What is our primary use case?
We are a fully remote team of product owners, DevOps, developers, and scrum masters with different requirements to access different environments of the platform.
In particular, some critical service providers' external systems like massive e-mail or SMS providers need to be protected as they are attractive to hackers. Also, the test environment has tools that may reveal internal information about the platform.
Therefore, to have the capacity to manage teams and to provide granular permissions to each team member is a "must" for us.
How has it helped my organization?
Good Access allows the configuration of the apps each team member uses. It has MFA access and what gateways are available, and access control cards can be used where it is possible to group users and assign specific systems they can use.
This granularity helps us to provide the minimum access needed to execute specific tasks for each role.
Also, we have outsourced contractors for software development. Creating a new account, onboarding a new team member, or blocking the account when her/his task is completed is very easy and straightforward.
What is most valuable?
The app launch functionality is great. It is convenient for the team member in her/his daily tasks. For new team members, it is great as they have all the tools required at hand - making the onboarding process easier. Creating new systems is also very easy.
The dashboard is pretty sleek and complete. It is clear "who" is connecting from "where" and if it is needed to analyze user behavior in detail the logs are helpful and allow us to detect missing spots in our security scheme. For example, being able to order user sessions by data transfered helps to check any potential data loss.
What needs improvement?
There is one minor drawback to mention: occasionally, the Internet connection tends to slow down noticeably while using the VPN. This may impact the work of some roles working with big files like designers.
Also, QA analysts claim that tests show longer response times when executing load-testing scripts with Jmeter and several concurrent users. As the QA environment may leak important internal information, we needed to create a pre-production environment to execute the load testing jobs.
For how long have I used the solution?
I've been using the solution for one year.
What do I think about the stability of the solution?
Stability is great! We have not experienced any availability problems.
What do I think about the scalability of the solution?
It needs better bandwidth. Sometimes users notice a slow connection to the protected systems.
How are customer service and support?
I have not needed to ask for help from technical support. I receive email notifications of service usage, price changes, and other different topics. It has been a good experience so far.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We previously used AWS native VPN and Proton VPN.
How was the initial setup?
The setup is pretty easy, I did it myself with no external help. There is very low maintenance needed after that.
What about the implementation team?
We did not need any external help.
What was our ROI?
As we have critical systems that impact the whole business (life or death matter), using the basic approach of impact and risk, I may say we recover the investment in six months as we are a small startup.
What's my experience with pricing, setup cost, and licensing?
The cost is billed annually and the second year for the basic plan had a big increment. It is important to monitor this, the information in the application is transparent and easy to find.
Which other solutions did I evaluate?
We also evaluated SurfShark and Nord Layer.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.