Zero Trust Advanced Managed VPN

Secure Gateway or Managed Zero Trust tiers

WireGuard

Zero Trust Advanced Managed VPN

Managed WireGuard networking with modern identity, device checks, and policy-driven access.

Replace the "flat network" VPN with a service designed for least privilege: secure remote access, predictable egress IPs, and—on the advanced tier—granular routes, ports, groups and posture checks.

Zero Trust WireGuard

What you get

This service is a managed WireGuard network with an identity layer (Zitadel) and a policy layer. Instead of "connect = full network access", we design access around who the user is, what device they're on, and what they're trying to reach.

  • Fast and modern VPN transport (WireGuard) with centrally managed keys and configuration.
  • Identity-aware onboarding using Zitadel user accounts and controlled enrolment.
  • Predictable egress via managed Exit Nodes (your "office IP" on the internet).
  • Optional zero trust controls: routes, ports, groups, policies, and posture checks.

Good for

  • Remote teams that need a trusted "office IP" for SaaS allowlists
  • SMBs replacing legacy VPN appliances
  • Compliance-driven access patterns (least privilege, auditability)

Contract

All plans

  • 12-month contract
  • Billed monthly
  • UK-based support and management

Pricing

GENAccess is a managed WireGuard/NetBird based VPN service. Pricing is £5 per user/month with one exit node included free. Additional exit/routing nodes are £10/month each.

Plan Users Exit Nodes SLA Description Monthly
Single 1 1 SLA3 Single user with included exit node £5.00
Pack5 5 1 SLA3 5 user pack with included exit node £24.00
Pack10 10 1 SLA4 10 user pack with included exit node £47.00
Pack20 20 1 SLA4 20 user pack with included exit node £90.00
Pack50 50 1 SLA5 50 user pack with included exit node £215.00
Pack100 100 1 SLA5 100 user pack with included exit node £400.00
ExtraExitNode 0 1 SLA3 Additional exit/routing node £10.00

All plans include one exit node at no extra cost. Additional exit nodes are £10/month. 12-month contract, billed monthly. Larger deployments or complex routing requirements may require a tailored design.

Zero Trust (in plain English)

Zero Trust means we don't assume a device is trusted just because it's "on the VPN". Every access decision is treated as a new request to be evaluated.

  • Verify explicitly: identity, device, and context before allowing access.
  • Least privilege: users only get the routes and ports they need.
  • Assume breach: segment the network to limit blast radius.

WireGuard (why it matters)

WireGuard is a modern VPN protocol known for strong cryptography, small attack surface, and excellent performance. It's a great fit for always-on remote access.

  • Fast handshakes and roaming-friendly connections
  • Simple, auditable design
  • Works well across desktop and mobile devices

Key concepts

Exit Nodes

An Exit Node is where your VPN traffic leaves the private network and accesses the internet. It's how remote users appear to come from a known, consistent IP address (your "office IP").

All plans include one exit node. Additional exit nodes can be added for regional routing, redundancy, or to separate traffic by team or function.

Routes

Routes decide which internal networks a user can reach over the VPN—for example a specific subnet containing file servers, a lab network, or a cloud VPC.

  • Per-group access to subnets (e.g. Finance vs Engineering)
  • Split tunnelling where appropriate
  • Clear separation between internal access and internet egress

Policies & Groups

Policies define what is allowed. Groups keep management simple by applying those policies to a set of users (and optionally devices).

  • Role-based access: "Support", "Developers", "Contractors"
  • Time-limited or project-limited access
  • Auditable change history (who got access to what, and when)

Micro-segmentation (Ports & Protocols)

Instead of "VPN gives you the whole network", we can allow only the specific ports needed. For example: SSH to a bastion, RDP to a jump host, or HTTPS to an internal app.

  • Reduce blast radius and lateral movement
  • Align access with compliance requirements
  • Supports safer third-party/contractor access

Posture checks

Posture checks are rules about the device's security state—used to allow, restrict, or block access. Typical checks include: OS version, disk encryption, endpoint protection, and device enrolment.

This is where zero trust becomes practical: a user can be valid, but access can still be limited if the device doesn't meet your baseline.