Choose Your Plan
Start free with a full-featured 14-day trial. No credit card required.
Pick your plan
Saving extra 20% with annual billing
Essential
Dedicated Cloud VPN with Static IP whitelisting
Premium
Full Zero Trust Architecture for multi-site & cloud businesses (SSE / SDP / ZTNA)
Enterprise
Enterprise features and Premium 24/7 support for large organization
Essential
Dedicated Cloud VPN with Static IP whitelisting
Premium
Full Zero Trust Architecture for multi-site & cloud businesses (SSE / SDP / ZTNA)
Enterprise
Enterprise features and Premium 24/7 support for large organization
PLATFORM
Web-based management platform
Manage your Zero Trust Network easily through a web application. Invite your colleagues and control everything centrally.
Dashboards & Weekly Reports
Oversee your remote teams and check the security status of your organization.
Mobile and Desktop Client App - Agents
Connect your devices with one-click apps (agents) for Windows, MacOS, Linux, Android, iOS & ChromeOS.
Multiple Device Connections
Allow each user to securely connect up to three devices (e.g., laptop, phone, tablet) simultaneously without sacrificing performance or security.
API Support
React immediately on detected anomalies by blocking users or devices. Automate your security processes via API integration with SIEM or SOC.
NETWORK
Private Global Secure Network
Choose from 35+ always-available cloud gateways worldwide, or get a new one on-demand. Interconnect your on-site and remote teams via a dedicated private network.
35+ locations
35+ locations
Custom
Gateway Performance
Secure your network communications without hindering performance and user experience.
10Gbps
10Gbps
10Gbps
Instant Deployment
Deploy your private Zero Trust Network in less than 10 minutes.
Dedicated Static IP
Each gateway comes with a unique static IP that dedicated to your organization.
Additional Gateways (High Availibility)
Optimize network performance for your global teams. Ensure high availability and protect your team from local network outages.
Add-On $49/mo
Add-On $49/mo
Add-On $49/mo
Unlimited Data Usage
We place no limit on how much data you transfer through your Zero Trust Network.
Split Tunneling
Access your critical systems via the secure GoodAccess gateway and route non-essential traffic directly.
Clouds & Branch connectors
Access in your office LAN or private/public cloud networks from anywhere. One connector is included and more can be purchased as an add-on.
1
Custom
Additional Clouds & Branch connectors
Extend your secure network to more locations. Add extra connectors for multiple office LANs or cloud environments, scaling your infrastructure as your business grows.
Add-On $29/mo
Add-On $29/mo
Custom Domain Names
Use your organization's DNS servers as well as local domain names.
Private DNS
Set up custom private DNS records for your systems.
Custom DNS Resolver
Route DNS queries through your own resolvers—public or private—to maintain greater control over domain name resolution and improve network consistency.
Always-on Connectivity
Stay always connected to your secure network. Persistent secure tunnel connections are established automatically.
Forced Always-on
Ensure your users are protected at all times and prevent them from disconnecting from the GoodAccess network.
On-Premise Infrastructure
GoodAccess infrastructure can be deployed on-premise as a part of your enterprise infrastructure.
On Request
AUTHENTICATION
Multi-Factor Authentication
Enforce MFA on the network level to authenticate user network traffic. MFA is available for the management console, client apps (agents), and optionally per every connection.
PIN & Biometric Authentication (Enforced MFA)
Allow users to verify their identity with a PIN code or biometric data before connecting. Administrators can enforce this setting to achieve a higher level of security and a smoother user experience.
Single Sign-On (SSO)
Sign in with your Identity Provider: Google Workspace, Microsoft Entra ID, Okta, and other SAML-compatible services.
Multiple SSO Providers
Combine multiple Identity providers ito include different departments or 3rd-party partners to access your critical systems securely.
SCIM
Streamline the onboarding and offboarding of your users and groups via fully automatic SCIM provisioning.
IP Restriction for Control Panel
Limit Control Panel access to specific IP addresses or GoodAccess gateways, preventing unauthorized access and safeguarding administration.
SECURITY & COMPLIANCE
Device Management
Keep track of user devices, their parameters, spot suspicious behaviors and block risky devices from accessing your critical systems.
Device Posture Check
Enforce compliance with your organization’s device security policies by automatically checking their security state before allowing access to your network perimeter and protected resources.
Unlimited
Unlimited
Zero Trust Access Control (Cloud FWaaS)
Enable Identity-Based Access Control to critical resources with network segmentation at maximal granularity.
