Stop phishing, malware, botnets, and other online security threats before they hit the user and breach your network. All automated with GoodAccess Threat Blocker, a secure web gateway.
Create Free AccountSee DemoNo card required. Full onboarding support.
BENEFITS
Prevent users from accessing dangerous or compromised websites and falling prey to malware, phishing, C&C botnets and other ploys.
No matter where the user is, once they connect through the GoodAccess secure web gateway, they are protected.
Customize your security by adding your own rules and unwanted sites on top of built-in threat intelligence feeds.
Monitor users' attempts to make malicious connections on the dashboard, isolate the threat and respond confidently.
Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.
FEATURES
Gateway network
Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.
Threat protection
Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.
Goodaccess app
GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.
threat blocker
Threat Blocker uses a large database of threat intelligence feeds, covering malicious sites, malware, spammers, C&C botnets, and other types of online threats. Custom blacklists are supported to fine-tune your controls.
secure gateway
Once a user connects through a cloud gateway with your dedicated DNS server, all of their web activity is protected in real time by blocking unwanted content and malicious domains (see DNS filtering).
threat control
For monitoring and compliance reasons, users' access to harmful websites and content is tracked and logged. See which users attempted to access blocked or harmful sites to isolate the threat, respond, and optimize your security controls.
Mobile & desktop apps
GoodAccess comes with one-click apps for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.
Case study
Case study
Creative Dock needed to ensure ISO 27001 compliance, but they struggled to achieve the required level of security and control over their network and user devices (BYOD) with their prior remote-access solution.
Without any additional hardware, GoodAccess provided Creative Dock with full, centralized control over their infrastructure and covered up to 70% of technical security requirements of ISO 27001.
Discover why leading companies rely on GoodAccess for building their Zero Trust Architecture solutions.
Overall, the GoodAccess platform is amazing. From the administration side, the platform is incredibly user friendly and you can be up and running in a few minutes, managing users takes no time at all and the customer service is fast and very helpful. We have been with GoodAccess for a number of years with no complaints. The product is very competitive in price with its competitors.
We have been very happy with the reliability of GoodAccess. We find the connectivity and stability of connections stable, we have users across multiple countries and the experience has been very good.
GoodAccess's Zero Trust Architecture effectively secures our access to critical network infrastructure and web applications. By enabling a unified IP address for all clients, it simplifies access management and reduces network administration complexity.
GoodAccess provides fast onboarding, excellent reporting, and helpful support. It offers secure, scalable access to critical systems across a global IP reach, making it vital for managing multiple users effortlessly. The platform's user-friendly management enhances our operational efficiency and security.
Cloud-based secure web gateway that fits your needs.
ZTNA - Zero Trust Network Access for multi-site & cloud businesses
Enterprise features and Premium 24/7 support for large organizations
GoodAccess adheres to the most demanding standards of software security compliance so you can have a peace of mind that your organization's data is safeguarded properly.
ThreatBlocker is an built-in secure web gateway feature of every GoodAccess subscription plan. Subscribe to any plan to benefit from protection against malware, ransomware, phishing C&C botnets, and robust security and threat monitoring.
Create your free account and get all premium features for 14 days.
Choose from 35+ dedicated VPN gateway locations or connect through a global shared gateway network.
Invite users via email to create their account and get a GoodAccess app (available for iOS, Mac, Android, Windows and ChromeOS).
Click to connect from any device, anywhere and work securely.
Book a call with the GoodAccess affiliate manager to learn more about the benefits of our program.
A secure web gateway (SWG) is an application-level traffic filtering solution that monitors all requests between users and web servers on the internet. A SWG was traditionally deployed on the network perimeter. Today, cloud-delivered solutions are more common, as users work from home or use unsecured wifi networks, to protect every employee from malware, phishing, botnet C&C, or other online threats.
The SWG checks user attempts to communicate with a domain against a blacklist, either commercial, open source, or a custom list of forbidden services based on company policies and automatically blocks suspicious traffic.
Firewall, being a perimeter security measure just like the SWG, works traditionally on a network level, blocking unwanted traffic based on IP, port, protocol, geographical information, packet size etc. The SWG, on the other hand, works on the application layer, at HTTP and DNS requests, searching for attempts to connect to specific domains or hosts.
Modern firewalls, so-called “next-gen firewalls” are a unified package of different features for threat detection and prevention, identity-based inspections, spam filters, and more. Sometimes they also include a secure web gateway functionality. Lightweight architectures for modern perimeter-less do not favor robust all-in-one firewalls and the secure web gateway is more often a part of remote-access solutions for cloud-first deployments.
If you need a dedicated VPN gateway with a static IP address for IP whitelisting, you will need one of GoodAccess paid plans (Essential and higher). Learn more in our blog on IP whitelisting.
With our 14-day free trial you can try all the premium features of GoodAccess. Once the 14 days trial period expires, you have to switch to one of the paid plans or go with Starter.
There are no bandwidth caps when using GoodAccess. Thanks to the global gateway network, our users do not experience latency issues.
The security of GoodAccess and its users is of paramount importance to us. This is why we put significant emphasis on protection of our gateways, which are protected against brute-force attacks and other malicious techniques, encryption protocols, algorithms, and authentication methods. Our solution is subjected to continual penetration tests from two different cyber security companies and complies with GDPR. Visit our website on security of GoodAccess to learn more.