We are having a problem with accessing Microsoft Copilot while connected. GoodAccess is working on the issue, but fixing this will be a help to us. There is nothing else at the moment that we need to have improved for our usage. Additional security options will be helpful going forward to ensure the highest security measures are in place to protect our systems from cyber attacks. The product is very good as is and is a big improvement from the previous service provider that we were using and has much better security.
The product could improve by extending its chat support beyond 8-5 CET, Monday to Friday, to a 24/7 service for better accessibility and immediate assistance. Additionally, integrating the WireGuard protocol into the agent and providing a WireGuard tunnel option would enhance the product's versatility and security, meeting the needs of users seeking this specific protocol for improved connectivity and data protection. These enhancements would elevate the product's overall appeal and functionality, catering to a wider range of users and their preferences for support availability and advanced security protocols.
Not much can be improved. It is worth mentioning that we do experience disconnects on rare occasions. It's not often enough to turn us off from GoodAccess, however, it'll be good if this is completely eliminated. It isn't a huge issue that would require them to pour precious time and resources into fixing it. Another thing is the feature of a kill switch. A comprehensive kill switch that works system-wide would enhance security, as in the case of a rare VPN connection drop. The kill switch would ensure that there are no data leaks that could be costly to us.
Adding one user at a time to the package as compared to blocks of five would be helpful. Currently, we end up with empty seats on our plans. Also, a user-level package could be nice too as some users need minimal features but some users might need extra ones - like the custom domain blocking. Some default authentication providers could be included in the Essential package to managing users separately from the business domains. That would be helpful - although I understand the business case behind this decision. Since we are in Australia, adding a secondary gateway in Melbourne or Perth would be great. Also, adding one possibly one in New Zealand would be useful.
While there's much to laud about GoodAccess, there's room for improvement. Their recent revision in pricing was a jolt. Though any business understands the need for periodic pricing evaluations, a clearer communication strategy and more gradual changes might have been more palatable for long-term clients like us. While they have been flexible and receptive to feedback, more proactive and accommodating engagement before implementing major pricing changes would be appreciated. Establishing a clearer feedback loop and consultation mechanism in advance can help bridge this gap in the future.
Lead Web Solutions Developer & Hosting Infrastructure Architect at INTERDIRECT LIMITED
User
Top 10
2023-08-22T15:11:00Z
Aug 22, 2023
While GoodAccess offers exceptional benefits, there are areas for improvement. The installable app's occasional bugs have caused disruptions for some users, impacting smooth usage. These were resolved though and alternative methods to connect were offered. Moreover, the rising price point, albeit slight, has raised concerns among us, affecting the initial confidence in its affordability. This is happening across the industry though, with most VPN services now taking advantage of the amount of home working. Balancing app stability and pricing would enhance the overall value and user experience.
There are minor enhancements required for GoodAccess, primarily concerning interface details that do not affect our decision to purchase the product. The interface could provide more extensive information regarding the occurrence of threats. Currently, it only displays rudimentary threat data. The traffic flow through the gateway could also be made more efficient. Additionally, the details of the traffic traversing through the cloud connection to the infrastructure could be further elaborated. In certain instances, for us, AWS emits a connectivity loss alert that is not represented on the GoodAccess activity dashboard.
When we first subscribed to GoodAccess, the cost was per seat, and that worked best for our situation. Many other VPN providers had minimum seat requirements to be able to access specific features. This past year, I did not like having to purchase an upgrade to a plan with a minimum number of seats to get the features we needed. We do not use all of the seats, so it feels like that could be a better experience for the customers. Small businesses sometimes need features in a VPN solution that bigger companies typically use, however, without the number of seats.
There are some improvements needed. These are really minor improvements, generally related to interface details that do not influence our GoodAccess purchasing decision. The interface information could show more information about how threats have occurred. Right now, it only shows basic threat information. Traffic through the gateway could also be improved. Also, the traffic passing through the cloud connection to the infrastructure could be more detailed. On certain occasions, in our case, AWS sends a connectivity loss notification that is not reflected in the GoodAccess activity dashboard.
GoodAccess is used by organizations to establish secure point-to-point connections between remote teams and infrastructure, simplifying network management and enhancing remote access with static IP addresses and VPN gateways.
