Our primary use case for GoodAccess is to facilitate seamless remote work for our globally distributed team. The developer, the front-end dev, the tester (myself), and the project manager are all living in different countries. Some of our agency's clients have imposed IP restrictions limited to the USA. Conventional VPNs often struggle to overcome these barriers. However, with GoodAccess, our team experiences secure and rapid access to our client's websites from any location. This capability enhances our productivity, enabling us to deliver high-quality results.
Virtual Assistant and tester at FoundationDigital
User-friendly with a good interface and can bypass geographical IP restrictions seamlessly
Pros and Cons
- "It has become an integral part of our remote work toolkit, as it enables us to overcome USA IP restrictions, ensuring our global teams can collaborate effectively."
- "Currently, the pricing structure is functional yet could benefit from more refined scalability calculations."
What is our primary use case?
How has it helped my organization?
With members located in various countries, including Argentina like me, and facing IP blocking challenges from clients, we struggled with traditional VPN solutions. GoodAccess, however, proved to be the answer to our problems.
It has become an integral part of our remote work toolkit, as it enables us to overcome USA IP restrictions, ensuring our global teams can collaborate effectively.
This solution's user-friendly interface and ease of navigation made the transition seamless. We now have exclusive fixed IPs, ensuring secure access for remote developers and freelancers.
What is most valuable?
One of the most invaluable features of GoodAccess, especially for teams operating across the globe like ours, is its ability to bypass geographical IP restrictions seamlessly.
Furthermore, the user interface of GoodAccess is remarkably user-friendly and easy to navigate. This simplicity is a crucial asset, especially for teams with varying levels of technical expertise. It sets a low bar for understanding proper usage, making it incredibly straightforward for users to connect and access resources securely.
What needs improvement?
While GoodAccess offers a host of valuable features, there are areas where it could see improvements, with the pricing model being one such aspect. Currently, the pricing structure is functional yet could benefit from more refined scalability calculations.
For smaller organizations, typically comprising two to ten individuals, GoodAccess provides a highly competitive and user-friendly solution that meets their needs effectively. However, as a company grows, the scalability of the pricing model becomes a more prominent factor.
Buyer's Guide
GoodAccess
January 2025
Learn what your peers think about GoodAccess. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
832,138 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the stability of the solution?
This is a very stable solution.
Which solution did I use previously and why did I switch?
We previously used VeeVPN and PureVPN. They didn't work well in my country.
What's my experience with pricing, setup cost, and licensing?
I'd advise others to test with the trial first.
Which other solutions did I evaluate?
I did not evaluate other options.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Frontend Developer at Double Dot
Great support, good VPN capabilities and user-friendly
Pros and Cons
- "Their user interface is intuitive as it is easy to navigate."
- "It is worth mentioning that we do experience disconnects on rare occasions."
What is our primary use case?
We use the solution to connect to our database as part of our process. Our process requires us to use a VPN before connecting to our database. This is done primarily to have an additional layer of security while also preventing unauthorized access to our database that has sensitive information on our own company and our clients.
It is also done to adhere to the ISO Policy.
Another added benefit of this is that we will be able to gain access to our databases regardless of where we are as the VPN would grant us access and reroute us to the database without getting blocked.
How has it helped my organization?
It saved a lot of time in terms of setting up a VPN service.
It is easy to use while being secure enough to give us peace of mind.
With it being user-friendly, it is accessible to both tech-savvy and those who are new to our company. Their user interface is intuitive as it is easy to navigate.
Regarding security, using GoodAccess VPN has made us more aware of the need for good security measures to help protect our business and our clients' data too.
What is most valuable?
The ability to contact their customer support when we need assistance is easy. We get quick and prompt replies in a timely fashion. They are definitely what we are looking for in customer support services. Not to mention, the support is very knowledgeable. They have been able to answer all of our questions and rid us of any doubts that we have. Doing this in a responsive and timely fashion while being accurate and concise in their information has saved us so much time.
Other than that, their VPN service is great. Getting an extra layer of security without the drawback of losing speed is a plus.
What needs improvement?
Not much can be improved. It is worth mentioning that we do experience disconnects on rare occasions. It's not often enough to turn us off from GoodAccess, however, it'll be good if this is completely eliminated. It isn't a huge issue that would require them to pour precious time and resources into fixing it. Another thing is the feature of a kill switch. A comprehensive kill switch that works system-wide would enhance security, as in the case of a rare VPN connection drop. The kill switch would ensure that there are no data leaks that could be costly to us.
For how long have I used the solution?
We've used the solution for more than one year.
What do I think about the stability of the solution?
We haven't had any major disconnects or data loss. It's pretty stable in my book.
What do I think about the scalability of the solution?
The product can be used in multiple scenarios with tons of features. Scalability is really good - more than what I expected.
How are customer service and support?
Support is excellent. They offer prompt and helpful responses. What we were getting from GoodAccess customer support has been positive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
How was the initial setup?