Unlimited
Unlimited
Time-Based Permissions (PIM/PAM)
Set temporary or time-based access (e.g., specific days or hours) to manage privileged accounts. Improve security by granting permissions only when they are truly needed.
Secure Web Gateway Lite
Automatically detect and block malicious domains (malware, ransomware, botnets, spam), phishing attempts, and harmful content in real time using DNS-based threat intelligence.
Custom Domain Blocking (Filtering)
Block custom domains that you don't want your employees to visit, e.g. social networks or adult content.
Network Encryption
Encrypt all traffic on the network level (including headers and DNS).
Geo Restriction
Specify countries from which access is denied or allowed.
Device Approval
Require manual approval of every new device seeking to connect to your secure perimeter.
Network Segmentation
Segment your network easily at maximal granularity (network services, URL / IP, Port, Protocol)
SIEM Integration
Integrate GoodAccess logs with your external SIEM solution for centralized security monitoring, automated threat detection, and streamlined incident response.
Gateway Access Logs
Monitor who connects to your network and meet compliance requirements (GDPR, HIPPA, SOC2, ISO27001, NIS2).
System Access Logs
Monitor user-application interactions and meet compliance requirements (GDPR, HIPPA, SOC2, ISO27001, NIS2).
Threat Blocker Logs
Monitor blocked phishing attempts and malware infections of every user or device.
Device Posture Check Logs
Monitor all connected devices, check their security status, and spot potential policy violations.
Admin Logs
Monitor all changes that administrators make in the GoodAccess Control Panel.
Custom
Log Retention
A period for which logs will be retained in the GoodAccess platform. Export for external storage is available.
90 days
90 days
Custom
SUPPORT
Onboarding Assistance
Our team is ready to advise you on setting up and configuring GoodAccess. We'll guide you through the platform and share best practices to help you get started effectively.
Solution Architect (ZTA Design & Deployment)
Work with a professional Solution Architect expert in designing and deploying Zero Trust Architecture (ZTA). They'll help specify your requirements, design a custom ZTA for your infrastructure, and ensure proper implementation within the GoodAccess platform.
Custom
Custom
Custom
Dedicated Account Manager
A designated contact who oversees your account and ensures your long-term satisfaction. They coordinate resources, provide non-technical advice, and manage ongoing communication to address your business needs.
Knowledge Base Access
Access to configuration guides and resources for setting up GoodAccess correctly.
Chat and Email Support
Technical support for any issues, with priority response for higher service tiers.
Priority
Priority
Phone Support
24/7 emergency phone support, available as an add-on or included depending on the service level.
24/7
Pay annually and save 20%
PLATFORM
Web-based management platform
Manage your Zero Trust Network easily through a web application. Invite your colleagues and control everything centrally.
Dashboards & Weekly Reports
Oversee your remote teams and check the security status of your organization.
Mobile and Desktop Client App - Agents
Connect your devices with one-click apps (agents) for Windows, MacOS, Linux, Android, iOS & ChromeOS.
Multiple Device Connections
Allow each user to securely connect up to three devices (e.g., laptop, phone, tablet) simultaneously without sacrificing performance or security.
API Support
Deploy your private Zero Trust Network in less than 10 minutes.
NETWORK
Private Global Secure Network
Choose from 35+ always-available cloud gateways worldwide, or get a new one on-demand. Interconnect your on-site and remote teams via a dedicated private network.
35+ locations
35+ locations
Custom
Gateway Performance
Secure your network communications without hindering performance and user experience.
10Gbps
10Gbps
10Gbps
Instant Deployment
Deploy your private Zero Trust Network in less than 10 minutes.
Dedicated Static IP
Each gateway comes with a unique static IP that dedicated to your organization.
Additional Gateways (High Availibility)
Optimize network performance for your global teams. Ensure high availability and protect your team from local network outages.
Add-On $49/mo
Add-On $49/mo
Add-On $49/mo
Unlimited Data Usage
We place no limit on how much data you transfer through your Zero Trust Network.
Split Tunneling
Access your critical systems via the secure GoodAccess gateway and route non-essential traffic directly.
Clouds & Branch connectors
Access in your office LAN or private/public cloud networks from anywhere. One connector is included and more can be purchased as an add-on.
1
Custom
Additional Clouds & Branch connectors
Extend your secure network to more locations. Add extra connectors for multiple office LANs or cloud environments, scaling your infrastructure as your business grows.
Add-On $29/mo
Add-On $29/mo
Add-On $29/mo
Custom Domain Names
Use your organization's DNS servers as well as local domain names.
Private DNS
Set up custom private DNS records for your systems.
Always-on Connectivity
Stay always connected to your secure network. Persistent secure tunnel connections are established automatically.
