Prevent users from accessing dangerous or compromised websites and falling prey to malware, phishing, C&C botnets and other ploys.
No matter where the user is, once they connect through the GoodAccess secure web gateway, they are protected.
Customize your security by adding your own rules and unwanted sites on top of built-in threat intelligence feeds.
Monitor users' attempts to make malicious connections on the dashboard, isolate the threat and respond confidently.
Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.
Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.
GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.
Threat Blocker uses a large database of threat intelligence feeds, covering malicious sites, malware, spammers, C&C botnets, and other types of online threats. Custom blacklists are supported to fine-tune your controls.
Once a user connects through a cloud gateway with your dedicated DNS server, all of their web activity is protected in real time by blocking unwanted content and malicious domains (see DNS filtering).
For monitoring and compliance reasons, users' access to harmful websites and content is tracked and logged. See which users attempted to access blocked or harmful sites to isolate the threat, respond, and optimize your security controls.
Mobile & desktop apps
GoodAccess comes with one-click apps for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.
No card required.
Full onboarding support.
We were looking for fast, secure, and quality audio transmission. We are excited that GoodAccess allows our agents to make phone calls with our clients via VOIP provider using the office IP from their home. GoodAccess is inexpensive, easy-to-use, safe, and the support team is brilliant!
GoodAccess has strong encryption which shows to our customers that we take great care in protecting their data. The app is straightforward to use so we can access our systems from 14 different time zones and work efficiently. Simply a VPN with static IP for a great price.
It's important for us that GoodAccess' VPN with static IP is fast & has low latency, which feels like working from the office. I love the user friendly control panel, which just makes the work much easier!
GoodAccess increases the level of security in our organization. We use it to access several cloud services and our data warehouse. We appreciate the customer-oriented support team, frequent product updates, and the excellent price/value ratio.
Cloud-based secure web gateway that fits your needs.
Secure internet access and online threat protection for business teams
Encrypted VPN internet access for business teams
Oversee your remotely working teams and check the security status of your whole organization.
Choose from 35+ always-available cloud gateways worldwide, or get a new one on demand. Each gateway comes with a unique static IP and is dedicated just to your organization.
Interconnect your on-site and remote teams via a dedicated private network.
Optimize network performance for your global teams. Ensure 100% availability in case of local network issues.
Access your critical systems via the secure GoodAccess gateway and route non-essential traffic directly to optimize latency.
Automated defense against malicious domains (malware, ransomware, phishing, botnet C&C, spammers, and more) with built-in threat intelligence feeds, customizable blacklists, and granular threat activity details.
Enforce 2FA on the management interface, client apps, and optionally per every connection.
Monitor who connects to your network to meet compliance requirements (GDPR, HIPPA, SOC2)
ZTNA - Zero Trust Network Access for multi-site & cloud businesses
Enterprise features and Premium 24/7 support for large organizations
GoodAccess adheres to the most demanding standards of software security compliance so you can have a peace of mind that your organization's data is safeguarded properly.
ThreatBlocker is an built-in secure web gateway feature of every GoodAccess subscription plan. Go with our free plan to get basic protection against malware, ransomware, phishing C&C botnets, or subscribe to any of our paid plans to benefit from more robust security and threat monitoring.
Create your free account and get all premium features for 14 days.
Choose from 35+ dedicated VPN gateway locations or connect through a global shared gateway network.
Invite users via email to create their account and get a GoodAccess app (available for iOS, Mac, Android, Windows and ChromeOS).
Click to connect from any device, anywhere and work securely.
A secure web gateway (SWG) is an application-level traffic filtering solution that monitors all requests between users and web servers on the internet. A SWG was traditionally deployed on the network perimeter. Today, cloud-delivered solutions are more common, as users work from home or use unsecured wifi networks, to protect every employee from malware, phishing, botnet C&C, or other online threats.
The SWG checks user attempts to communicate with a domain against a blacklist, either commercial, open source, or a custom list of forbidden services based on company policies and automatically blocks suspicious traffic.
Firewall, being a perimeter security measure just like the SWG, works traditionally on a network level, blocking unwanted traffic based on IP, port, protocol, geographical information, packet size etc. The SWG, on the other hand, works on the application layer, at HTTP and DNS requests, searching for attempts to connect to specific domains or hosts.
Modern firewalls, so-called “next-gen firewalls” are a unified package of different features for threat detection and prevention, identity-based inspections, spam filters, and more. Sometimes they also include a secure web gateway functionality. Lightweight architectures for modern perimeter-less do not favor robust all-in-one firewalls and the secure web gateway is more often a part of remote-access solutions for cloud-first deployments.
The Starter plan includes the Threat Blocker in its basic functionality, which offers the full protective capability only with less granular reporting.
If you need a dedicated VPN gateway with a static IP address for IP whitelisting, you will need one of GoodAccess paid plans (Essential and higher). In the forever-free Starter plan you get a dynamically assigned IP address which is not suitable for IP whitelisting (learn why in this blog on IP whitelisting).
With our 14-day free trial you can try all the premium features of GoodAccess. Once the 14 days trial period expires, you have to switch to one of the paid plans or go with Starter.
Starter is free forever for up to 100 users in your team, includes essential networking and security features such as network traffic encryption, protection against web-based threats and web based central management.
There are no bandwidth caps when using GoodAccess. Thanks to the global gateway network, our users do not experience latency issues even if they use a shared gateway infrastructure in their Starter plans.
The security of GoodAccess and its users is of paramount importance to us. This is why we put significant emphasis on protection of our gateways, which are protected against brute-force attacks and other malicious techniques, encryption protocols, algorithms, and authentication methods. Our solution is subjected to continual penetration tests from two different cyber security companies and complies with GDPR. Visit our website on security of GoodAccess to learn more.