Platform Features Customers Resources Company Pricing
Book a Demo Try Free Trial Login

ZTNA

for small & midsize businesses

Zero Trust Network Access Made Simple

Create a secure virtual network between all users, networks, clouds, and on-prem resources. Get started in 10 minutes. Scale easily. 100% cloud zero-trust network access solution designed for small and medium businesses.

Create Free Account See Demo

No card required. Full onboarding support.

Zero Trust Network Access
Capterra rating TrustRadius rating G2 rating SourceForge rating

BENEFITS

Provision secure cloud access to business resources. Anytime, anywhere.

secure your business

Secure

Create a bulletproof defense against breaches with identity based access rules, traffic encryption, MFA, SSO, network segmentation, and other features.

Easy to use

User-friendly

Tap into the resilient network as a service. Operate your own virtual infrastructure with a few clicks through a web interface. High-speed connectivity, anywhere, anytime.

Affordable solution

Designed for SMBs

Cut the costs of network security and operations. Get started in 10 minutes with no expert skills needed. 100% cloud solution that scales as your business grows.

joy icon

Loved by users

Walkthroughs, user guides, top-rated support, and user experience result in an average 4.8/5 user satisfaction rating and 92% likelihood to recommend GoodAccess.

GoodAccess Dashboard Demo
See GoodAccess in action

Try Interactive Demo

Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.

FEATURES

Multi-layered security for the network-less organizations

With access rules, strong authentication, segmentation, and more you can level up your security across on-site and remote locations.

branch connectors

Cloud & branch connectors

The built-in cloud and branch connector enables you to connect your clouds, data centers, and private LANs into your GoodAccess virtual infrastructure easily and securely. You can choose what protocols to use (IPsec, IKEv2, or OpenVPN) depending on your preference or the environment. If you need highly available remote access to your on-prem or cloud systems, you can set up a redundant IPsec or IKEv2 tunnel as a failsafe.

Cloud and branch connectors

Single sign-on

SSO & Identity management

Simplify identity management and access control with single sign-on (SSO). GoodAccess supports SSO with access credentials from Microsoft Entra ID, Google Workspace, Okta, and other SAML compatible services. SCIM for automated access provisioning is also supported.

SSO and Identity management

threat blocker

Breach prevention

Threat Blocker is a native, always-on feature of GoodAccess that prevents users from accessing dangerous or compromised malicious websites and falling prey to malware, phishing, command and control (C&C) botnets and other ploys. Protection is constantly updated using threat intelligence feeds and DNS blacklists (see DNS filtering).

Threat detection recognizes infected devices

DNS FILTERING

Network Control & Visibility

GoodAccess DNS filtering gives you control over access to all sites and applications so that you can automatically restrict unwanted user behavior and block phishing and other malicious domains.

GoodAccess DNS filtering

Access logs

User activity logging

Have full control over gateway access points to monitor who and when connects to your network. This will help you to reduce risk and comply with GDPR, SOC2, or HIPAA regulations.

Compliance enforcement with constant monitoring

two/Multi factor authentication

2FA/MFA on the network layer

GoodAccess allows enforcing 2FA/MFA for admin login as well as for users' login to GoodAccess app. Instead of labor-intensive configuration of MFA for each application, you can unify authentication on the network level with GoodAccess. This works even if your systems don't support 2FA/MFA on the application level.

2FA and MFA on network layer

virtual access cards

Centralized access control

Segment your network and assign permissions on the least-privilege principle to prevent unauthorized access. With virtual access cards you can determine which user may access which system. As a result, every user has a private account and network identity so they are allowed to access only specified applications. You can also use external providers' single-sign-on authentication (GSuite, Okta, Active Directory/LDAP).

Centralized access control
Create Free Account

No card required.

Full onboarding support.

Pricing

The best priced offering on the market

100% cloud ZTNA solution that scales as your business grows.

ESSENTIAL

Dedicated Cloud VPN with Static IP whitelisting

$7
per user / month
min. 5 users
+$49/mo per dedicated gateway
See full pricing
Suitable package
PREMIUM
ZTNA - Zero Trust Network Access for multi-site & cloud businesses
$11
per user / month
min. 5 users
+$49/mo per dedicated gateway
Book a Demo
Full onboarding support.
Dedicated ZTNA Architect.

Networking

Premium SECURE SHIELD

Support

> See Full Pricing <
ENTERPRISE

Enterprise features and Premium 24/7 support for large organizations

On Request
minimum 50 users
See full pricing

compliance

SOC2 and ISO 27001 certified. GDPR, HIPAA compliant.

GoodAccess adheres to the most demanding standards of software security compliance so you can have a peace of mind that your organization's data is safeguarded properly.

GoodAccess compliance certifications

4 QUICK STEPS AWAY

Let's get started

Create a free account
Create a free account

Create your free account and get all premium features for 14 days for free.

Connect your business
Connect your business

Choose from 35+ locations for your dedicated gateway. Connect your systems, apps, clouds and devices.

Invite team members
Invite team members

Invite users via email to create their account and get the GoodAccess app. Use Access Cards to assign permissions only to particular SaaS applications, services, servers, internal systems and such.

Work securely
Work
securely

Click to connect from any device anywhere and work securely. Oversee who and when connects to your applications, control activity and data transfers.

Get in touch

Get your personalized product demo

Take a product tour with Eva, GoodAccess product expert, to discover how GoodAccess meets your needs firsthand.

Get in touch

Frequently asked questions

FAQs

What is zero trust network?

Zero trust network is a network that by design minimizes insider threats and prevents risks associated with unauthorized access/credential misuse. This is achieved by very strict access verification and damage containment via restriction of unnecessary access privileges - so-called the least privilege principle.

What is the difference between VPN and ZTNA?

The main difference is in the scope of access rights provided to the user. A VPN allows user access to the entire network once they are authorized. Zero trust network access is a security concept utilizing the least privilege principle, so that access is granted only to selected systems for satisfactorily authorized users.

How would you implement a zero trust network?

Any company, no matter the size can today implement zero-trust network access security thanks to the democratization of ZTNA tools. Basically, there are three forms that a ZTNA deployment can take and they vary depending on the systems included and the overall goals they aim to achieve: identity-based model, microsegmentation model, and software-defined perimeter (SDP). Learn more about the ZTNA implementation in our blog.