Make your infrastructure invisible to the prying eyes of attackers and other non-authorized personnel, whether it resides in your LAN, datacenter, or cloud. With GoodAccess software-defined perimeter you can define your network with identity-based network access and face modern online threats with confidence.Create Free AccountSee Demo
No card required. Full onboarding support.
Cover every device as a potential entry point to your network and protect it by zero-trust access control, MFA, SSO, traffic encryption, segmentation, and other features.
Manage on-premise and cloud assets, users and devices, assign access rights, and set up granular access policies via a web GUI.
Deploy GoodAccess in 10 minutes even if you are not a networking expert. Benefit from a 100% software solution that scales as you grow.
Walkthroughs, user guides, top-rated support, and user experience result in an average 4.8/5 user satisfaction rating and 92% likelihood to recommend GoodAccess.
Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.
Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.
GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.
Prevent users from accessing dangerous or compromised malicious websites and falling prey to malware, phishing, command and control (C&C) botnets and other ploys. Once a user connects through a GoodAccess cloud gateway with your dedicated DNS server, all of their web activity is protected in real time by blocking unwanted content and malicious domains. Protection is constantly updated using threat intelligence feeds and DNS blacklists (see DNS filtering).
Incorporate your network resources in a few minutes with no reconfiguration of your current infrastructure. Include any on-premise infrastructure (LANs, data centers) or clouds into a software defined perimeter with GoodAccess connectors to hide them on the public internet. Choose what protocols to use (IPsec, IKEv2, or OpenVPN) to establish an encrypted connection and set up a redundant IPsec or IKEv2 tunnel as a failsafe.
Assign access rights based on the least-privilege principle to prevent unauthorized access and lateral movement. With virtual access cards, every user receives a private network identity, which, after authentication, allows them to access only specified applications that they are authorized to use. You can also use external providers' single sign-on authentication (GSuite, Okta, Active Directory/LDAP).
With GoodAccess’ software defined perimeter you can control access on a user-to-application basis. Define your SaaS based application such as CRM and marketing tools as part of your secured network and apply the same level of protection as in your LAN in a few clicks. By segmenting access rights in the GoodAccess management dashboard, you achieve a higher granularity than network segmentation at a fraction of network operation costs and deployment time.
GoodAccess comes with always-on client apps for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Once authenticated through the GA app, any device turns into a secure end-point. Just invite your colleagues via email to create their account and get the GoodAccess app.
Base access to your network resources on user identity and device posture check. GoodAccess pre-authenticates users and their devices when they log into the secure GoodAccess infrastructure. The login supports multi-factor authentication (MFA), biometrics and tokens on the top of single sign-on (SSO) using Google, Okta, MS Azure credentials, or universal (SAML). Automate your access provisioning via SCIM.
Have full control over gateway access points to monitor who connects to your network and when. See which users log into your systems, when, and how much data they transfer. Observe user access behavior to reduce risk and comply with GDPR, SOC2, or HIPAA regulations.
No card required.
Full onboarding support.
We were looking for fast, secure, and quality audio transmission. We are excited that GoodAccess allows our agents to make phone calls with our clients via VOIP provider using the office IP from their home. GoodAccess is inexpensive, easy-to-use, safe, and the support team is brilliant!
GoodAccess has strong encryption which shows to our customers that we take great care in protecting their data. The app is straightforward to use so we can access our systems from 14 different time zones and work efficiently. Simply a VPN with static IP for a great price.
It's important for us that GoodAccess' VPN with static IP is fast & has low latency, which feels like working from the office. I love the user friendly control panel, which just makes the work much easier!
GoodAccess increases the level of security in our organization. We use it to access several cloud services and our data warehouse. We appreciate the customer-oriented support team, frequent product updates, and the excellent price/value ratio.
100% cloud SDP solution that scales as your business grows.
Secure internet access and online threat protection for business teams
Dedicated Cloud VPN with Static IP whitelisting
Access systems in your office LAN or private/public cloud from anywhere. One connector is included and more can be purchased as an add-on.
Reduce your attack surface and provide secure access for your employees regardless of their location.
Enable Single Sign-On using Google, Azure, Okta and other SAML compatible services.
Block custom domains that you don't want your employees to visit, e.g. social networks or adult content.
Monitor user-application interactions and meet compliance requirements (GDPR, HIPAA, SOC2, NIS2).
Zero-trust access for multi-site & cloud businesses
Enterprise features and Premium 24/7 support for large organizations
GoodAccess adheres to the most demanding standards of software security compliance so you can have a peace of mind that your organization's data is safeguarded properly.
Create your free account and get all premium features for 14 days for free.
Choose from 35+ locations for your dedicated gateway. Define which assets should be part of your network, such as systems, apps, clouds, and devices.
Invite users via email to create their account and get the GoodAccess app. Use access cards to assign permissions only to selected SaaS applications, services, servers, internal systems, and such.
Click to connect from any device anywhere and work securely. Oversee who and when connects to your applications, control activity, and data transfers.
Book a call with the GoodAccess success manager to learn more about our products.