Remote access VPN for small and medium teams
With GoodAcces, you don't have to be a networking expert to set up your remote access VPN. Get everything ready in 10 minutes and enable remote users to access your private network securely wherever they are.
Create Free Account See DemoNo card required. Full onboarding support.
BENEFITS
Safeguard remote access to your private resources
Secure
Reduce the risks of remote access with a static IP, online threat protection, whitelisting and blacklisting, 2FA, access logs, and other key features.
Reliable
Boost the productivity of your remote workers with high-speed connectivity, minimal latency, and unlimited bandwidth.
Designed for SMBs
Cut the costs on network security and operations. GoodAccess is a 100% cloud solution that scales as your business grows.
Loved by users
Average 4.8/5 user satisfaction rating and 92% likelihood to recommend confirms GoodAccess as the smart choice among remote access VPNs for businesses.
Try Interactive Demo
Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.
FEATURES
Get everything you expect from a modern remote access VPN
dedicated cloud vpn
Dedicated VPN gateway
Choose a dedicated VPN gateway from locations all around the world in the blink of an eye. Virtual private infrastructure, secure web access, and authentication service included.
whitelist your Static ip
Static IP for IP whitelisting
Whitelist your public static IP to cloak your systems on the public internet so that only authorized users can access.
Secure gateway
Secure web gateway
Prevent users from accessing dangerous or compromised websites and falling prey to malware, phishing, ransomware, command and control (C&C) botnets, and other ploys. Once a user connects through a GoodAccess cloud gateway featuring a DNS server dedicated to your organization, all of their web activity is protected in real time by blocking unwanted content, access and malicious domains. Protection is constantly updated using threat intelligence feeds and DNS blacklists.
split tunneling
Split tunneling
Through the GoodAccess dedicated VPN gateway you can easily control access to your critical systems and decide which traffic to route locally, outside the organization's VPN.
Goodaccess Apps
Access from any device
GoodAccess comes with always-on client apps for iOS, macOS, Android, Windows and ChromeOS. Just invite your co-workers via email, let them create an account, and get the GoodAccess app. No configuration is needed. Once authenticated through the GoodAccess app, any device turns into a secure end-point.
secure Shield
Strong encryption
GoodAccess creates a secured VPN tunnel via IKEv2/IPSec and OpenVPN protocols. Both are fast, designed to use unbroken ciphers and algorithms, and are equipped with features that keep the communication unreadable to bad actors.
2FA
Two-factor authentication
Harden your security controls by enforcing two-factor authentication (2FA) for the login to the GoodAccess management interface, client apps, and optionally for each connection. The login supports multi-factor authentication (MFA), biometrics and tokens.
Goodaccess dashboard
Control panel
Manage your team members and devices through a web application in a few clicks. The web interface has walkthroughs and user guides, and is optimized for easy network and user management and traffic visibility.
user access logs
User activity logging
Have full control over gateway access points to monitor who and when connects to your network. This will help you to reduce risk and comply with GDPR, SOC2, or HIPAA regulations.
Case study
Hear it from your peers
Case study
Zero Trust Architecture in Creative Dock
Creative Dock needed to ensure ISO 27001 compliance, but they
struggled to achieve the required level of security and control over their network and
user devices (BYOD) with their prior remote-access solution.
Without any additional hardware, GoodAccess provided Creative Dock with full,
centralized control over their infrastructure and
covered up to 70% of technical security requirements of ISO 27001.
Trusted leader in Zero Trust Security
Discover why leading companies rely on GoodAccess for building their Zero Trust Architecture solutions.
"Incredibly user frienly, fast and very helpful."
Overall, the GoodAccess platform is amazing. From the administration side, the platform is incredibly user friendly and you can be up and running in a few minutes, managing users takes no time at all and the customer service is fast and very helpful. We have been with GoodAccess for a number of years with no complaints. The product is very competitive in price with its competitors.
"Find the connectivity and stability of connections stable."
We have been very happy with the reliability of GoodAccess. We find the connectivity and stability of connections stable, we have users across multiple countries and the experience has been very good.
"Simplifies access management and reduces network administration complexity."
GoodAccess's Zero Trust Architecture effectively secures our access to critical network infrastructure and web applications. By enabling a unified IP address for all clients, it simplifies access management and reduces network administration complexity.
"Secure, scalable access to critical systems across a global IP reach."
