GoodAccess vs. Unisys Stealth

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
GoodAccess
Score 9.9 out of 10
Mid-Size Companies (51-1,000 employees)
GoodAccess is a cloud VPN with zero-trust access controls specially designed for small and medium businesses. GoodAccess is a secure remote access solution that interconnects remote workers, applications, data centers, clouds, and offices via one resilient virtual network. No hardware or complex setup is required, as the platform is fully cloud-based and is deployable in less than 10 minutes. With GoodAccess, network and security leaders can deploy private gateway with dedicated static…
$7
per month per user
Unisys Stealth
Score 0.0 out of 10
N/A
Unisys offers the Stealth product cybersecurity and software-defined microsegmentation suite providing zero trust network access, designed to protect the enterprise network, cloud services, and data via cloaking and encryption, provide network visibility, and also provide detection and correlation for advanced threat prevention.N/A
Pricing
GoodAccessUnisys Stealth
Editions & Modules
Essential
7 USD
per month per user
Premium
11 USD
per month per user
Enterprise
on request
per user/month. Min 20 users.
No answers on this topic
Offerings
Pricing Offerings
GoodAccessUnisys Stealth
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details——
More Pricing Information
Community Pulse
GoodAccessUnisys Stealth
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
GoodAccessUnisys Stealth
Identity Management
Comparison of Identity Management features of Product A and Product B
GoodAccess
8.3
4 Ratings
11% below category average
Unisys Stealth
-
Ratings
Multi-Factor Authentication8.34 Ratings00 Ratings
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
GoodAccess
8.7
2 Ratings
2% above category average
Unisys Stealth
-
Ratings
Endpoint Detection and Response (EDR)8.72 Ratings00 Ratings
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
GoodAccess
6.5
5 Ratings
24% below category average
Unisys Stealth
-
Ratings
Network Analytics6.84 Ratings00 Ratings
Threat Recognition6.14 Ratings00 Ratings
Vulnerability Classification4.42 Ratings00 Ratings
Automated Alerts and Reporting7.33 Ratings00 Ratings
Threat Analysis6.33 Ratings00 Ratings
Threat Intelligence Reporting6.33 Ratings00 Ratings
Automated Threat Identification8.21 Ratings00 Ratings
Zero Trust Security
Comparison of Zero Trust Security features of Product A and Product B
GoodAccess
8.0
7 Ratings
11% below category average
Unisys Stealth
-
Ratings
Continuous Verification8.44 Ratings00 Ratings
Secure Web Gateways8.97 Ratings00 Ratings
Network Flow Control8.55 Ratings00 Ratings
Network Traffic Analysis6.95 Ratings00 Ratings
Segmentation Leveraging6.63 Ratings00 Ratings
Admin Access Control8.37 Ratings00 Ratings
Network Data Encryption9.05 Ratings00 Ratings
Network Topology Mapping7.75 Ratings00 Ratings
Best Alternatives
GoodAccessUnisys Stealth
Small Businesses
ThreatLocker
ThreatLocker
Score 9.0 out of 10
ThreatLocker
ThreatLocker
Score 9.0 out of 10
Medium-sized Companies
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.7 out of 10
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.7 out of 10
Enterprises
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.7 out of 10
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.7 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
GoodAccessUnisys Stealth
Likelihood to Recommend
9.9
(25 ratings)
-
(0 ratings)
Likelihood to Renew
9.1
(1 ratings)
-
(0 ratings)
Support Rating
9.1
(2 ratings)
-
(0 ratings)
User Testimonials
GoodAccessUnisys Stealth
Likelihood to Recommend
GoodAccess
If you have a widely distributed team that needs to access a secure network based on a fixed IP address for whitelisting restriction, GoodAccess is the right tool for you. As a robust all-purpose VPN solution, we have not tried that so lack experience to comment, but it can likely do the job well, too.
Read full review
Unisys
No answers on this topic
Pros
GoodAccess
  • Ease of use/onboarding, it's very easy for an IT admin to deploy to users
  • Simplicity, their management interface is dead simple to use and still powerful
  • Static VPN locations! We were looking for a pretty specific place, and they offered many of our second choices as well.
Read full review
Unisys
No answers on this topic
Cons
GoodAccess
  • I believe the pricing model could use some better math for scalability, but it's still highly competitive and simple to upgrade with. For a mid-startup it will be harder to choose a company I believe, but for a 2-10 person organisation, there won't be any better.
Read full review
Unisys
No answers on this topic
Likelihood to Renew
GoodAccess
I was tired to find good VPN service and want to help everyone to find real good quality and team. Want to advice Goodaccess to everyone, just try it, you'll see yourself. price is good, quality is the best and what is important, when you are buying package, you know what you will get.
Read full review
Unisys
No answers on this topic
Support Rating
GoodAccess
We have hardly had any incidents because the service works very good, but when we have had doubts about the implementation of the gateway to connect ours clouds, the GoodAccess service has been fast and efficient. We have been able to implement and deliver our infrastructure faster with their help.
Read full review
Unisys
No answers on this topic
Alternatives Considered
GoodAccess
It's better suited for companies and small teams than for individuals, so we chose GoodAccess. Also, we are happy to have advanced technical support and we are able to talk with someone from the company if needed. Access logs and other features are must-haves in our security policy and we can see our usage in company.
Read full review
Unisys
No answers on this topic
Return on Investment
GoodAccess
  • Thanks to this solution, we were able to secure access to our cloud resources and stop threats that we received frequently.
  • GoodAccess allows us to grant and withdraw access to our resources in a very simple way, in the event that there are changes in personnel in the work teams or contractors.
Read full review
Unisys
No answers on this topic
ScreenShots

GoodAccess Screenshots

Screenshot of GoodAccess Mobile AppScreenshot of Screenshot of Screenshot of Screenshot of Screenshot of