ZTNA

for small & midsize businesses

Zero Trust Network Access Made Simple

Create a secure virtual network between all users, networks, clouds, and on-prem resources. Get started in 10 minutes. Scale easily. 100% cloud zero-trust network access solution designed for small and medium businesses.

Create Free AccountSee Demo

No card required. Full onboarding support.

BENEFITS

Provision secure cloud access to business resources. Anytime, anywhere.

secure your business

Secure

Create a bulletproof defense against breaches with identity based access rules, traffic encryption, MFA, SSO, network segmentation, and other features.

Easy to use

User-friendly

Tap into the resilient network as a service. Operate your own virtual infrastructure with a few clicks through a web interface. High-speed connectivity, anywhere, anytime.

Affordable solution

Designed for SMBs

Cut the costs of network security and operations. Get started in 10 minutes with no expert skills needed. 100% cloud solution that scales as your business grows.

joy icon

Loved by users

Walkthroughs, user guides, top-rated support, and user experience result in an average 4.8/5 user satisfaction rating and 92% likelihood to recommend GoodAccess.

FEATURES

Multi-layered security for the network-less organizations

With access rules, strong authentication, segmentation, and more you can level up your security across on-site and remote locations.

Gateway network

Global shared gateway network

Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.

network control and visibility
network control and visibility

Threat protection

Online Threat Protection

Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.

Goodaccess app

Mobile and desktop apps

GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.

branch connectors

Cloud & branch connectors

The built-in cloud and branch connector enables you to connect your clouds, data centers, and private LANs into your GoodAccess virtual infrastructure easily and securely. You can choose what protocols to use (IPsec, IKEv2, or OpenVPN) depending on your preference or the environment. If you need highly available remote access to your on-prem or cloud systems, you can set up a redundant IPsec or IKEv2 tunnel as a failsafe.

Single sign-on

SSO & Identity management

Simplify identity management and access control with single sign-on (SSO). GoodAccess supports SSO with access credentials from Microsoft Entra ID, Google Workspace, Okta, and other SAML compatible services. SCIM for automated access provisioning is also supported.

threat blocker

Breach prevention

Threat Blocker is a native, always-on feature of GoodAccess that prevents users from accessing dangerous or compromised malicious websites and falling prey to malware, phishing, command and control (C&C) botnets and other ploys. Protection is constantly updated using threat intelligence feeds and DNS blacklists (see DNS filtering).

threat detection recognizes infected devices
GoodAccess DNS filtering

DNS FILTERING

Network Control & Visibility

GoodAccess DNS filtering gives you control over access to all sites and applications so that you can automatically restrict unwanted user behavior and block phishing and other malicious domains.

GoodAccess DNS filtering

Access logs

User activity logging

Have full control over gateway access points to monitor who and when connects to your network. This will help you to reduce risk and comply with GDPR, SOC2, or HIPAA regulations.

compliance enforcement with constant monitoring

two/Multi factor authentication

2FA/MFA on the network layer

GoodAccess allows enforcing 2FA/MFA for admin login as well as for users' login to GoodAccess app. Instead of labor-intensive configuration of MFA for each application, you can unify authentication on the network level with GoodAccess. This works even if your systems don't support 2FA/MFA on the application level.

virtual access cards

Centralized access control

Segment your network and assign permissions on the least-privilege principle to prevent unauthorized access. With virtual access cards you can determine which user may access which system. As a result, every user has a private account and network identity so they are allowed to access only specified applications. You can also use external providers' single-sign-on authentication (GSuite, Okta, Active Directory/LDAP).

Create Free Account

No card required.

Full onboarding support.

testimonials

What is first-hand experience with a GoodAccess VPN like?

We were looking for fast, secure, and quality audio transmission. We are excited that GoodAccess allows our agents to make phone calls with our clients via VOIP provider using the office IP from their home. GoodAccess is inexpensive, easy-to-use, safe, and the support team is brilliant!

Petr Hruška
Co-founder & CEO at Conexiondiaria

GoodAccess has strong encryption which shows to our customers that we take great care in protecting their data. The app is straightforward to use so we can access our systems from 14 different time zones and work efficiently. Simply a VPN with static IP for a great price.

Paraic Hegarty
CTO at Akari Software

It's important for us that GoodAccess' VPN with static IP is fast & has low latency, which feels like working from the office. I love the user friendly control panel, which just makes the work much easier!

Jan Svoboda
CEO at XDENT

GoodAccess increases the level of security in our organization. We use it to access several cloud services and our data warehouse. We appreciate the customer-oriented support team, frequent product updates, and the excellent price/value ratio.

Petr Jirásek
Co-founder & CTO at Tipli

See GoodAccess in action

Try Interactive Demo

Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.

Pricing

The best priced offering on the market

100% cloud ZTNA solution that scales as your business grows.

STARTER

Secure internet access and online threat protection for business teams

Free
See full pricing
ESSENTIAL

Dedicated Cloud VPN with Static IP whitelisting

$7
per user / month
min. 5 users
+$39/mo per dedicated gateway
See full pricing
ENTERPRISE

Enterprise features and Premium 24/7 support for large organizations

On Request
minimum 50 users
See full pricing

compliance

SOC2 and ISO 27001 certified. GDPR, HIPAA compliant.

GoodAccess adheres to the most demanding standards of software security compliance so you can have a peace of mind that your organization's data is safeguarded properly.

4 QUICK STEPS AWAY

Let's get started

Create a free account

Create your free account and get all premium features for 14 days for free.

Connect your business

Choose from 35+ locations for your dedicated gateway. Connect your systems, apps, clouds and devices.

Invite team members

Invite users via email to create their account and get the GoodAccess app. Use Access Cards to assign permissions only to particular SaaS applications, services, servers, internal systems and such.

Work
securely

Click to connect from any device anywhere and work securely. Oversee who and when connects to your applications, control activity and data transfers.

Get in touch

Not sure where to start? Let's get in touch

Book a call with the GoodAccess affiliate manager to learn more about the benefits of our program.

Frequently asked questions

FAQs

What is zero trust network?
What is the difference between VPN and ZTNA?
How would you implement a zero trust network?