Feature

IP Whitelisting

IP Whitelisting

IP whitelisting (IP allowlisting) is a network security technique that allows access to business systems only to whitelisted (allowlisted) IP addresses. Doing this reduces the risk of online threats and shrinks the company’s attack surface.

Create Free AccountSee Demo

No card needed. Full onboarding support.

BENEFITS

Provide quick and secure access on the public internet

Secure encryption

Improve security

Block network-borne attacks like DDoS, IP and port sniffing, man-in-the middle, and other.

Main benefit

secure your business

Control access

Define your trusted users, assign them a unique IP address, and provide access only to them.

Main benefit

Static IP Address

Zero hardware

Leverage your existing infrastructure and provide secure access via the internet.

Main benefit

See GoodAccess in action

Try Interactive Demo

Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.

IP Whitelisting demo

How to use ip whitelisting

FEATURES

Prevent unauthorized access to your secured systems

Gateway network

Global shared gateway network

Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.

network control and visibility
network control and visibility

Threat protection

Online Threat Protection

Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.

Goodaccess app

Mobile and desktop apps

GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.

secure remote access

Enable secure remote access

Allow end-users to connect from home, cafés, hotels, or airports via a secure tunnel to a VPN gateway with a whitelisted static IP address. Use user-friendly client apps for user authentication.

prevent future breaches

Control network access

Prevent unauthorized access to your internet-facing services that only trusted IP addresses can connect to. Use the static IP address of your gateway and define a policy that remains valid indefinitely.

secure access

Provide secure access to SaaS resources

Protect your connections to cloud services and resources by allowlisting your static IP address in the cloud’s security settings.

iot security

Improve IoT security

Ensure your IoT devices (cameras, sensors, building controllers, etc.) that communicate via the internet can only be reached by trusted entities.

access control

Unify access control on the network layer

Pre-authenticate users on your VPN gateway and centralize the management of user access rights, MFA, and SSO for all your systems.

Create Free Account

No card required.

Full onboarding support.

Case study

Hear it from your peers

Case study

Zero Trust Architecture in Creative Dock

Creative Dock needed to ensure ISO 27001 compliance, but they struggled to achieve the required level of security and control over their network and user devices (BYOD) with their prior remote-access solution.

Without any additional hardware, GoodAccess provided Creative Dock with full, centralized control over their infrastructure and covered up to 70% of technical security requirements of ISO 27001.

Explore ZTA Case Study
TESTIMONIALS

Trusted leader in Zero Trust Security

Discover why leading companies rely on GoodAccess for building their Zero Trust Architecture solutions.

"Incredibly user frienly, fast and very helpful."

Overall, the GoodAccess platform is amazing. From the administration side, the platform is incredibly user friendly and you can be up and running in a few minutes, managing users takes no time at all and the customer service is fast and very helpful. We have been with GoodAccess for a number of years with no complaints. The product is very competitive in price with its competitors.

"Find the connectivity and stability of connections stable."

We have been very happy with the reliability of GoodAccess. We find the connectivity and stability of connections stable, we have users across multiple countries and the experience has been very good.

"Simplifies access management and reduces network administration complexity."

GoodAccess's Zero Trust Architecture effectively secures our access to critical network infrastructure and web applications. By enabling a unified IP address for all clients, it simplifies access management and reduces network administration complexity.

"Secure, scalable access to critical systems across a global IP reach."

GoodAccess provides fast onboarding, excellent reporting, and helpful support. It offers secure, scalable access to critical systems across a global IP reach, making it vital for managing multiple users effortlessly. The platform's user-friendly management enhances our operational efficiency and security.

Software Engineering Manager

3 QUICK STEPS AWAY

How to enable IP whitelisting in GoodAccess

Create a free account

Test all premium features for 14 days without limitation. No credit card required.

Connect your devices

Decide which devices to include and build your secure environment in 10 minutes.

Whitelist your IP address

Whitelist your IP address in cloud systems, provide quick remote access, or publish your online services.

Create Free Account

No card needed. Full onboarding support.

Get in touch

Not sure where to start? Let's get in touch

Schedule a call with the GoodAccess success manager to get all the details about our product features.

Other features

Explore similar features

Static IP address

Get a permanent and unique identifier of your business on the public internet.

Get Started

Split tunneling

Conserve bandwidth by routing only critical connections through an encrypted tunnel.

Get Started

Dedicated VPN gateway

Connect from anywhere in the world via a secure and private tunnel.

Get Started

IP Whitelisting guide

Complete guide to IP whitelisting

IP whitelisting requires a static IP address. A whitelisted IP address means that a system inside the LAN, datacenter, or third-party cloud application is configured for access only by users who have their organization’s IP address, regardless of where they are connecting from. Communication from all other addresses will be rejected.

GoodAccess offers a static IP address for its business VPN gateway, which you can use for IP whitelisting in your other systems. Using the gateway’s IP address for IP whitelisting instead of the addresses of routers, LANs, or individual user devices offers significant benefits:

1. GoodAccess pre-authenticates all users with MFA and SSO before they connect, thus ensuring they are eligible.

2. The GoodAccess gateway serves as an access control point. You can centralize all access privileges in one web-based configuration panel.

3. You can manage your IP whitelists centrally and extend IP whitelisting to services and applications that do not support it natively.

Visit Support Portal

For a deep dive into IP whitelisting, check out this article.
For a hands-on guide on how to configure IP whitelisting in GoodAccess, visit our support portal.

Not a company? Try VPN Static for individuals
Thank you! Your submission has been received!
By submitting this form you agree with creation of Samohyb Account, Terms of Service and Privacy Policy.

Frequently asked questions

IP whitelisting FAQ

Why should you have IP whitelisting?
How secure is IP whitelisting?
What are the downsides of using IP whitelisting?
What is the difference between whitelisting and blacklisting?