What is our primary use case?
Our primary application of GoodAccess is to establish a reliable point-to-point network connection between our technical crew and the distant infrastructure. It serves as a bridge, connecting us to our cloud service provider, thus enabling seamless and secure operations with our infrastructure.
Additionally, it also facilitates uninterrupted browsing via a VPN gateway embedded with threat security, which significantly boosts the protection of our technical equipment.
The icing on the cake is the dual-factor access it offers to all devices, which we find to be highly effective.
How has it helped my organization?
GoodAccess has brought about substantial enhancements in our organization's security.
Primarily, it has fortified the safety measures while accessing servers through SSH, RDP, or the database. In the entire cloud framework, there's only a single public subnet, while the remainder of the private entry points can only be accessed through the VPN.
The task of managing security and auditing for unauthorized entries has been substantially diminished. Furthermore, unauthorized access attempts to critical private infrastructure have been completely eradicated.
What is most valuable?
The most beneficial feature we've discovered is point-to-point security. GoodAccess' Cloud Connector lets you seamlessly link your private cloud networks to its Gateway. For us, we directly tie the cloud connector with the AWS VPN, creating a secure point-to-point connection from the developer's computer to the application server or data center.
Using the gateway equips us with a dedicated IP, making firewall management and IP restrictions simpler to handle.
Added to that, there's the capacity to block threats, providing an additional layer of protection for worker connections. Interestingly, the VPN doesn't compromise network speed - it's nearly identical to operating without the VPN.
What needs improvement?
There are minor enhancements required for GoodAccess, primarily concerning interface details that do not affect our decision to purchase the product.
The interface could provide more extensive information regarding the occurrence of threats. Currently, it only displays rudimentary threat data.
The traffic flow through the gateway could also be made more efficient.
Additionally, the details of the traffic traversing through the cloud connection to the infrastructure could be further elaborated. In certain instances, for us, AWS emits a connectivity loss alert that is not represented on the GoodAccess activity dashboard.
For how long have I used the solution?
I've used the solution for two years.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
What's my experience with pricing, setup cost, and licensing?
A service of this nature comes at a substantial price. However, it's essential to remember that security comes with a cost, and in this instance, the convenience and ease of use justify the expense.
Which other solutions did I evaluate?
We also evaluated Nord VPN.
What other advice do I have?
GoodAccess was our primary choice right from the beginning. We didn't consider other alternatives. Although we contemplated switching and experimenting with other options, we ultimately became convinced that this solution was indeed the best choice for us.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.