Acronis
Acronis Cyber Protect Cloud
For service providers

Application Catalog

Integrations with the tools and services you know and trust
Integration: GoodAccess
New
Category: SASE & ZTNA
Company: GoodAccess s.r.o.

Zero Trust Network Access Made Simple

GoodAccess is your go-to ZTNA-as-a-service solution. Secure all your digital resources with the most user-friendly solution on the market. Provide least-privilege access from anywhere on the globe from any device (BYOD), to all your business applications, clouds, or servers, and shield your sensitive data from online threats.

Zero Trust Network Access Made Simple

Increase your security with a top-rated ZTNA-as-a-service platform, providing full control and compliance to your entire network. Anytime, anywhere.

Features

Threat Blocker Alerts

Every time a user attempts to access a potentially dangerous website, or a website you've added to the list of sites you don't want your team members to access, you will receive a warning that the user's access to the page has been blocked.

Device Posture Check Alerts

Device Posture Check feature forbids devices that don’t meet customer defined security policies to connect to his perimeter. If a user tries to connect with such a device, their access will be denied, logged, and you will be informed about this access attempt through Acronis alerts.

Overview of Managed Teams

The Acronis dashboard will display the current status and activity of the teams you manage from GoodAccess.

Intuitive least-privilege access control

Easy-to-use firewall-as-a-service is the main part of the GoodAccess platform. You can easily specify who can access which business system (network service) by creating and assigning access cards.

35+ locations for cloud gateway worldwide

GoodAccess provides you with your own dedicated gateway with a static IP address in 35+ locations around the world. Just choose a suitable location and your dedicated gateway will be deployed within a few seconds.

Backup gateway for high availability

It is always recommended to have at least 2 gateway within your network perimeter to get a high-availability solution. You can simply add a new gateway in different locations for high-availability mode.

Static dedicated IP address

Each of your dedicated gateways provides you with a dedicated static IP address which is important for use cases where you need to whitelist the gateway’s IP address for conditional access. For example, when accessing 3rd-party public SaaS services, like Salesforce, Office 365, etc.

Traffic encryption

Traffic encryption helps you protect all your employees on untrusted public Wi-Fi networks while they travel, defending against eavesdropping or man-in-the-middle attacks.

Device health, Inventory & Custom Device Policies (BYOD)

It is critical to have control over all devices that are accessing your secure network perimeter. With Device Posture Check policies, you can easily deny access to unsecured, unwanted, or vulnerable devices. GoodAccess eliminates the challenge of bring-your-own-device (BYOD) with minimal effort.

SSO, MFA & biometrics

Never mind if your employees log in with several 3rd-party identity providers, like Microsoft Entra ID, Okta, Google Workspace, or other. With GoodAccess you can easily integrate with any SSO provider that supports the SAML 2.0 protocol.

SCIM support for automated access provisioning

With automated user provisioning (via the SCIM protocol), you can easily onboard/offboard employees and control access to business resources within the identity provider user interface. This allows GoodAccess to be controlled even by employees without expert IT skills, e.g. the HR department.

Cloud & branch connectors

GoodAccess protects all your business resources running on premises or in the cloud equally. Simply connect your local network to your dedicated gateway and access your private systems securely anytime, anywhere.

Malware and phishing protection with threat intel feeds

Automated detection and blocking of malicious domains based on threat intelligence feeds. Protection against malware, ransomware, phishing, botnet C&C, spammers, and more.

Security access logs

Logs and monitoring are critical components of compliance with standards and regulations. With gateway-level, system-level, and device-level access logs, you can easily see who accessed your perimeter, which business systems they interacted with, and what condition their device was in at any given time.

24/7 technical support

Do you need 24/7 technical support? We are ready!

Can’t find your favorite tool or service?
With the Acronis Cyber Protect Cloud platform, developers, software vendors and service providers can build new applications and share them with the Acronis community. Building a new application is fast and easy with a powerful low-code CyberApp Standard development framework. You can build a new integration or nominate your favorite tool for integration.