GoodAccess supports secure browsing, complies with regulatory requirements, and offers dual-factor access to facilitate seamless operations. It provides high-speed connections across different locations and environments. Organizations value features like...
We are having a problem with accessing Microsoft Copilot while connected. GoodAccess is working on the issue, but fixing this will be a help to us. There is nothing else at the moment that we need to have improved for our usage. Additional security options will be helpful going forward to ensure the highest security measures are in place to protect our systems from cyber attacks. The product is very good as is and is a big improvement from the previous service provider that we were using and has much better security.
They need to provide a more comprehensive app that shows more data that appears on the GoodAccess site.
The product could improve by extending its chat support beyond 8-5 CET, Monday to Friday, to a 24/7 service for better accessibility and immediate assistance. Additionally, integrating the WireGuard protocol into the agent and providing a WireGuard tunnel option would enhance the product's versatility and security, meeting the needs of users seeking this specific protocol for improved connectivity and data protection. These enhancements would elevate the product's overall appeal and functionality, catering to a wider range of users and their preferences for support availability and advanced security protocols.
Not much can be improved. It is worth mentioning that we do experience disconnects on rare occasions. It's not often enough to turn us off from GoodAccess, however, it'll be good if this is completely eliminated. It isn't a huge issue that would require them to pour precious time and resources into fixing it. Another thing is the feature of a kill switch. A comprehensive kill switch that works system-wide would enhance security, as in the case of a rare VPN connection drop. The kill switch would ensure that there are no data leaks that could be costly to us.
Adding one user at a time to the package as compared to blocks of five would be helpful. Currently, we end up with empty seats on our plans. Also, a user-level package could be nice too as some users need minimal features but some users might need extra ones - like the custom domain blocking. Some default authentication providers could be included in the Essential package to managing users separately from the business domains. That would be helpful - although I understand the business case behind this decision. Since we are in Australia, adding a secondary gateway in Melbourne or Perth would be great. Also, adding one possibly one in New Zealand would be useful.
While there's much to laud about GoodAccess, there's room for improvement. Their recent revision in pricing was a jolt. Though any business understands the need for periodic pricing evaluations, a clearer communication strategy and more gradual changes might have been more palatable for long-term clients like us. While they have been flexible and receptive to feedback, more proactive and accommodating engagement before implementing major pricing changes would be appreciated. Establishing a clearer feedback loop and consultation mechanism in advance can help bridge this gap in the future.
While GoodAccess offers exceptional benefits, there are areas for improvement. The installable app's occasional bugs have caused disruptions for some users, impacting smooth usage. These were resolved though and alternative methods to connect were offered. Moreover, the rising price point, albeit slight, has raised concerns among us, affecting the initial confidence in its affordability. This is happening across the industry though, with most VPN services now taking advantage of the amount of home working. Balancing app stability and pricing would enhance the overall value and user experience.
There are minor enhancements required for GoodAccess, primarily concerning interface details that do not affect our decision to purchase the product. The interface could provide more extensive information regarding the occurrence of threats. Currently, it only displays rudimentary threat data. The traffic flow through the gateway could also be made more efficient. Additionally, the details of the traffic traversing through the cloud connection to the infrastructure could be further elaborated. In certain instances, for us, AWS emits a connectivity loss alert that is not represented on the GoodAccess activity dashboard.
When we first subscribed to GoodAccess, the cost was per seat, and that worked best for our situation. Many other VPN providers had minimum seat requirements to be able to access specific features. This past year, I did not like having to purchase an upgrade to a plan with a minimum number of seats to get the features we needed. We do not use all of the seats, so it feels like that could be a better experience for the customers. Small businesses sometimes need features in a VPN solution that bigger companies typically use, however, without the number of seats.
There are some improvements needed. These are really minor improvements, generally related to interface details that do not influence our GoodAccess purchasing decision. The interface information could show more information about how threats have occurred. Right now, it only shows basic threat information. Traffic through the gateway could also be improved. Also, the traffic passing through the cloud connection to the infrastructure could be more detailed. On certain occasions, in our case, AWS sends a connectivity loss notification that is not reflected in the GoodAccess activity dashboard.