GoodAccess is simple to implement and its UI is hard to beat
November 11, 2025

GoodAccess is simple to implement and its UI is hard to beat

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with GoodAccess

So far we have been whitelisting a lot of IP address that are able to pass through our firewall. We have used VPN to bypass it and created only 1 whitelisted IP address and all our internal team members now have to use VPN to access internal network. This removed a lot of work from IT and made our internal network more secure.

Pros

  • Very easy and intuitive UI
  • Easy setup
  • Great pricing

Cons

  • The Admin console could have more adjustments
  • The IT team's workload managing internal network access has decreased significantly.
It was easy to setup, is easy to use and a great product for the price. It is not the fanciest or the most complicated VPN on the market, but it does exactly what our company needed it for and it does it very well. We would recommend this VPN to other companies in our situation as well.
It was cheaper and easier to use. Our internal team have evaluated multiple other VPN providers but GoodAccess have come on top for the best bang for the buck in our use case. They support team was also great and is responding to our request in a timely manner. s

Do you think GoodAccess delivers good value for the price?

Yes

Are you happy with GoodAccess's feature set?

Yes

Did GoodAccess live up to sales and marketing promises?

Yes

Did implementation of GoodAccess go as expected?

Yes

Would you buy GoodAccess again?

Yes

Getting remote users to the internal network without compromising the internal network to many different IP whitelistings. This was our case. We were able to get that going very easily and our internal team workload decreased dramatically managing internal network access. All we have to do is provide VPN to the users, approve their devices and we are good to go.

GoodAccess Feature Ratings

Continuous Verification
8
Secure Web Gateways
9
Segmentation Leveraging
6
Admin Access Control
10
Network Data Encryption
9

Comments

More Reviews of GoodAccess