Route DNS queries through your own resolvers—public or private—to maintain greater control over domain name resolution and improve network consistency.
Custom DNS Resolver
Route DNS queries through your own resolvers—public or private—to maintain greater control over domain name resolution and improve network consistency.
Ensure your users are protected at all times and prevent them from disconnecting from the GoodAccess network.
Forced Always-on
Ensure your users are protected at all times and prevent them from disconnecting from the GoodAccess network.
GoodAccess infrastructure can be deployed on-premise as a part of your enterprise infrastructure.
On-Premise Infrastructure
GoodAccess infrastructure can be deployed on-premise as a part of your enterprise infrastructure.
On Request
AUTHENTICATION
Multi-Factor Authentication
Enforce MFA on the network level to authenticate user network traffic. MFA is available for the management console, client apps (agents), and optionally per every connection.
PIN & Biometric Authentication (Enforced MFA)
Allow users to verify their identity with a PIN code or biometric data before connecting. Administrators can enforce this setting to achieve a higher level of security and a smoother user experience.
Single Sign-On (SSO)
Sign in with your Identity Provider: Google Workspace, Microsoft Entra ID, Okta, and other SAML-compatible services.
Multiple SSO Providers
Combine multiple Identity providers ito include different departments or 3rd-party partners to access your critical systems securely
SCIM
Streamline the onboarding and offboarding of your users and groups via fully automatic SCIM provisioning.
IP Restriction for Control Panel
Limit Control Panel access to specific IP addresses or GoodAccess gateways, preventing unauthorized access and safeguarding administration.
SECURITY & COMPLIANCE
Device Management
Keep track of user devices, their parameters, spot suspicious behaviors and block risky devices from accessing your critical systems.
Device Posture Check
Enforce compliance with your organization’s device security policies by automatically checking their security state before allowing access to your network perimeter and protected resources.
Unlimited
Unlimited
Zero Trust Access Control (Cloud FWaaS)
Enable Identity-Based Access Control to critical resources with network segmentation at maximal granularity.
Unlimited
Unlimited
Time-Based Permissions (PIM/PAM)
Set temporary or time-based access (e.g., specific days or hours) to manage privileged accounts. Improve security by granting permissions only when they are truly needed.
Custom Domain Blocking (Filtering)
Block custom domains that you don't want your employees to visit, e.g. social networks or adult content.
Network Encryption
Encrypt all traffic on the network level (including headers and DNS).
Network Segmentation
Segment your network easily at maximal granularity (network services, URL / IP, Port, Protocol)
Gateway Access Logs
Monitor who connects to your network and meet compliance requirements (GDPR, HIPPA, SOC2, ISO27001, NIS2).
System Access Logs
Monitor user-application interactions and meet compliance requirements (GDPR, HIPPA, SOC2, ISO27001, NIS2).
Threat Blocker Logs
Monitor blocked phishing attempts and malware infections of every user or device.
Device Posture Check Logs
Monitor all connected devices, check their security status, and spot potential policy violations.
Admin Logs
Monitor all changes that administrators make in the GoodAccess Control Panel.
Custom
Secure Web Gateway Lite
Automatically detect and block malicious domains (malware, ransomware, botnets, spam), phishing attempts, and harmful content in real time using DNS-based threat intelligence.
Geo Restriction
Specify countries from which access is denied or allowed.
Device Approval
Require manual approval of every new device seeking to connect to your secure perimeter.
SIEM Integration
Integrate GoodAccess logs with your external SIEM solution for centralized security monitoring, automated threat detection, and streamlined incident response.
Log Retention
A period for which logs will be retained in the GoodAccess platform. Export for external storage is available.
90 days
90 days
Custom
SUPPORT
Solution Architect (ZTA Design & Deployment)
Our solution architects will help you with deployment via online calls, chat, or email.
Custom
Custom
Custom
Onboarding Assistance
Our team is ready to advise you on setting up and configuring GoodAccess. We'll guide you through the platform and share best practices to help you get started effectively.
Knowledge Base Access
Use our configuration guides to set up GoodAccess correctly.
Chat and Email Support
Our technical support is ready to help with any issues you might be experiencing.
Priority
Priority
Dedicated Account Manager
Your dedicated expert will help you to deploy GoodAccess in your infrastructure. Service includes advanced deployment such as member onboarding, connecting Cloud & Branch networks, defining critical systems, designing Zero Trust Access and Device Posture Check policies, integrating with your SSO Identity Provider, and SIEM Integration.
Phone Support
Access to 24/7 emergency phone support.
24/7
testimonials