accessing dangerous or compromised malicious websites and falling prey to malware, phishing, command and control (C&C) botnets and other ploys. Protection is constantly updated using threat intelligence feeds and DNS blacklists (see DNS filtering).
DNS FILTERING
GoodAccess DNS filtering gives you control over access to all sites and applications so that you can automatically restrict unwanted user behavior and block phishing and other malicious domains.
Access logs
Have full control over gateway access points to monitor who and when connects to your network. This will help you to reduce risk and comply with GDPR, SOC2, or HIPAA regulations.
two/Multi factor authentication
GoodAccess allows enforcing 2FA/MFA for admin login as well as for users' login to GoodAccess app. Instead of labor-intensive configuration of MFA for each application, you can unify authentication on the network level with GoodAccess. This works even if your systems don't support 2FA/MFA on the application level.
virtual access cards
Segment your network and assign permissions on the least-privilege principle to prevent unauthorized access. With virtual access cards you can determine which user may access which system. As a result, every user has a private account and network identity so they are allowed to access only specified applications. You can also use external providers' single-sign-on authentication (GSuite, Okta, Active Directory/LDAP).
testimonials
100% cloud ZTNA solution that scales as your business grows.
Dedicated Cloud VPN with Static IP whitelisting
Enterprise features and Premium 24/7 support for large organizations
GoodAccess adheres to the most demanding standards of software security compliance so you can have a peace of mind that your organization's data is safeguarded properly.
Create your free account and get all premium features for 14 days for free.
Choose from 35+ locations for your dedicated gateway. Connect your systems, apps, clouds and devices.
Invite users via email to create their account and get the GoodAccess app. Use Access Cards to assign permissions only to particular SaaS applications, services, servers, internal systems and such.
Click to connect from any device anywhere and work securely. Oversee who and when connects to your applications, control activity and data transfers.
Book a call with the GoodAccess affiliate manager to learn more about the benefits of our program.
Zero trust network is a network that by design minimizes insider threats and prevents risks associated with unauthorized access/credential misuse. This is achieved by very strict access verification and damage containment via restriction of unnecessary access privileges - so-called the least privilege principle.
The main difference is in the scope of access rights provided to the user. A VPN allows user access to the entire network once they are authorized. Zero trust network access is a security concept utilizing the least privilege principle, so that access is granted only to selected systems for satisfactorily authorized users.
Any company, no matter the size can today implement zero-trust network access security thanks to the democratization of ZTNA tools. Basically, there are three forms that a ZTNA deployment can take and they vary depending on the systems included and the overall goals they aim to achieve: identity-based model, microsegmentation model, and software-defined perimeter (SDP). Learn more about the ZTNA implementation in our blog.