GoodAccess vs Teleport
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Cybersecurity platform (SASE/SSE) that enables easy Zero Trust Architecture implementation for medium enterprises, any scale.
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Pricing
Starting from
US$7.00/month
- Free Version
- Free Trial
- Subscription
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.9/ 5Features
4.7/ 5Customer Service
4.8/ 5Value for Money
4.7/ 5Ease of Use
3/ 5Features
5/ 5Customer Service
5/ 5Value for Money
5/ 5Features
Total features 120
- AI/Machine Learning
- API
- Access Certification
- Access Controls/Permissions
- Access Management
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Ad Blocker
- Alerts/Escalation
- Alerts/Notifications
- Anomaly/Malware Detection
- Anonymous Browsing
- Application Access Control
- Application Management
- Application Security
- Audit Management
- Audit Trail
- Authentication
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Chat/Messaging
- Cloud Application Security
- Cloud Encryption
- Cloud Security Policy Management
- Compliance Management
- Configuration Management
- Content Filtering
- Credential Management
- Customizable Reports
- DNS Leak Protection
- Dashboard
- Dashboard Creation
- Data Import/Export
- Data Loss Prevention Software
- Data Security
- Data Visualization
- Employee Activity Monitoring
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- Filtering
- Firewalls
- For MSPs
- Geo-spoofing
- HIPAA Compliant
- IP Filtering
- IP Masking
- IT Incident Management
- IT Reporting
- Incident Management
- Incident Reporting
- Insider Threat Protection
- Intrusion Detection System
- Issue Auditing
- Live Chat
- Log Access
- Member Accounts
- Mobile Access
- Monitoring
- Multi-Device Support
- Multi-Factor Authentication
- Multi-Language
- Multi-Protocol
- Multiple User Accounts
- Network Monitoring
- Network Provisioning
- Network Security Software
- Next-Generation Firewall
- No-log VPN
- Patch Management
- Policy Management
- Privileged Account Management
- Ransomware Protection
- Real-Time Monitoring
- Remote Access Management
- Remote Access/Control
- Remote Monitoring & Management
- Remote Support Software
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Role-Based Permissions
- Rules-Based Workflow
- SSL Security
- Search/Filter
- Secure Browsing
- Secure Data Storage
- Secure Login
- Security Auditing
- Security Tools
- Self Service Portal
- Server Monitoring
- Single Sign On
- Spam Blocker
- Status Tracking
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Two-Factor Authentication
- Uptime Reporting
- Usage Tracking/Analytics
- User Activity Monitoring
- User Management
- User Provisioning
- User Session Management
- VPN Software
- VPN Tunneling
- Visual Analytics
- Vulnerability Protection
- Vulnerability Scanning
- Web Inspection
- Web Threat Management
- Web Traffic Reporting
- Web-Application Security
- Whitelisting/Blacklisting
Total features 6
- AI/Machine Learning
- API
- Access Certification
- Access Controls/Permissions
- Access Management
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Ad Blocker
- Alerts/Escalation
- Alerts/Notifications
- Anomaly/Malware Detection
- Anonymous Browsing
- Application Access Control
- Application Management
- Application Security
- Audit Management
- Audit Trail
- Authentication
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Chat/Messaging
- Cloud Application Security
- Cloud Encryption
- Cloud Security Policy Management
- Compliance Management
- Configuration Management
- Content Filtering
- Credential Management
- Customizable Reports
- DNS Leak Protection
- Dashboard
- Dashboard Creation
- Data Import/Export
- Data Loss Prevention Software
- Data Security
- Data Visualization
- Employee Activity Monitoring
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- Filtering
- Firewalls
- For MSPs
- Geo-spoofing
- HIPAA Compliant
- IP Filtering
- IP Masking
- IT Incident Management
- IT Reporting
- Incident Management
- Incident Reporting
- Insider Threat Protection
- Intrusion Detection System
- Issue Auditing
- Live Chat
- Log Access
- Member Accounts
- Mobile Access
- Monitoring
- Multi-Device Support
- Multi-Factor Authentication
- Multi-Language
- Multi-Protocol
- Multiple User Accounts
- Network Monitoring
- Network Provisioning
- Network Security Software
- Next-Generation Firewall
- No-log VPN
- Patch Management
- Policy Management
- Privileged Account Management
- Ransomware Protection
- Real-Time Monitoring
- Remote Access Management
- Remote Access/Control
- Remote Monitoring & Management
- Remote Support Software
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Role-Based Permissions
- Rules-Based Workflow
- SSL Security
- Search/Filter
- Secure Browsing
- Secure Data Storage
- Secure Login
- Security Auditing
- Security Tools
- Self Service Portal
- Server Monitoring
- Single Sign On
- Spam Blocker
- Status Tracking
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Two-Factor Authentication
- Uptime Reporting
- Usage Tracking/Analytics
- User Activity Monitoring
- User Management
- User Provisioning
- User Session Management
- VPN Software
- VPN Tunneling
- Visual Analytics
- Vulnerability Protection
- Vulnerability Scanning
- Web Inspection
- Web Threat Management
- Web Traffic Reporting
- Web-Application Security
- Whitelisting/Blacklisting
Integrations
- Auth0
- Okta
- OneLogin
- Ping Identity
Not provided by vendor