GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scale. By leveraging a Low-Code/No-Code approach, GoodAccess delivers a hardware-free, rapid deployment solution within hours or days, allowing companies to enhance their security without the need for in-house IT experts. The platform ensures…
$35
per month for 5 users (minimum)
HPE Zerto Software
Score 8.9 out of 10
Enterprise companies (1,001+ employees)
HPE Zerto Software aims to enable customers to run an always-on business by simplifying the protection, recovery, and mobility of on-premises and cloud applications.
N/A
Pricing
GoodAccess
HPE Zerto Software
Editions & Modules
Essential
7 USD
per month per user
Premium
11 USD
per month per user
Enterprise
on request
per user/month. Min 20 users.
No answers on this topic
Offerings
Pricing Offerings
GoodAccess
HPE Zerto Software
Free Trial
Yes
Yes
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
Optional
Additional Details
—
—
More Pricing Information
Community Pulse
GoodAccess
HPE Zerto Software
Features
GoodAccess
HPE Zerto Software
Identity Management
Comparison of Identity Management features of Product A and Product B
GoodAccess
8.1
4 Ratings
9% below category average
HPE Zerto Software
-
Ratings
Multi-Factor Authentication
8.14 Ratings
00 Ratings
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
GoodAccess
8.8
2 Ratings
3% below category average
HPE Zerto Software
-
Ratings
Endpoint Detection and Response (EDR)
8.82 Ratings
00 Ratings
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
GoodAccess
6.0
5 Ratings
25% below category average
HPE Zerto Software
-
Ratings
Network Analytics
6.44 Ratings
00 Ratings
Threat Recognition
5.74 Ratings
00 Ratings
Vulnerability Classification
3.32 Ratings
00 Ratings
Automated Alerts and Reporting
7.13 Ratings
00 Ratings
Threat Analysis
5.83 Ratings
00 Ratings
Threat Intelligence Reporting
5.83 Ratings
00 Ratings
Automated Threat Identification
8.21 Ratings
00 Ratings
Zero Trust Security
Comparison of Zero Trust Security features of Product A and Product B
GoodAccess
7.7
8 Ratings
12% below category average
HPE Zerto Software
-
Ratings
Continuous Verification
7.35 Ratings
00 Ratings
Secure Web Gateways
8.38 Ratings
00 Ratings
Network Flow Control
9.65 Ratings
00 Ratings
Network Traffic Analysis
6.35 Ratings
00 Ratings
Segmentation Leveraging
5.54 Ratings
00 Ratings
Admin Access Control
9.08 Ratings
00 Ratings
Network Data Encryption
8.36 Ratings
00 Ratings
Network Topology Mapping
7.15 Ratings
00 Ratings
Data Center Backup
Comparison of Data Center Backup features of Product A and Product B
GoodAccess
-
Ratings
HPE Zerto Software
8.3
3 Ratings
3% above category average
Universal recovery
00 Ratings
8.52 Ratings
Instant recovery
00 Ratings
8.33 Ratings
Recovery verification
00 Ratings
9.33 Ratings
Business application protection
00 Ratings
8.73 Ratings
Multiple backup destinations
00 Ratings
8.52 Ratings
Incremental backup identification
00 Ratings
8.02 Ratings
Backup to the cloud
00 Ratings
7.43 Ratings
Deduplication and file compression
00 Ratings
7.73 Ratings
Snapshots
00 Ratings
8.02 Ratings
Flexible deployment
00 Ratings
8.73 Ratings
Management dashboard
00 Ratings
9.13 Ratings
Platform support
00 Ratings
7.03 Ratings
Retention options
00 Ratings
9.03 Ratings
Encryption
00 Ratings
8.02 Ratings
Enterprise Backup
Comparison of Enterprise Backup features of Product A and Product B
GoodAccess
-
Ratings
HPE Zerto Software
8.3
2 Ratings
2% below category average
Continuous data protection
00 Ratings
9.52 Ratings
Replication
00 Ratings
8.52 Ratings
Operational reporting and analytics
00 Ratings
7.52 Ratings
Malware protection
00 Ratings
7.01 Ratings
Multi-location capabilities
00 Ratings
9.52 Ratings
Ransomware Recovery
00 Ratings
8.02 Ratings
Disaster Recovery
Comparison of Disaster Recovery features of Product A and Product B
Getting remote users to the internal network without compromising the internal network to many different IP whitelistings. This was our case. We were able to get that going very easily and our internal team workload decreased dramatically managing internal network access. All we have to do is provide VPN to the users, approve their devices and we are good to go
Zerto is well suited for disaster recovery and virtual machine replication between multiple data centers. DR testing for audit or regulations is much easier with Zerto, great reporting, dashboard etc. It is not well suited for physical server replication for disaster recovery or as a primary backup solution.
