Feature

Network access control

Network access control

Prevent unauthorized access to your business network by enforcing access policies on devices that are connecting to the secure infrastructure. Implement secure cloud network access control with GoodAccess.

Create Free AccountSee Demo

No card needed. Full onboarding support.

domain filtering allowing network control and visibility

BENEFITS

Full control over all inbound and outbound connections

Secure encryption

Mitigate zero-day threats

Prevent unauthorized access to your infrastructure and monitor all ongoing inbound connections.

Main benefit

Breach risk reduction

Manage access centrally

Control all user accounts, access permissions, and systems centrally. Bundle access permissions on virtual access cards.

Main benefit

Compliant with GDPR/SOC2/HIPPA

Connect from anywhere

A 100% SaaS-delivered global infrastructure. Connect from anywhere to any company resource securely and with ease.

Main benefit

See GoodAccess in action

Try Interactive Demo

Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.

Network access control demo

How to use network access control

FEATURES

GoodAccess NAC is access control for the networkless company

Gateway network

Global shared gateway network

Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.

network control and visibility
network control and visibility

Threat protection

Online Threat Protection

Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.

Goodaccess app

Mobile and desktop apps

GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.

MFA

Identity-based authentication

Prevent threat intrusion by pre-authenticating users on the application and network level before they interact with business systems. Reinforce the login with multi-factor authentication (MFA) and biometrics.

Access cards

Web-based central management

Manage all users, access privileges, and connections to company systems from a user-friendly web-based interface. Virtual access cards can be used to assign access rights per role, allowing for quick and easy access management.

goodaccess apps

Mobile and desktop client apps

Client apps are available for MacOS, iOS, Windows, and Android to simplify the authentication of user devices and connect them to the secure global infrastructure.

dedicated gateway

Dedicated gateway with a static IP

Connect to a gateway nearest to your location via a secure encrypted tunnel to shield your data from eavesdropping and other online threats. Use the gateway’s static IP to restrict network access, speed up cloud access by IP whitelisting, or publish your customer-facing services online.

private network

Worldwide private network

Connect to your nearest gateway from any network, whether home, office, or café, via a private encrypted tunnel, and shield your connection from online threats. Choose from 35+ gateways distributed globally.

threat detection

Web-based threat detection

Enjoy automated protection from phishing attempts, malware-hosting sites, or productivity sinks. Your secure gateway contains a built-in DNS filter with multiple threat intelligence feeds.

no hardware needed

Zero hardware

GoodAccess is 100% SaaS-delivered, which means zero hardware. Set up network access control even if you don’t have an IT person.

Create Free Account

No card required.

Full onboarding support.

testimonials

Customers’ choice network access control

We were looking for fast, secure, and quality audio transmission. We are excited that GoodAccess allows our agents to make phone calls with our clients via VOIP provider using the office IP from their home. GoodAccess is inexpensive, easy-to-use, safe, and the support team is brilliant!

Petr Hruška
Co-founder & CEO at Conexiondiaria

GoodAccess has strong encryption which shows to our customers that we take great care in protecting their data. The app is straightforward to use so we can access our systems from 14 different time zones and work efficiently. Simply a VPN with static IP for a great price.

Paraic Hegarty
CTO at Akari Software

It's important for us that GoodAccess' VPN with static IP is fast & has low latency, which feels like working from the office. I love the user friendly control panel, which just makes the work much easier!

Jan Svoboda
CEO at XDENT

GoodAccess increases the level of security in our organization. We use it to access several cloud services and our data warehouse. We appreciate the customer-oriented support team, frequent product updates, and the excellent price/value ratio.

Petr Jirásek
Co-founder & CTO at Tipli

3 QUICK STEPS AWAY

How to enable NAC in GoodAccess

Create a free account

Test all premium features for 14 days without limitation. No credit card required.

Secure your assets

Connect to a gateway near your location, decide what systems to include in your secure environment

Define your policy

Invite team members and set up 2FA. Assign access cards with privileges to each user role.

Create Free Account

No card needed. Full onboarding support.

Get in touch

Not sure where to start? Let's get in touch

Schedule a call with the GoodAccess success manager to get all the details about our product features.

Other features

Explore other features

Zero-trust access control

Minimize the attack surface by robust user authentication, granular privilege assignment, and strong encryption.

Get Started

Dedicated VPN gateway

Connect from anywhere in the world via a secure and private tunnel.

Get Started

Access Logs

Ensure compliance and create a detailed record of access history for post-compromise analysis.

Get Started

Network access control guide

A complete guide to network access control

Network access control consists of several components:

Identity-based authentication and authorization

Unlike conventional networks, where endpoints and network devices are identified by an IP address, NAC is identity-based. GoodAccess NAC pre-authenticates users by requiring login credentials and, as a best practice, additional authentication factors, before allowing them inside the secured infrastructure.

NAC often uses multi-factor authentication (MFA) to harden the authentication process with more identity factors and further minimize the risk of unauthorized access.

Authentication extends to user devices as well. Each device has to prove the legitimacy of its access. GoodAccess NAC uses client apps for desktop and mobile devices that users install on their devices and log into the company infrastructure through them.

Traffic encryption on all networks

GoodAccess NAC enforces an equal level of security on all networks – whether company-owned, employee-owned, or completely public. Users connect from any location to an access gateway through a secure encrypted tunnel (via the OpenVPN or IKEv2 protocol), which conceals their identity and the data they send.

This significantly reduces the risk of malware intrusion or man-in-the-middle attacks when connecting from unsecured networks.

Policy definition and enforcement

Security policy definition and enforcement in NAC deals with the assignment of access privileges. GoodAccess uses virtual access cards that allow you to manage access rights easily and centrally.

An access card represents the privileges that employees of a given role need to do their work. You can define access cards for developers, sales people, marketing team, administrators, etc., and assign those to real employee accounts to allow access to those systems.

This is an elegant way to define and manage your access policy, which can be changed in the GoodAccess web interface by just one click of the mouse.

Visit Support Portal

For more information on network access control check this article or visit our support portal for a hands-on guide.

Not a company? Try VPN Static for individuals
Thank you! Your submission has been received!
By submitting this form you agree with creation of Samohyb Account, Terms of Service and Privacy Policy.

Frequently asked questions

FAQ about network access control

What is network access control (NAC)?
What is the difference between NAC and a firewall?
What are the key components of NAC?
Is NAC software or hardware?