Feature

Access Logs

Gateway and System-level Access Logs

Assure compliance with data protection acts (GDPR, SOC 2, HIPAA, NIS2), and keep track of which users and devices access which systems and applications. In the event of a breach, investigate the compromise, reduce impact, and patch up vulnerabilities.

Create Free AccountSee Demo

No card needed. Full onboarding support.

BENEFITS

Improve observability, preserve privacy

Compliant with GDPR/SOC2/HIPPA

Assure compliance

Protect user data and meet the requirements of data protection acts (GDPR, SOC 2, HIPAA, NIS2).

Main benefit

secure your business

Track activity

Control all user accounts, access permissions, and systems centrally. Bundle access permissions on virtual access cards.

Main benefit

Easy to use

Reduce impact

A 100% SaaS-delivered global infrastructure. Connect from anywhere to any company resource securely and with ease.

Main benefit

See GoodAccess in action

Try Interactive Demo

Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.

Access Logs demo

How to use access logs

FEATURES

System-level access history for root-cause investigation

Gateway network

Global shared gateway network

Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.

network control and visibility
network control and visibility

Threat protection

Online Threat Protection

Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.

Goodaccess app

Mobile and desktop apps

GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.

Pinpoint anomalous behaviors

Observe user behavior

See which users and devices connect to which systems or applications. Examine timestamps and amounts of data uploaded/downloaded. Pinpoint anomalous behaviors and compromised devices.

prevent future breaches

Investigate the root cause

Trace the attacker’s footsteps and isolate non-compliant devices to reduce impact. See vulnerabilities in your security ecosystem and remedy them to prevent future breaches.

data compliance

Ensure compliance

Comply with data protection acts by continuously collecting privacy-conscious data on user access behavior for root-cause analysis.

Create Free Account

No card required.

Full onboarding support.

Case study

Hear it from your peers

Case study

Zero Trust Architecture in Creative Dock

Creative Dock needed to ensure ISO 27001 compliance, but they struggled to achieve the required level of security and control over their network and user devices (BYOD) with their prior remote-access solution.

Without any additional hardware, GoodAccess provided Creative Dock with full, centralized control over their infrastructure and covered up to 70% of technical security requirements of ISO 27001.

Explore ZTA Case Study
TESTIMONIALS

Trusted leader in Zero Trust Security

Discover why leading companies rely on GoodAccess for building their Zero Trust Architecture solutions.

"Incredibly user frienly, fast and very helpful."

Overall, the GoodAccess platform is amazing. From the administration side, the platform is incredibly user friendly and you can be up and running in a few minutes, managing users takes no time at all and the customer service is fast and very helpful. We have been with GoodAccess for a number of years with no complaints. The product is very competitive in price with its competitors.

"Find the connectivity and stability of connections stable."

We have been very happy with the reliability of GoodAccess. We find the connectivity and stability of connections stable, we have users across multiple countries and the experience has been very good.

"Simplifies access management and reduces network administration complexity."

GoodAccess's Zero Trust Architecture effectively secures our access to critical network infrastructure and web applications. By enabling a unified IP address for all clients, it simplifies access management and reduces network administration complexity.

"Secure, scalable access to critical systems across a global IP reach."

GoodAccess provides fast onboarding, excellent reporting, and helpful support. It offers secure, scalable access to critical systems across a global IP reach, making it vital for managing multiple users effortlessly. The platform's user-friendly management enhances our operational efficiency and security.

Software Engineering Manager

3 QUICK STEPS AWAY

How to enable Access logs in GoodAcces

Create a free account

Test all premium features for 14 days without limitation. No credit card required.

Secure your assets

Connect to a gateway near your location, decide what systems to include in your secure environment.

Log access history

Invite team members and view access logs in the central console.

Create Free Account

No card needed. Full onboarding support.

Get in touch

Not sure where to start? Let's get in touch

Book a call with the GoodAccess affiliate manager to learn more about the benefits of our program.

Other features

Explore similar features

Central dashboard

Keep track of your users’ behavior, network security status, and threat activity in one place.

Get Started

DNS filtering

Protect your network from phishing attempts, malicious domains, or productivity sinks.

Get Started

Zero-trust access control

Minimize the attack surface by robust user authentication, granular privilege assignment, and strong encryption.

Get Started

Access Logs guide

Complete guide to access logs

Tracking user access history is a legal requirement of data protection acts like GDPR and one of the core principles of zero trust. It entails the continuous collection and logging of essential information like user account ID, source IP address, target IP address, connection timestamp, or the amount of data transmitted.

System-Level Access Logs provide vital information during post-compromise analysis. They provide insight into who accessed what systems, when, how long the session was, and how much data was uploaded or downloaded. When a breach occurs, they help locate the compromised device and contain the attack, as well as retrospectively track down the adversary’s movements and reveal whatever vulnerabilities that allowed them to enter.

Gateway-level Access Logs provide a quick glance of users connected to your Gateways.

Visit Support Portal
Not a company? Try VPN Static for individuals
Thank you! Your submission has been received!
By submitting this form you agree with creation of Samohyb Account, Terms of Service and Privacy Policy.

Frequently asked questions

FAQ about gateway and system-level access logs

How do I check access logs?
What is the difference between access logs and application logs?
What is GDPR/SOC 2/HIPAA/NIS2?
What are my obligations under data protection acts?