GoodAccess is a virtual private network designed to help remote teams access critical information and business systems in a secure network. IT administrators can use a control panel to access virtual gateway, whitelist specific IP addresses, and hide applications to prevent hacking or DDoS attacks.
GoodAccess is a virtual private network designed to help remote teams access critical information and business systems in a secure network. IT...

Platforms Supported

  • Web Based
  • iPhone App
  • Android App
  • Windows App

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • Chat
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include...

Platforms Supported

  • Web Based
  • iPhone App
  • Android App
  • Windows App

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • Chat

Starting from

US$2,00/month

  • Free
  • Subscription

Starting from

US$225,00/month

  • Free
  • Subscription

Overall rating

5 /5
(5)
Ease of Use
5/5
Features & Functionality
4,5/5
Customer Service
4,8/5
Value for Money
5/5

Overall rating

4,6 /5
(125)
Ease of Use
4,1/5
Features & Functionality
4,5/5
Customer Service
4,3/5
Value for Money
4,2/5

Total features 39

  • AI/Machine Learning
  • API
  • Access Control
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Application Security
  • Archiving & Retention
  • Audit Trail
  • Authentication
  • Bandwidth Monitoring
  • Bandwidth Troubleshooting
  • Baseline Manager
  • Behavioral Analytics
  • Billing & Provisioning
  • CPU Monitoring
  • Capacity Analytics
  • Capacity Management
  • Change Management
  • Charting
  • Chat/Messaging
  • Compliance Management
  • Compliance Tracking
  • Configuration Management
  • Connectivity Management
  • Content Management
  • Corrective and Preventive Actions (CAPA)
  • Cost Management
  • Credential Management
  • Customizable Dashboard
  • DNS Leak Protection
  • Dashboard
  • Dashboard Creation
  • Data Import/Export
  • Data Security
  • Data Visualization
  • Deep Learning
  • Demand Monitoring
  • Diagnostic Tools
  • Disaster Recovery
  • Email Monitoring
  • Employee Activity Monitoring
  • Encryption
  • Endpoint Management
  • Event Logs
  • Event Tracking
  • Event Triggered Actions
  • File Integrity Monitoring
  • Firewalls
  • For Healthcare
  • Forensic Analysis
  • Full Transaction Diagnostics
  • Geolocation
  • Historical Audit
  • IP Address Monitoring
  • IT Incident Management
  • Incident Management
  • Incident Reporting
  • Indexing
  • Internet Usage Monitoring
  • Intrusion Detection System
  • Inventory Management
  • Investigation Management
  • Issue Auditing
  • Knowledge Management
  • License Management
  • Live Chat
  • Log Collection
  • Log Management
  • ML Algorithm Library
  • Machine Learning
  • Maintenance Scheduling
  • Member Accounts
  • Mobile Network Troubleshooting
  • Model Training
  • Modeling & Simulation
  • Monitoring
  • Multi-Cloud Management
  • Multi-Language
  • Multi-Protocol
  • Multiple User Accounts
  • Natural Language Processing
  • Network Analysis
  • Network Monitoring
  • Network Resource Management
  • Network Security Software
  • OLAP
  • OSHA Compliance
  • Patch Management
  • Performance Analysis
  • Performance Metrics
  • Policy Management
  • Predictive Analytics
  • Predictive Modeling
  • Real Time Monitoring
  • Relational Display
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Support Software
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Role-Based Permissions
  • Root Cause Analysis
  • Route Management
  • Rules-Based Workflow
  • SSL Security
  • Safety Incident Management
  • Scheduling
  • Search/Filter
  • Secure Login
  • Self Service Portal
  • Server Logs
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Simple Network Management Protocol (SNMP)
  • Simulation
  • Statistical Modeling
  • Supply Monitoring
  • Task Management
  • Templates
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Ticket Management
  • Trace individual transactions
  • Two-Factor Authentication
  • Uptime Reporting
  • User Activity Monitoring
  • User Management
  • VPN Software
  • Virtual Machine Monitoring
  • Visual Discovery
  • Visualization
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Approval

Total features 121

  • AI/Machine Learning
  • API
  • Access Control
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Application Security
  • Archiving & Retention
  • Audit Trail
  • Authentication
  • Bandwidth Monitoring
  • Bandwidth Troubleshooting
  • Baseline Manager
  • Behavioral Analytics
  • Billing & Provisioning
  • CPU Monitoring
  • Capacity Analytics
  • Capacity Management
  • Change Management
  • Charting
  • Chat/Messaging
  • Compliance Management
  • Compliance Tracking
  • Configuration Management
  • Connectivity Management
  • Content Management
  • Corrective and Preventive Actions (CAPA)
  • Cost Management
  • Credential Management
  • Customizable Dashboard
  • DNS Leak Protection
  • Dashboard
  • Dashboard Creation
  • Data Import/Export
  • Data Security
  • Data Visualization
  • Deep Learning
  • Demand Monitoring
  • Diagnostic Tools
  • Disaster Recovery
  • Email Monitoring
  • Employee Activity Monitoring
  • Encryption
  • Endpoint Management
  • Event Logs
  • Event Tracking
  • Event Triggered Actions
  • File Integrity Monitoring
  • Firewalls
  • For Healthcare
  • Forensic Analysis
  • Full Transaction Diagnostics
  • Geolocation
  • Historical Audit
  • IP Address Monitoring
  • IT Incident Management
  • Incident Management
  • Incident Reporting
  • Indexing
  • Internet Usage Monitoring
  • Intrusion Detection System
  • Inventory Management
  • Investigation Management
  • Issue Auditing
  • Knowledge Management
  • License Management
  • Live Chat
  • Log Collection
  • Log Management
  • ML Algorithm Library
  • Machine Learning
  • Maintenance Scheduling
  • Member Accounts
  • Mobile Network Troubleshooting
  • Model Training
  • Modeling & Simulation
  • Monitoring
  • Multi-Cloud Management
  • Multi-Language
  • Multi-Protocol
  • Multiple User Accounts
  • Natural Language Processing
  • Network Analysis
  • Network Monitoring
  • Network Resource Management
  • Network Security Software
  • OLAP
  • OSHA Compliance
  • Patch Management
  • Performance Analysis
  • Performance Metrics
  • Policy Management
  • Predictive Analytics
  • Predictive Modeling
  • Real Time Monitoring
  • Relational Display
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Support Software
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Role-Based Permissions
  • Root Cause Analysis
  • Route Management
  • Rules-Based Workflow
  • SSL Security
  • Safety Incident Management
  • Scheduling
  • Search/Filter
  • Secure Login
  • Self Service Portal
  • Server Logs
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Simple Network Management Protocol (SNMP)
  • Simulation
  • Statistical Modeling
  • Supply Monitoring
  • Task Management
  • Templates
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Ticket Management
  • Trace individual transactions
  • Two-Factor Authentication
  • Uptime Reporting
  • User Activity Monitoring
  • User Management
  • VPN Software
  • Virtual Machine Monitoring
  • Visual Discovery
  • Visualization
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Approval
  • Microsoft Excel
  • Okta
  • OneLogin
  • OpenCart
  • Plesk
  • PrestaShop
  • Tableau
  • WordPress
  • Zoho CRM
  • Microsoft Excel
  • Okta
  • OneLogin
  • OpenCart
  • Plesk
  • PrestaShop
  • Tableau
  • WordPress
  • Zoho CRM