Detect non-compliant devices and block their entry to your perimeter. Define your own device policy and enforce it in real-time. GoodAccess Device Posture Check is BYOD security made simple.
Device Posture Check is fully integrated in GoodAccess client apps and managed and enforced centrally.
Try GoodAccess for free.
No card needed. Full onboarding support.
BENEFITS
Tailor device security requirements to your company’s needs and enforce them in real-time.
Main benefit
Monitor any device that connects to your SDP with zero additional investment.
Main benefit
Gain full control over connecting devices and monitor their health and connection details in one place.
Main benefit
FEATURES
Gateway network
Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.
Threat protection
Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.
Goodaccess app
GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.
Protection
Create your own device security policy and enforce it centrally. Weed out non-compliant devices and block them from accessing your network. Enable easy BYOD remote access with zero additional hardware or software tools.
Control management
Monitor the health of all user devices in one place. Check their access history and health track record. Adjust your policy from a central UI and enforce it in real-time.
Compliant
Assure device security compliance with standards and regulations like SOC 2, NIS 2, ISO 27001, and HIPAA.
testimonials
Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.
Test all premium features for 14 days without limitation. No credit card required.
Choose a gateway near your location, and connect.
Invite team members and build your secure environment in 10 minutes.
No card needed. Full onboarding support.
Schedule a call with the GoodAccess success manager to get all the details about our product features.
Other features
Monitor access on the system level, spot suspicious behaviors, and intervene before the problem escalates.
Minimize the attack surface by robust user authentication, granular privilege assignment, and strong encryption.
Protect your network from phishing attempts, malicious domains, or productivity sinks.
device posture check guide
The Device Posture Check is a security measure integrated into the GoodAccess client app that checks whether the user device meets security policy. It does so immediately after installing the agent on the device, after the user logs in, and periodically every 30 minutes.
You can set up a security policy using a custom mix of criteria, e.g. lock screen protection, OS type and version, active antivirus software, specified registry key, etc. For a comprehensive list of restrictions, please refer to our Support Portal.
Non-compliant devices will be logged, the admin will be notified, and (optionally) the device will be blocked from accessing resources within the perimeter.
Device Posture Check is available for devices of all major platforms—Windows, macOS, iOS, iPadOS, Android, and Linux.
How the Device Posture Check works
Whenever the user logs in their application, the Device Posture Check assesses the device against your policy restrictions. This also occurs every 30 minutes while the application is running.
Each policy restriction is evaluated individually, and the device must meet all of them.
Depending on the outcome of the Posture Check, the device is either granted or denied access to your SDP.
The Device Posture Check will continuously watch for changes in policy restrictions. When you make changes, devices that fail to comply with the new criteria will be disconnected.
You can monitor all your users’ connected devices, their security posture, and the outcomes of past checks from the Control Panel.
Security posture is a holistic assessment that describes the preparedness of an organization, service, device, etc., to tackle various security threats. Generally, the more attack vectors are covered, the better the security posture.
Security posture of devices concerns mainly protection against malware and network-borne threats, since a vulnerable device can serve as an entry point for a cyberattacker seeking sensitive company data.
Because remote work and BYOD policies have become more common, companies need certainty that devices connecting to their internal systems do not pose a security threat. While companies have control over those devices they issue to employees themselves, the employees’ own devices or the devices of contractors present a challenge in this regard. Device Posture Check tackles this problem by verifying the device adheres to company policy before allowing it through.
GoodAccess’ Device Posture Check is integral to the client app (agent), which means it requires no additional hardware to implement. The app carries out the check while configuration and management is handled centrally from the Control Panel.
Whenever a device fails a Posture Check, the event is always logged. If the non-compliant device is attempting to connect to the perimeter, it is denied access. If it is already connected but fails to meet an updated security policy, it will be disconnected.
Device Posture Check is set up and managed centrally. The user has no option to disable it except switch off the Client App altogether.
Yes, policy restrictions are applied per Team Member or Group. You can customize your device security policy depending on the perceived security risk across your different teams.
The admin can decide if they want the users to know. If they enable this, the user will be informed about all the security restrictions they comply with or violate.