Great for Resource Management in Remote Workgroups
July 04, 2023

Great for Resource Management in Remote Workgroups

Daniel Ayala | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with GoodAccess

It is one of the few options that there are to have one or more exclusive fixed IPs for the company. With GoodAccess, we resolved secure access to our environments for all remote developers and freelancers. It has a wide facility and options to grant access to different members. We use GoodAccess all the time since we all work remotely.
  • Static IP for whitelisting
  • Stability in connection
  • Client lightweight
  • Easy manageability
  • Custom access rules
  • Networking segregation
  • Manageability
  • Fixed and exclusive IP Address
  • Pay per use
  • Thanks to this solution, we were able to secure access to our cloud resources and stop threats that we received frequently.
  • GoodAccess allows us to grant and withdraw access to our resources in a very simple way, in the event that there are changes in personnel in the work teams or contractors.
Implementation is in minutes, and its payment method is simple. GoodAccess is much easier and simpler to implement and manage, no advanced knowledge is required for its configuration, and user management can be done from the administration console.

Do you think GoodAccess delivers good value for the price?

Yes

Are you happy with GoodAccess's feature set?

Yes

Did GoodAccess live up to sales and marketing promises?

Yes

Did implementation of GoodAccess go as expected?

Yes

Would you buy GoodAccess again?

Yes

The GoodAccess solution allows you to secure access to cloud resources and environments, and easily manage access for remote work teams, who can be working from anywhere. Because it has the ability to assign one or more Gateway IP addresses that are exclusive for company use, you can manage access from remote environments through whitelists and keep them protected.

GoodAccess Feature Ratings

Continuous Verification
Not Rated
Secure Web Gateways
10
Network Flow Control
9
Network Traffic Analysis
1
Segmentation Leveraging
3
Admin Access Control
7
Network Topology Mapping
6
Network Analytics
3
Threat Recognition
7
Automated Alerts and Reporting
8
Threat Analysis
2
Threat Intelligence Reporting
2
Automated Threat Identification
Not Rated
Multi-Factor Authentication
9