Zero Trust Network Access Made Simple
Features
Every time a user attempts to access a potentially dangerous website, or a website you've added to the list of sites you don't want your team members to access, you will receive a warning that the user's access to the page has been blocked.
Device Posture Check feature forbids devices that don’t meet customer defined security policies to connect to his perimeter. If a user tries to connect with such a device, their access will be denied, logged, and you will be informed about this access attempt through Acronis alerts.
The Acronis dashboard will display the current status and activity of the teams you manage from GoodAccess.
Easy-to-use firewall-as-a-service is the main part of the GoodAccess platform. You can easily specify who can access which business system (network service) by creating and assigning access cards.
GoodAccess provides you with your own dedicated gateway with a static IP address in 35+ locations around the world. Just choose a suitable location and your dedicated gateway will be deployed within a few seconds.
It is always recommended to have at least 2 gateway within your network perimeter to get a high-availability solution. You can simply add a new gateway in different locations for high-availability mode.
Each of your dedicated gateways provides you with a dedicated static IP address which is important for use cases where you need to whitelist the gateway’s IP address for conditional access. For example, when accessing 3rd-party public SaaS services, like Salesforce, Office 365, etc.
Traffic encryption helps you protect all your employees on untrusted public Wi-Fi networks while they travel, defending against eavesdropping or man-in-the-middle attacks.
It is critical to have control over all devices that are accessing your secure network perimeter. With Device Posture Check policies, you can easily deny access to unsecured, unwanted, or vulnerable devices. GoodAccess eliminates the challenge of bring-your-own-device (BYOD) with minimal effort.
Never mind if your employees log in with several 3rd-party identity providers, like Microsoft Entra ID, Okta, Google Workspace, or other. With GoodAccess you can easily integrate with any SSO provider that supports the SAML 2.0 protocol.
With automated user provisioning (via the SCIM protocol), you can easily onboard/offboard employees and control access to business resources within the identity provider user interface. This allows GoodAccess to be controlled even by employees without expert IT skills, e.g. the HR department.
GoodAccess protects all your business resources running on premises or in the cloud equally. Simply connect your local network to your dedicated gateway and access your private systems securely anytime, anywhere.
Automated detection and blocking of malicious domains based on threat intelligence feeds. Protection against malware, ransomware, phishing, botnet C&C, spammers, and more.
Logs and monitoring are critical components of compliance with standards and regulations. With gateway-level, system-level, and device-level access logs, you can easily see who accessed your perimeter, which business systems they interacted with, and what condition their device was in at any given time.
Do you need 24/7 technical support? We are ready!