Get a permanent and unique identifier of your business on the public internet. A dedicated IP address is reserved for your use only, and remains available to you even after logging out.
Create Free AccountSee DemoTry IP whitelisting for free.
No card needed. Full onboarding support.
BENEFITS
Identify your business on the public internet with a unique address.
Main benefit
Allow quick access from any location around the world.
Main benefit
Protect access to your private systems by whitelisting your trusted IP address.
Main benefit
Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.
FEATURES
Gateway network
Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.
Threat protection
Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.
Goodaccess app
GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.
network access
Allow only trusted users/devices to access your internet-facing services.
remote access
Allow remote users to securely access a private resource thanks to its unique IP address.
Cloud access
Speed up access to cloud resources by whitelisting the dedicated IP address of a key network node.
fixed identificator
Publish your online services to the internet using a dedicated IP address as a publicly accessible fixed identificator.
Case study
Case study
Creative Dock needed to ensure ISO 27001 compliance, but they struggled to achieve the required level of security and control over their network and user devices (BYOD) with their prior remote-access solution.
Without any additional hardware, GoodAccess provided Creative Dock with full, centralized control over their infrastructure and covered up to 70% of technical security requirements of ISO 27001.
Discover why leading companies rely on GoodAccess for building their Zero Trust Architecture solutions.
Overall, the GoodAccess platform is amazing. From the administration side, the platform is incredibly user friendly and you can be up and running in a few minutes, managing users takes no time at all and the customer service is fast and very helpful. We have been with GoodAccess for a number of years with no complaints. The product is very competitive in price with its competitors.
We have been very happy with the reliability of GoodAccess. We find the connectivity and stability of connections stable, we have users across multiple countries and the experience has been very good.
GoodAccess's Zero Trust Architecture effectively secures our access to critical network infrastructure and web applications. By enabling a unified IP address for all clients, it simplifies access management and reduces network administration complexity.
GoodAccess provides fast onboarding, excellent reporting, and helpful support. It offers secure, scalable access to critical systems across a global IP reach, making it vital for managing multiple users effortlessly. The platform's user-friendly management enhances our operational efficiency and security.
Test all premium features for 14 days without limitation. No credit card required.
Decide which devices to include and build your secure environment in 10 minutes.
Whitelist your IP address in cloud systems, provide quick remote access, or publish your online services.
Schedule a call with the GoodAccess success manager to get all the details about our product features.
Other features
Use your IP address to identify trusted connections to your critical systems.
Conserve bandwidth by routing only critical connections through an encrypted tunnel.
dedicated ip address guide
Also known as a fixed IP address, a dedicated static IP address is a permanent numerical identification that uniquely identifies your company on the public internet. It is reserved for your use only.
This type of IP address is used by public devices and services like DNS servers. Also, businesses often use dedicated IP addresses for IP whitelisting, which is quick and direct access to a business resource (VPN gateway, cloud repository, local network).
You can lease one from your internet service provider or use a cloud VPN that includes a static IP address as part of the service. Read more in this article.
A dedicated static IP address is relevant to businesses with specific networking needs, such as enabling remote access, providing access to cloud resources, or publishing their online services to the internet.
In scenarios like IP whitelisting it’s important that the IP address remains the same because if a dynamic IP address were used, it would require the connected systems and devices to be reconfigured every time the address changes.
A static IP address is either manually assigned to a device on the local network or leased from a provider to identify a key node on the internet (e.g. a VPN gateway, router).
Unlike a dynamic IP, which is assigned to a host by the DHCP service and only lasts for a short lease period, a static IP address remains the same for as long as the user needs it.
A dynamic IP address is suitable for a normal internet user. However it cannot be used for IP whitelisting or publishing online services because it changes periodically. For these purposes, you need a dedicated static IP address. Read more about the usage and differences between static and dynamic IP in our blog post.