App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

GoodAccess vs ConnectWise SIEM Comparison

Add to Compare

Compare similar apps

NordVPN logo

NordVPN

4.6

ExpressVPN logo

ExpressVPN

4.6

CyberGhost VPN logo

CyberGhost VPN

4.5

Blackpoint MDR logo

Blackpoint MDR

4.8

Netsurion logo

Netsurion

3.6

USM Anywhere logo

USM Anywhere

4.4

Good recommendations?

Overview

Category Leaders

GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In...

ConnectWise SIEM is a threat detection and response management software designed to help enterprises create, launch, and...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Video & Screenshots

No videos yet

Pricing

Starting from

7

/user

Per month

  • Free trial available
  • Credit cardless trial
  • Free account
  • Subscription based

Starting from

10

/user

Per month

  • Free trial available
  • Credit cardless trial
  • Free account
  • Subscription based

User reviews

4.9

95

5

4

3

2

1

86

8

1

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

4.6

44

5

4

3

2

1

30

11

3

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
95%
would recommend this app

Pros

Great customer service, reliable and simple to use. Their system is much simpler to set up then the other companies I had tried and perfect for what our company needs are.
Super easy in use, fast setup and integration, convenient admin panel, high-speed and secure connection, friendly and helpful customer service, reasonable pricing.
Static vpn which is very useful for me. Very good service and I am very satisfied.

Pros

The integration with a lot of the core services we use made this a clear winner when reviewing. The ongoing communication from the team allows us to be confident in how the product is working.
The Perch team has been fantastic with helping us get setup with our SIEM solution. Questions were answered promptly, and issues handled and taken care of.
Great benefits with insight into information we would not have had otherwise. Great team and the desire to provide excellent customer service.

Cons

The Customer service is not 24/7 I guess. I need to wait 12 hours for a representative to respond when I had a little problem.
We have more positive experiences than negative. We had a problem whitelisting our CRM, but the GoodAccess guru helped us really fast.
The only thing I don't like about the profiles generated, is that they don't come with auto login.

Cons

We failed an audit because didn't provide the raw logs for the duration that we needed it. Perch is a simple basic alerting that sometimes fails to alert.
The only con is that it's too bad we need a service such as this.
For a novice to perchybana, custom searches can be difficult.
  • Vendor responds to reviews
  • Last review3 months ago
  • Vendor responds to reviews
  • Last reviewa year ago

Key features

  • Total features122
  • AI/Machine Learning
  • API
  • Access Certification
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Ad Blocker
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anonymous Browsing
  • Application Access Control
  • Application Management
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavior Analytics
  • Behavior Tracking
  • Behavioral Analytics
  • Chat/Messaging
  • Cloud Application Security
  • Cloud Encryption
  • Cloud Security Policy Management
  • Compliance Management
  • Configuration Management
  • Content Filtering
  • Continuous Monitoring
  • Credential Management
  • Customizable Reports
  • DNS Leak Protection
  • Dashboard
  • Dashboard Creation
  • Data Import/Export
  • Data Loss Prevention
  • Data Security
  • Data Visualization
  • Employee Activity Monitoring
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Logs
  • Filtering
  • Firewalls
  • For MSPs
  • Geo-spoofing
  • HIPAA Compliant
  • IP Filtering
  • IP Masking
  • IT Incident Management
  • IT Reporting
  • Incident Management
  • Incident Reporting
  • Insider Threat Protection
  • Intrusion Detection System
  • Inventory Management
  • Issue Auditing
  • Issue Management
  • Live Chat
  • Log Access
  • Log Management
  • Member Accounts
  • Mobile Access
  • Monitoring
  • Multi-Device Support
  • Multi-Factor Authentication
  • Multi-Language
  • Multi-Protocol
  • Multiple User Accounts
  • Network Monitoring
  • Network Provisioning
  • Network Security
  • Next-Generation Firewall
  • No-log VPN
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Privileged Account Management
  • Ransomware Protection
  • Real-Time Monitoring
  • Remote Access Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Support
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Role-Based Permissions
  • Rules-Based Workflow
  • SSL Security
  • Search/Filter
  • Secure Browsing
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Security Breach Monitoring
  • Security Tools
  • Self Service Portal
  • Server Monitoring
  • Single Sign On
  • Spam Blocker
  • Status Tracking
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • Usage Tracking/Analytics
  • User Activity Monitoring
  • User Management
  • User Provisioning
  • User Session Management
  • VPN
  • VPN Tunneling
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Inspection
  • Web Threat Management
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting
  • Total features32
  • AI/Machine Learning
  • API
  • Access Certification
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Ad Blocker
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anonymous Browsing
  • Application Access Control
  • Application Management
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavior Analytics
  • Behavior Tracking
  • Behavioral Analytics
  • Chat/Messaging
  • Cloud Application Security
  • Cloud Encryption
  • Cloud Security Policy Management
  • Compliance Management
  • Configuration Management
  • Content Filtering
  • Continuous Monitoring
  • Credential Management
  • Customizable Reports
  • DNS Leak Protection
  • Dashboard
  • Dashboard Creation
  • Data Import/Export
  • Data Loss Prevention
  • Data Security
  • Data Visualization
  • Employee Activity Monitoring
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Logs
  • Filtering
  • Firewalls
  • For MSPs
  • Geo-spoofing
  • HIPAA Compliant
  • IP Filtering
  • IP Masking
  • IT Incident Management
  • IT Reporting
  • Incident Management
  • Incident Reporting
  • Insider Threat Protection
  • Intrusion Detection System
  • Inventory Management
  • Issue Auditing
  • Issue Management
  • Live Chat
  • Log Access
  • Log Management
  • Member Accounts
  • Mobile Access
  • Monitoring
  • Multi-Device Support
  • Multi-Factor Authentication
  • Multi-Language
  • Multi-Protocol
  • Multiple User Accounts
  • Network Monitoring
  • Network Provisioning
  • Network Security
  • Next-Generation Firewall
  • No-log VPN
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Privileged Account Management
  • Ransomware Protection
  • Real-Time Monitoring
  • Remote Access Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Support
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Role-Based Permissions
  • Rules-Based Workflow
  • SSL Security
  • Search/Filter
  • Secure Browsing
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Security Breach Monitoring
  • Security Tools
  • Self Service Portal
  • Server Monitoring
  • Single Sign On
  • Spam Blocker
  • Status Tracking
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • Usage Tracking/Analytics
  • User Activity Monitoring
  • User Management
  • User Provisioning
  • User Session Management
  • VPN
  • VPN Tunneling
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Inspection
  • Web Threat Management
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting

Integrations

  • Total integrations4
  • Bitbucket
  • Datadog
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Drive
  • HubSpot CRM
  • Jenkins
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Teams
  • NetSuite
  • PagerDuty
  • ServiceNow
  • Shopify
  • Slack
  • Trello
  • Zapier
  • Zendesk Suite
  • Total integrations21
  • Bitbucket
  • Datadog
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Drive
  • HubSpot CRM
  • Jenkins
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Teams
  • NetSuite
  • PagerDuty
  • ServiceNow
  • Shopify
  • Slack
  • Trello
  • Zapier
  • Zendesk Suite