Anyone with a large disk (VMDK) knows the issues of VMware snapshots. Most backup software is a "point in time backup" that uses snapshots. While the backup can be run multiple times per day the stress of the snapshot on the host and storage is eliminated by the continuous protection of Zerto log replication.
A client had a the disks on a VM go missing for some reason. We had them "flip the switch" for a real fail over and press the fail over button. The VM on our DR site started to come alive as the VM at the customer site was brought down. When the DR VM was fully up, automatic reverse replication started. The DR machine was available in a few minutes (to take into account different host hardware) for access. One the vm at both sites were in sync, we had the customer again repeat the fail over process and the DR site VM was turned off and the Production site VM was brought back on line. This was a 200 GB VM and the whole process was finished in about 3 hours.
Zerto also allows for "Test" fail overs that can be configured on many different functions, such as host, datastore, network and IP usage. Configuring the IPs is crucial to avoid inadvertent site cross contamination of the same VM.
Zerto can also retrieve files from any VM disk on the DR site without starting a VM. Very handy for retrieving files or directories.
Since Zerto is running continuous log replication, changes on the production VM are nearly instantaneously copied to the DR site. As with any data process, having sufficient bandwidth for "churn" peaks minimizes the delay in updating the DR site.
I believe the pricing model could use some better math for scalability, but it's still highly competitive and simple to upgrade with. For a mid-startup it will be harder to choose a company I believe, but for a 2-10 person organisation, there won't be any better.
I was tired to find good VPN service and want to help everyone to find real good quality and team. Want to advice Goodaccess to everyone, just try it, you'll see yourself. price is good, quality is the best and what is important, when you are buying package, you know what you will get.
We really like the easy setup of this replication solution, as well as the ease of management. Not to mention, our internal IT Economist determined that the Zerto solution would provide the best ROI out of the competing solutions we analyzed. So far, his calculations have been spot on, and we have saved substantially
It was easy to setup, is easy to use and a great product for the price. It is not the fanciest or the most complicated VPN on the market, but it does exactly what our company needed it for and it does it very well. We would recommend this VPN to other companies in our situation as well
Zerto is very easy to implement and support. Uses are broad, only issues are once something doesn't sync it is difficult to get assistance until your reach tier 2 or tier 3 support. Basic file and folder recovery is great. Live and test fail overs are also easy to implement without issue.
We have hardly had any incidents because the service works very good, but when we have had doubts about the implementation of the gateway to connect ours clouds, the GoodAccess service has been fast and efficient. We have been able to implement and deliver our infrastructure faster with their help.
Overall support is very good. We sometimes get pushback when asking Level 1 support to escalate to Level 2. This causes undue frustrations when you need a more knowledgeable support person to get involved. We've had to escalate to account reps a few times for this scenario. Zerto is very responsive and normally handles our requests very quickly.
GoodAccess specifically addresses our need for a static IP gateway. Other products come with too many features irrelevant to us. We have very specific needs that must be enabled in a very short time frame and GoodAccess was good for us like that, basically, turn key. GoodAccess connection also shows good connectivity speed and that was good enough for us.
We started out using Backup Exec which was in service until we virtualized our environment where it didn't perform as well at the time. Then we switched to Veeam which worked well, but then as we started needing to do migrations and off-site DR, we found ourselves relying on Zerto more often.
For my organization, the pricing model was an upfront investment for the Zerto licenses. My organization prefers to pay upfront and not deal with month-to-month or year-to-year pricing models that most companies are moving to. But for some, the investment may be more than they can afford, and would prefer the year-to-year pricing model.
I mean, it was 6 years ago, but we were up and going with all applications synchronizing in short order. The longest tasks was getting the 30 TB of application data synchronized between the datacenters.
Thanks to this solution, we were able to secure access to our cloud resources and stop threats that we received frequently.
GoodAccess allows us to grant and withdraw access to our resources in a very simple way, in the event that there are changes in personnel in the work teams or contractors.
Zerto is like having the best possible insurance ... it just works, and often provides the backups taken overnight that are key in recovering data/work between overnight backups.
Zerto easily enabled the move of primary datacenters by allowing easy failover to a secondary site, and failback to the primary site.