Acronis

Technology Ecosystem

Integrations with the tools and services MSPs know and trust.
Integration: GoodAccess
Category: SASE & ZTNA
Company: GoodAccess s.r.o.

Zero Trust Network Access Made Simple

GoodAccess is your go-to ZTNA-as-a-service solution. Secure all your digital resources with the most user-friendly solution on the market. Provide least-privilege access from anywhere on the globe from any device (BYOD), to all your business applications, clouds, or servers, and shield your sensitive data from online threats.

Zero Trust Network Access Made Simple

Increase your security with a top-rated ZTNA-as-a-service platform, providing full control and compliance to your entire network. Anytime, anywhere.

Features

Threat Blocker Alerts

Every time a user attempts to access a potentially dangerous website, or a website you've added to the list of sites you don't want your team members to access, you will receive a warning that the user's access to the page has been blocked.

Device Posture Check Alerts

Device Posture Check feature forbids devices that don’t meet customer defined security policies to connect to his perimeter. If a user tries to connect with such a device, their access will be denied, logged, and you will be informed about this access attempt through Acronis alerts.

Overview of Managed Teams

The Acronis dashboard will display the current status and activity of the teams you manage from GoodAccess.

Intuitive least-privilege access control

Easy-to-use firewall-as-a-service is the main part of the GoodAccess platform. You can easily specify who can access which business system (network service) by creating and assigning access cards.

35+ locations for cloud gateway worldwide

GoodAccess provides you with your own dedicated gateway with a static IP address in 35+ locations around the world. Just choose a suitable location and your dedicated gateway will be deployed within a few seconds.

Backup gateway for high availability

It is always recommended to have at least 2 gateway within your network perimeter to get a high-availability solution. You can simply add a new gateway in different locations for high-availability mode.

Static dedicated IP address

Each of your dedicated gateways provides you with a dedicated static IP address which is important for use cases where you need to whitelist the gateway’s IP address for conditional access. For example, when accessing 3rd-party public SaaS services, like Salesforce, Office 365, etc.

Traffic encryption

Traffic encryption helps you protect all your employees on untrusted public Wi-Fi networks while they travel, defending against eavesdropping or man-in-the-middle attacks.

Device health, Inventory & Custom Device Policies (BYOD)

It is critical to have control over all devices that are accessing your secure network perimeter. With Device Posture Check policies, you can easily deny access to unsecured, unwanted, or vulnerable devices. GoodAccess eliminates the challenge of bring-your-own-device (BYOD) with minimal effort.

SSO, MFA & biometrics

Never mind if your employees log in with several 3rd-party identity providers, like Microsoft Entra ID, Okta, Google Workspace, or other. With GoodAccess you can easily integrate with any SSO provider that supports the SAML 2.0 protocol.

SCIM support for automated access provisioning

With automated user provisioning (via the SCIM protocol), you can easily onboard/offboard employees and control access to business resources within the identity provider user interface. This allows GoodAccess to be controlled even by employees without expert IT skills, e.g. the HR department.

Cloud & branch connectors

GoodAccess protects all your business resources running on premises or in the cloud equally. Simply connect your local network to your dedicated gateway and access your private systems securely anytime, anywhere.

Malware and phishing protection with threat intel feeds

Automated detection and blocking of malicious domains based on threat intelligence feeds. Protection against malware, ransomware, phishing, botnet C&C, spammers, and more.

Security access logs

Logs and monitoring are critical components of compliance with standards and regulations. With gateway-level, system-level, and device-level access logs, you can easily see who accessed your perimeter, which business systems they interacted with, and what condition their device was in at any given time.

24/7 technical support

Do you need 24/7 technical support? We are ready!

Discover the Acronis Technology Ecosystem

  • Acronis

    Build an Integration

    Learn how to build with Acronis Technology Partner Program
  • Acronis

    Ecosystem Resources

    Datasheet - Integration with RMM, PSA, and RPA
  • Acronis

    Request an Integration

    Tell us your suggestion for our next integration
  • Acronis

    Ecosystem Events

    Join us at a TRU Security Summit in 2025
  • Acronis

    Ecosystem Webinar

    Learn more about the Rewst and Acronis Integration
  • Acronis

    Ecosystem News

    Acronis Ecosystem Reaches 300 Technology Integrations