Prevent unauthorized access to your business network by enforcing access policies on devices that are connecting to the secure infrastructure. Implement secure cloud network access control with GoodAccess.
Create Free AccountSee DemoNo card needed. Full onboarding support.
BENEFITS
Prevent unauthorized access to your infrastructure and monitor all ongoing inbound connections.
Main benefit
Control all user accounts, access permissions, and systems centrally. Bundle access permissions on virtual access cards.
Main benefit
A 100% SaaS-delivered global infrastructure. Connect from anywhere to any company resource securely and with ease.
Main benefit
Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.
FEATURES
Gateway network
Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.
Threat protection
Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.
Goodaccess app
GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.
MFA
Prevent threat intrusion by pre-authenticating users on the application and network level before they interact with business systems. Reinforce the login with multi-factor authentication (MFA) and biometrics.
Access cards
Manage all users, access privileges, and connections to company systems from a user-friendly web-based interface. Virtual access cards can be used to assign access rights per role, allowing for quick and easy access management.
goodaccess apps
Client apps are available for MacOS, iOS, Windows, and Android to simplify the authentication of user devices and connect them to the secure global infrastructure.
dedicated gateway
Connect to a gateway nearest to your location via a secure encrypted tunnel to shield your data from eavesdropping and other online threats. Use the gateway’s static IP to restrict network access, speed up cloud access by IP whitelisting, or publish your customer-facing services online.
private network
Connect to your nearest gateway from any network, whether home, office, or café, via a private encrypted tunnel, and shield your connection from online threats. Choose from 35+ gateways distributed globally.
threat detection
Enjoy automated protection from phishing attempts, malware-hosting sites, or productivity sinks. Your secure gateway contains a built-in DNS filter with multiple threat intelligence feeds.
no hardware needed
GoodAccess is 100% SaaS-delivered, which means zero hardware. Set up network access control even if you don’t have an IT person.
testimonials
Test all premium features for 14 days without limitation. No credit card required.
Connect to a gateway near your location, decide what systems to include in your secure environment
Invite team members and set up 2FA. Assign access cards with privileges to each user role.
No card needed. Full onboarding support.
Schedule a call with the GoodAccess success manager to get all the details about our product features.
Other features
Minimize the attack surface by robust user authentication, granular privilege assignment, and strong encryption.
Ensure compliance and create a detailed record of access history for post-compromise analysis.
Network access control guide
Network access control consists of several components:
Identity-based authentication and authorization
Traffic encryption on all networks
Policy definition and enforcement
Unlike conventional networks, where endpoints and network devices are identified by an IP address, NAC is identity-based. GoodAccess NAC pre-authenticates users by requiring login credentials and, as a best practice, additional authentication factors, before allowing them inside the secured infrastructure.
NAC often uses multi-factor authentication (MFA) to harden the authentication process with more identity factors and further minimize the risk of unauthorized access.
Authentication extends to user devices as well. Each device has to prove the legitimacy of its access. GoodAccess NAC uses client apps for desktop and mobile devices that users install on their devices and log into the company infrastructure through them.
GoodAccess NAC enforces an equal level of security on all networks – whether company-owned, employee-owned, or completely public. Users connect from any location to an access gateway through a secure encrypted tunnel (via the OpenVPN or IKEv2 protocol), which conceals their identity and the data they send.
This significantly reduces the risk of malware intrusion or man-in-the-middle attacks when connecting from unsecured networks.
Security policy definition and enforcement in NAC deals with the assignment of access privileges. GoodAccess uses virtual access cards that allow you to manage access rights easily and centrally.
An access card represents the privileges that employees of a given role need to do their work. You can define access cards for developers, sales people, marketing team, administrators, etc., and assign those to real employee accounts to allow access to those systems.
This is an elegant way to define and manage your access policy, which can be changed in the GoodAccess web interface by just one click of the mouse.
For more information on network access control check this article or visit our support portal for a hands-on guide.
NAC is a cybersecurity approach that mitigates the risk of unauthorized access by enforcing policies on user devices and extending network visibility onto devices and users connecting to the business network.
NAC gives businesses control over these connecting devices, admitting those that meet security policies and granting them appropriate access. It automates the assignment of access privileges, granting employees access depending on their clearance.
A firewall acts as a gatekeeper that decides what traffic may come in or out of the network. Therefore, all traffic has to pass through the firewall in order to be secured.
On the other hand, NAC operates on the level of user devices, which reduces the risk of a non-compliant device connecting and makes for a more flexible system by eliminating the firewall bottleneck.
Endpoints – the end-users and their devices. The device is where NAC begins, and the system has to authenticate both the users and their devices. GoodAccess handles this with client apps for both desktop and mobile devices that the users can install themselves.
Authentication – a server and corresponding infrastructure that facilitates authentication and authorizes access to systems.t-privilege assignment of access right
Quarantine – blocking non-compliant or infected endpoints. NAC alerts you to all policy breaches and either blocks the client directly or allows you to do so from the management console.
Networks – In NAC, your secured internal networks are segmented according to security clearance; in GoodAccess NAC, the segmentation is role-based, i.e. each network segment corresponds to a user role definition. Some NAC infrastructures include guest networks that only provide access to the public internet.
Management console – the management and configuration interface. The management console is where you add or remove users, assign or revoke privileges, and define your network access policy, such as role definition or multi-factor authentication (MFA).
NAC is software-defined. You do not need an additional investment in network devices to implement NAC; you can define and enforce secure policies across your entire infrastructure regardless of the combination of LAN, cloud, or remote connections. This makes NAC suitable for work-from-anywhere companies that want to improve their security.