GoodAccess vs SilverSky Managed Security Services
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Cybersecurity platform (SASE/SSE) that enables easy Zero Trust Architecture implementation for medium enterprises, any scale.
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
SilverSky Managed Security Services is a cloud-based cybersecurity platform that helps businesses monitor firewalls and automate remediation processes to handle threats. Features include routing, authentication, issue tracking, encryption, content filtering, log management, and analytics.
SilverSky Managed Security Services is a cloud-based cybersecurity platform that helps businesses monitor firewalls and automate remediation...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Pricing
Starting from
US$7.00/month
- Free Version
- Free Trial
- Subscription
Starting from
US$1.00
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.9/ 5Features
4.7/ 5Customer Service
4.8/ 5Value for Money
4.7/ 5Ease of Use
4.3/ 5Features
4.3/ 5Customer Service
4.6/ 5Value for Money
4.5/ 5Features
Total features 120
- AI/Machine Learning
- API
- Access Certification
- Access Controls/Permissions
- Access Management
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Ad Blocker
- Alerts/Escalation
- Alerts/Notifications
- Anomaly/Malware Detection
- Anonymous Browsing
- Anti Spam
- Anti Virus
- Application Access Control
- Application Management
- Application Security
- Archiving & Retention
- Audit Management
- Audit Trail
- Authentication
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Chat/Messaging
- Cloud Application Security
- Cloud Encryption
- Cloud Security Policy Management
- Compliance Management
- Compliance Tracking
- Configuration Management
- Content Filtering
- Credential Management
- Customizable Reports
- DNS Leak Protection
- Dashboard
- Dashboard Creation
- Data Import/Export
- Data Loss Prevention Software
- Data Security
- Data Visualization
- Device Management
- Employee Activity Monitoring
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- File Integrity Monitoring
- Filtering
- Firewalls
- For MSPs
- Geo-spoofing
- HIPAA Compliant
- IOC Verification
- IP Filtering
- IP Masking
- IT Incident Management
- IT Reporting
- Incident Management
- Incident Reporting
- Insider Threat Protection
- Intrusion Detection System
- Issue Auditing
- Issue Tracking
- Live Chat
- Log Access
- Log Management
- Member Accounts
- Mobile Access
- Monitoring
- Multi-Device Support
- Multi-Factor Authentication
- Multi-Language
- Multi-Protocol
- Multiple User Accounts
- Network Monitoring
- Network Provisioning
- Network Security Software
- Next-Generation Firewall
- No-log VPN
- PCI Compliance
- Patch Management
- Policy Management
- Privileged Account Management
- Ransomware Protection
- Real-Time Monitoring
- Remote Access Management
- Remote Access/Control
- Remote Monitoring & Management
- Remote Support Software
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Role-Based Permissions
- Rules-Based Workflow
- SSL Security
- Search/Filter
- Secure Browsing
- Secure Data Storage
- Secure Login
- Security Auditing
- Security Tools
- Self Service Portal
- Server Logs
- Server Monitoring
- Single Sign On
- Spam Blocker
- Status Tracking
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Tokenization
- Two-Factor Authentication
- Uptime Reporting
- Usage Tracking/Analytics
- User Activity Monitoring
- User Management
- User Provisioning
- User Session Management
- VPN Software
- VPN Tunneling
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Protection
- Vulnerability Scanning
- Web Inspection
- Web Threat Management
- Web Traffic Reporting
- Web-Application Security
- Whitelisting/Blacklisting
Total features 46
- AI/Machine Learning
- API
- Access Certification
- Access Controls/Permissions
- Access Management
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Ad Blocker
- Alerts/Escalation
- Alerts/Notifications
- Anomaly/Malware Detection
- Anonymous Browsing
- Anti Spam
- Anti Virus
- Application Access Control
- Application Management
- Application Security
- Archiving & Retention
- Audit Management
- Audit Trail
- Authentication
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Chat/Messaging
- Cloud Application Security
- Cloud Encryption
- Cloud Security Policy Management
- Compliance Management
- Compliance Tracking
- Configuration Management
- Content Filtering
- Credential Management
- Customizable Reports
- DNS Leak Protection
- Dashboard
- Dashboard Creation
- Data Import/Export
- Data Loss Prevention Software
- Data Security
- Data Visualization
- Device Management
- Employee Activity Monitoring
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- File Integrity Monitoring
- Filtering
- Firewalls
- For MSPs
- Geo-spoofing
- HIPAA Compliant
- IOC Verification
- IP Filtering
- IP Masking
- IT Incident Management
- IT Reporting
- Incident Management
- Incident Reporting
- Insider Threat Protection
- Intrusion Detection System
- Issue Auditing
- Issue Tracking
- Live Chat
- Log Access
- Log Management
- Member Accounts
- Mobile Access
- Monitoring
- Multi-Device Support
- Multi-Factor Authentication
- Multi-Language
- Multi-Protocol
- Multiple User Accounts
- Network Monitoring
- Network Provisioning
- Network Security Software
- Next-Generation Firewall
- No-log VPN
- PCI Compliance
- Patch Management
- Policy Management
- Privileged Account Management
- Ransomware Protection
- Real-Time Monitoring
- Remote Access Management
- Remote Access/Control
- Remote Monitoring & Management
- Remote Support Software
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Role-Based Permissions
- Rules-Based Workflow
- SSL Security
- Search/Filter
- Secure Browsing
- Secure Data Storage
- Secure Login
- Security Auditing
- Security Tools
- Self Service Portal
- Server Logs
- Server Monitoring
- Single Sign On
- Spam Blocker
- Status Tracking
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Tokenization
- Two-Factor Authentication
- Uptime Reporting
- Usage Tracking/Analytics
- User Activity Monitoring
- User Management
- User Provisioning
- User Session Management
- VPN Software
- VPN Tunneling
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Protection
- Vulnerability Scanning
- Web Inspection
- Web Threat Management
- Web Traffic Reporting
- Web-Application Security
- Whitelisting/Blacklisting
Integrations
- Auth0
- Okta
- OneLogin
- Ping Identity
Not provided by vendor