IP whitelisting (IP allowlisting) is a network security technique that allows access to business systems only to whitelisted (allowlisted) IP addresses. Doing this reduces the risk of online threats and shrinks the company’s attack surface.
Create Free AccountSee DemoNo card needed. Full onboarding support.
BENEFITS
Block network-borne attacks like DDoS, IP and port sniffing, man-in-the middle, and other.
Main benefit
Define your trusted users, assign them a unique IP address, and provide access only to them.
Main benefit
Leverage your existing infrastructure and provide secure access via the internet.
Main benefit
Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.
FEATURES
Gateway network
Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.
Threat protection
Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.
Goodaccess app
GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.
secure remote access
Allow end-users to connect from home, cafés, hotels, or airports via a secure tunnel to a VPN gateway with a whitelisted static IP address. Use user-friendly client apps for user authentication.
prevent future breaches
Prevent unauthorized access to your internet-facing services that only trusted IP addresses can connect to. Use the static IP address of your gateway and define a policy that remains valid indefinitely.
secure access
Protect your connections to cloud services and resources by allowlisting your static IP address in the cloud’s security settings.
iot security
Ensure your IoT devices (cameras, sensors, building controllers, etc.) that communicate via the internet can only be reached by trusted entities.
access control
Pre-authenticate users on your VPN gateway and centralize the management of user access rights, MFA, and SSO for all your systems.
Case study
Case study
Creative Dock needed to ensure ISO 27001 compliance, but they struggled to achieve the required level of security and control over their network and user devices (BYOD) with their prior remote-access solution.
Without any additional hardware, GoodAccess provided Creative Dock with full, centralized control over their infrastructure and covered up to 70% of technical security requirements of ISO 27001.
Discover why leading companies rely on GoodAccess for building their Zero Trust Architecture solutions.
Overall, the GoodAccess platform is amazing. From the administration side, the platform is incredibly user friendly and you can be up and running in a few minutes, managing users takes no time at all and the customer service is fast and very helpful. We have been with GoodAccess for a number of years with no complaints. The product is very competitive in price with its competitors.
We have been very happy with the reliability of GoodAccess. We find the connectivity and stability of connections stable, we have users across multiple countries and the experience has been very good.
GoodAccess's Zero Trust Architecture effectively secures our access to critical network infrastructure and web applications. By enabling a unified IP address for all clients, it simplifies access management and reduces network administration complexity.
GoodAccess provides fast onboarding, excellent reporting, and helpful support. It offers secure, scalable access to critical systems across a global IP reach, making it vital for managing multiple users effortlessly. The platform's user-friendly management enhances our operational efficiency and security.
Test all premium features for 14 days without limitation. No credit card required.
Decide which devices to include and build your secure environment in 10 minutes.
Whitelist your IP address in cloud systems, provide quick remote access, or publish your online services.
No card needed. Full onboarding support.
Schedule a call with the GoodAccess success manager to get all the details about our product features.
Other features
Get a permanent and unique identifier of your business on the public internet.
Conserve bandwidth by routing only critical connections through an encrypted tunnel.
IP Whitelisting guide
IP whitelisting requires a static IP address. A whitelisted IP address means that a system inside the LAN, datacenter, or third-party cloud application is configured for access only by users who have their organization’s IP address, regardless of where they are connecting from. Communication from all other addresses will be rejected.
GoodAccess offers a static IP address for its business VPN gateway, which you can use for IP whitelisting in your other systems. Using the gateway’s IP address for IP whitelisting instead of the addresses of routers, LANs, or individual user devices offers significant benefits:
1. GoodAccess pre-authenticates all users with MFA and SSO before they connect, thus ensuring they are eligible.
2. The GoodAccess gateway serves as an access control point. You can centralize all access privileges in one web-based configuration panel.
3. You can manage your IP whitelists centrally and extend IP whitelisting to services and applications that do not support it natively.
For a deep dive into IP whitelisting, check out this article.
For a hands-on guide on how to configure IP whitelisting in GoodAccess, visit our support portal.
IP whitelisting gives you direct control over who can access your internal systems. This is important when your company has a lot of remote employees who are connecting through their own devices and from third-party networks.
IP whitelisting, paired with user and device authentication gives you the control and visibility you need to secure a distributed workforce.
IP whitelisting should not be treated as the sole security measure for your company. While it works well against DDoS or IP sniffing, it is still vulnerable to IP spoofing and intrusion via compromised endpoints. You should think of it as a way of reducing risk and speeding up access for end-users, rather than an impervious shield against all threats.
As a best practice, always use more security layers that are complementary to IP whitelisting, such as MFA and zero-trust access control.
Setting up IP whitelisting manually on a router or firewall can be labor-intensive. It also requires manual changes every time user roles or access rights change.
A larger downside is that if an endpoint is compromised (e.g. by a Trojan), or if the IP address is spoofed, the attacker could gain easy access to critical systems. For that reason it is crucial to supplement IP whitelisting by more granular access control mechanisms and MFA for user authentication.
A whitelist contains trusted addresses or domains. As such, it is used for access control purposes as a way of proving the legitimacy of access to internal systems.
A blacklist does the opposite – it lists harmful or disreputable domains or IP addresses, and is used by DNS/web filters for online threat protection rather than as an access control mechanism.