GoodAccess Features
What are the features of GoodAccess?
Usage
- Multi-Device Usage
- Multiple Concurrent Connections
- Protocol Choices
- Unlimited Bandwidth
- Varied Server Locations
- Unlimited Server Switches
Miscellaneous
- Live Customer Support
- Open Source Code
- Multiple Payment Methods
Network Management
- Network Mapping
- Security Analytics
Security
- Security Automation
- Application Security
- Data Protection
Identity Management
- User Monitoring
Top Rated GoodAccess Alternatives
(24)
4.8 out of 5
Visit Website
Sponsored
GoodAccess Categories on G2
Filter for Features
Usage
Multi-Device Usage | Enables the use of the VPN on multiple Devices. This feature was mentioned in 108 GoodAccess reviews. | 93% (Based on 108 reviews) | |
Multiple Concurrent Connections | Allows use of the VPN on multiple connections at the same time. This feature was mentioned in 106 GoodAccess reviews. | 89% (Based on 106 reviews) | |
Protocol Choices | Based on 99 GoodAccess reviews. Enables the user to choose which protocol to use such as OpenVPN or PPTP. | 90% (Based on 99 reviews) | |
Unlimited Bandwidth | Provides unlimited bandwidth for the user. This feature was mentioned in 106 GoodAccess reviews. | 92% (Based on 106 reviews) | |
Varied Server Locations | Provides servers in many different locations. This feature was mentioned in 102 GoodAccess reviews. | 87% (Based on 102 reviews) | |
Unlimited Server Switches | Enables you to switch between servers an unlimited number of times. 94 reviewers of GoodAccess have provided feedback on this feature. | 82% (Based on 94 reviews) |
Miscellaneous
Live Customer Support | Based on 103 GoodAccess reviews. Provides live customer support. | 86% (Based on 103 reviews) | |
Open Source Code | Enables the user to view the code used by the VPN. 83 reviewers of GoodAccess have provided feedback on this feature. | 65% (Based on 83 reviews) | |
Multiple Payment Methods | As reported in 94 GoodAccess reviews. Allows multiple payment methods such as credit card or cryptocurrency. | 86% (Based on 94 reviews) |
Network Management
Network Segmentation | Based on 19 GoodAccess reviews. Allows administrative control over network components, mapping, and segmentation. | 91% (Based on 19 reviews) | |
Network Mapping | Allows visual display of networks segmented components and their connected resources. This feature was mentioned in 20 GoodAccess reviews. | 83% (Based on 20 reviews) | |
Security Analytics | Utilizes behavioral analysis to improve security procedures and documentation. 19 reviewers of GoodAccess have provided feedback on this feature. | 82% (Based on 19 reviews) | |
API/Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. 17 reviewers of GoodAccess have provided feedback on this feature. | 77% (Based on 17 reviews) |
Security
Security Automation | Based on 20 GoodAccess reviews. Allows administrative control over automated security tasks. | 81% (Based on 20 reviews) | |
Application Security | Based on 20 GoodAccess reviews. Protects application access and data. Prompts additional authentication for suspicious users. | 88% (Based on 20 reviews) | |
Workload Protection | As reported in 18 GoodAccess reviews. Protects computing resources across a network. Prompts additional authentication for suspicious users. | 87% (Based on 18 reviews) | |
Data Protection | Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users. This feature was mentioned in 21 GoodAccess reviews. | 86% (Based on 21 reviews) |
Identity Management
Adaptive Access Control | Based on 19 GoodAccess reviews. Provides a risk-based approcach to determining trust within the network. | 87% (Based on 19 reviews) | |
Identity Scoring | Calculates risk based on user behavior, permissions, and requests. 18 reviewers of GoodAccess have provided feedback on this feature. | 78% (Based on 18 reviews) | |
User Monitoring | Based on 20 GoodAccess reviews. Monitors users attempting unauthorized access to databases, applicaitons, and othe network components. | 88% (Based on 20 reviews) |
Protection
Policy Enforcement | Allows administrators to set policies for security and governance. This feature was mentioned in 16 GoodAccess reviews. | 93% (Based on 16 reviews) | |
Security Audit | As reported in 16 GoodAccess reviews. Allows for deep examination into network-connected devices, policies, and protocols. | 89% (Based on 16 reviews) | |
Access Control | Based on 16 GoodAccess reviews. Supports LDAP Protocol to enable access control and governance. | 83% (Based on 16 reviews) | |
User Authentication | Authenticates users prior to granting access to networks, applciations, and systems. This feature was mentioned in 16 GoodAccess reviews. | 94% (Based on 16 reviews) |
Monitoring
Compliance Monitoring | Monitors data and compliance requirements. Sends alerts based on violations or misuse. 16 reviewers of GoodAccess have provided feedback on this feature. | 88% (Based on 16 reviews) | |
Vulnerability Monitoring | Based on 16 GoodAccess reviews. Monitors networks, applications, and systems to identify misconfigurations and access points that can be easily compromised. | 85% (Based on 16 reviews) | |
Configuration Monitoring | As reported in 16 GoodAccess reviews. Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | 88% (Based on 16 reviews) | |
Observability | Generate insights across IT systems utilizing event metrics, logging, traces, and metadata. This feature was mentioned in 15 GoodAccess reviews. | 91% (Based on 15 reviews) |
Administration
Network Segmentation | Based on 15 GoodAccess reviews. Allows administrative control over network components, mapping, and segmentation. | 92% (Based on 15 reviews) | |
Scalability | Provides features to allow scaling for large organizations and user bases. This feature was mentioned in 15 GoodAccess reviews. | 93% (Based on 15 reviews) | |
Global Access | Extends SDP network access to users regardless of their physical location. This feature was mentioned in 15 GoodAccess reviews. | 92% (Based on 15 reviews) |