The initial setup is straightforward. We were able to figure out how to set it up without going through online forums. The onscreen texts and steps were more than sufficient.
What about the implementation team?
We set up the product in-house. Our team member has experience in this.
What was our ROI?
The importance of ROI for us is pretty neutral. It is a requirement in our processes to have a VPN service.
What's my experience with pricing, setup cost, and licensing?
The pricing is competitive. New users should consider giving GoodAccess a shot.
Which other solutions did I evaluate?
We did check out Nord VPN.
What other advice do I have?
It has been smooth sailing so far; we would definitely recommend the product to others.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
GoodAccess
January 2025
Learn what your peers think about GoodAccess. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
832,138 professionals have used our research since 2012.
CEO/Founder at Technopath
Fortifies security, facilitates uninterrupted browsing, and allows for dual-factor access
Pros and Cons
- "The task of managing security and auditing for unauthorized entries has been substantially diminished."
- "The interface could provide more extensive information regarding the occurrence of threats. Currently, it only displays rudimentary threat data."
What is our primary use case?
Our primary application of GoodAccess is to establish a reliable point-to-point network connection between our technical crew and the distant infrastructure. It serves as a bridge, connecting us to our cloud service provider, thus enabling seamless and secure operations with our infrastructure.
Additionally, it also facilitates uninterrupted browsing via a VPN gateway embedded with threat security, which significantly boosts the protection of our technical equipment.
The icing on the cake is the dual-factor access it offers to all devices, which we find to be highly effective.
How has it helped my organization?
GoodAccess has brought about substantial enhancements in our organization's security.
Primarily, it has fortified the safety measures while accessing servers through SSH, RDP, or the database. In the entire cloud framework, there's only a single public subnet, while the remainder of the private entry points can only be accessed through the VPN.
The task of managing security and auditing for unauthorized entries has been substantially diminished. Furthermore, unauthorized access attempts to critical private infrastructure have been completely eradicated.
What is most valuable?
The most beneficial feature we've discovered is point-to-point security. GoodAccess' Cloud Connector lets you seamlessly link your private cloud networks to its Gateway. For us, we directly tie the cloud connector with the AWS VPN, creating a secure point-to-point connection from the developer's computer to the application server or data center.
Using the gateway equips us with a dedicated IP, making firewall management and IP restrictions simpler to handle.
Added to that, there's the capacity to block threats, providing an additional layer of protection for worker connections. Interestingly, the VPN doesn't compromise network speed - it's nearly identical to operating without the VPN.
What needs improvement?
There are minor enhancements required for GoodAccess, primarily concerning interface details that do not affect our decision to purchase the product.
The interface could provide more extensive information regarding the occurrence of threats. Currently, it only displays rudimentary threat data.
The traffic flow through the gateway could also be made more efficient.
Additionally, the details of the traffic traversing through the cloud connection to the infrastructure could be further elaborated. In certain instances, for us, AWS emits a connectivity loss alert that is not represented on the GoodAccess activity dashboard.
For how long have I used the solution?
I've used the solution for two years.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
What's my experience with pricing, setup cost, and licensing?
A service of this nature comes at a substantial price. However, it's essential to remember that security comes with a cost, and in this instance, the convenience and ease of use justify the expense.
Which other solutions did I evaluate?
We also evaluated Nord VPN.
What other advice do I have?
GoodAccess was our primary choice right from the beginning. We didn't consider other alternatives. Although we contemplated switching and experimenting with other options, we ultimately became convinced that this solution was indeed the best choice for us.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Great static IP and speed but has some bugs
Pros and Cons
- "The most valuable aspects of the solution are the static IP and speed."
- "I've found some bugs."
What is our primary use case?
Our servers did not have a public and static IP. With GoodAccess, now we do.
How has it helped my organization?
All our user server tools are now online.
What is most valuable?
The most valuable aspects of the solution are the static IP and speed.
What needs improvement?
I've found some bugs.
For how long have I used the solution?
I've used the solution for less than a year.
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
Which other solutions did I evaluate?
I did evaluate OpenVPN.
What other advice do I have?
I would also welcome some cheaper variants.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free GoodAccess Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Popular Comparisons
Check Point Harmony SASE (formerly Perimeter 81)
Buyer's Guide
Download our free GoodAccess Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the difference between "data protection in transit" vs "data protection at rest"?
- What are the best practices to prevent a Brute Force attack via remote access?
- Looking for a piece of advice and tips on the deployment of VPN concentrators for SD-WAN tunnels?
- When evaluating Enterprise Infrastructure VPN, what aspect do you think is the most important to look for?
- How does remote work influence DevOps?
- What tools do you use to make a remote work more efficient?
- What are your recommended best practices and tools to prevent cloud jacking in your organization?
- What enterprise infrastructure VPN solution do you use?
- Why is an enterprise infrastructure VPN solution important?
- Which offers a better VPN: Meraki or Azure?