GoodAccess provides fast onboarding, excellent reporting, and helpful support. It offers secure, scalable access to critical systems across a global IP reach, making it vital for managing multiple users effortlessly. The platform's user-friendly management enhances our operational efficiency and security.
The best priced offering on the market
100% cloud remote access VPN that scales as your business grows.
Full onboarding support.
BASE
Instant deployment
Deploy your private secure cloud network in less than 10 minutes.
Dashboards & Weekly Reports
Oversee your remotely working teams and check the security status of your whole organization.
MSI Deployment
Centralize the distribution of client apps to your team members.
Networking
Dedicated gateway with static IP
Choose from 35+ always-available cloud gateways worldwide, or get a new one on demand. Each gateway comes with a unique static IP and is dedicated just to your organization.
1 Gbps connection / Gateway
Unlimited data usage
Global secure private network
Interconnect your on-site and remote teams via a dedicated private network.
Additional gateways as Add-on
Optimize network performance for your global teams. Ensure 100% availability in case of local network issues.
Split tunneling
Access your critical systems via the secure GoodAccess gateway and route non-essential traffic directly to optimize latency.
Premium SECURE SHIELD
Threat Blocker Premium
Automated defense against malicious domains (malware, ransomware, phishing, botnet C&C, spammers, and more) with built-in threat intelligence feeds, customizable blacklists, and granular threat activity details.
Two-factor authentication
Enforce 2FA on the management interface, client apps, and optionally per every connection.
Gateway-level access logs
Monitor who connects to your network to meet compliance requirements (GDPR, HIPPA, SOC2)
Device Inventory
Keep track of user devices, their parameters, and spot suspicious behaviors.
ZTNA - Zero Trust Network Access for multi-site & cloud businesses
Enterprise features and Premium 24/7 support for large organizations
SOC2 and ISO 27001 certified. GDPR, HIPAA compliant.
GoodAccess adheres to the most demanding standards of software security compliance so you can have a peace of mind that your organization's data is safeguarded properly.
Let's get started
ThreatBlocker is an built-in secure web gateway feature of every GoodAccess subscription plan. Benefit from protection against malware, ransomware, phishing C&C botnets, and robust security and threat monitoring.
Create your free account and get all premium features for 14 days for free.
Choose from 35+ locations for your dedicated VPN gateway. Connect your systems, apps, and devices. Whitelist accesses with your new static IP.
Invite users via email to create their account and get the GoodAccess app (available for iOS, Mac, Android, Windows and ChromeOS).
securely
Click to connect from any device anywhere and access your business resources securely.
Get your personalized product demo
Take a product tour with Eva, GoodAccess product expert, to discover how GoodAccess meets your needs firsthand.
FAQs
Remote access VPN is a type of networking solution that encrypts communication between the remote employee and business applications, networks, and data located in a company datacenter. Using client software installed on the host (desktop, laptop, smartphone, etc.), remote workers become a part of the company network as if they were sitting in the office.
The SWG checks user attempts to communicate with a domain against a blacklist, either commercial, open source, or a custom list of forbidden services based on company policies and automatically blocks suspicious traffic.
Firewall, being a perimeter security measure just like the SWG, works traditionally on a network level, blocking unwanted traffic based on IP, port, protocol, geographical information, packet size etc. The SWG, on the other hand, works on the application layer, at HTTP and DNS requests, searching for attempts to connect to specific domains or hosts.
Modern firewalls, so-called "next-gen firewalls" are a unified package of different features for threat detection and prevention, identity-based inspections, spam filters, and more. Sometimes they also include a secure web gateway functionality. Lightweight architectures for modern perimeter-less do not favor robust all-in-one firewalls and the secure web gateway is more often a part of remote-access solutions for cloud-first deployments.
If you need a dedicated VPN gateway with a static IP address for IP whitelisting, you will need one of GoodAccess paid plans (Essential and higher). Learn more in our blog on IP whitelisting.
With our 14-day free trial you can try all the premium features of GoodAccess. Once the 14 days trial period expires, you have to switch to one of the paid plans or go with Starter.
There are no bandwidth caps when using GoodAccess. Thanks to the global gateway network, our users do not experience latency issues even.
The security of GoodAccess and its users is of paramount importance to us. This is why we put significant emphasis on protection of our gateways, which are protected against brute-force attacks and other malicious techniques, encryption protocols, algorithms, and authentication methods. Our solution is subjected to continual penetration tests from two different cyber security companies and complies with GDPR. Visit our website on security of GoodAccess to learn more.