Rippling

4.9
(42)

Payroll • Benefits • HR • IT — Rippling is the first end-to-end Employee Management Platform

Work for Rippling?

Learning about Rippling?

We can help you find the solution that fits you best.

Rippling Features

Core HR

Organization Management

Organizes employees in an org structure that can be used throughout the application for reporting, permissions, etc.

94%
(Based on 17 reviews)

Time, Attendance, and PTO

Tracks time, attendance, paid time-off (PTO), sick time, schedules, and other workforce-related information.

89%
(Based on 15 reviews)

Expense Management

Contains functionality for employees to submit expenses reports and track reimbursments

93%
(Based on 9 reviews)

Salary Structures

Manages position descriptions and pay grades/structures for each role

93%
(Based on 16 reviews)

Compliance

Helps protect risk areas by ensuring compliance standards are met through tracking and reporting

96%
(Based on 17 reviews)

Benefits Administration

Enables employees to manage their benefit plans by viewing plans, make changes during open enrollement, and for life event changes. Employers can report and manage payroll deductions based on selected plan options

88%
(Based on 10 reviews)

Authentication Options

Authentication User experience

Process of providing credentials and logging into multiple systems is easy and intuitive for users

Not enough data available

Supports Required Authentication systems

Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc.

Not enough data available

Multi-Factor Authentication

Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.

Not enough data available

Supports Required Authentication Methods/Protocols

Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case

Not enough data available

Federation/SAML support (idp)

Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.

Not enough data available

Federation/SAML support (sp)

Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider.

Not enough data available

User on/off Boarding

Self Service Access requests

Users can request access to an application and be automatically provisioned if they meet policy requirements

Not enough data available

Smart/Automated Provisioning

Automates account/access rights creation, changes and removals for on-premise and cloud apps

Not enough data available

Role Management

Establish roles that create a set of authentication rights for each user in the role

Not enough data available

Policy Management

Enables administrators to create access policies and applies policy controls throughout request and provisioning processes

Not enough data available

Access Termination

Terminate access to multiple applications based on dates

Not enough data available

Approval Workflows

Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow

Not enough data available

Authentication Options

Authentication User experience

Process of providing credentials and logging into multiple systems is easy and intuitive for users

Not enough data available

Local Access

Controls access to legacy applications, web based applications, network resources and servers.

Not enough data available

Partner Access

Controls access to users that are not company employees that are either within the companies local area network or outside the network

Not enough data available

Mobile Support

Provides mobile application for required mobile os platform and enables single sign on for native and web based business applications

Not enough data available

Breath of support for target systems

Standard integrations to most common cloud and on premise applications

Not enough data available

Supports BYOD users

Enables users to use their own device to access company applications.

Not enough data available

Employee Self Service

Web Portal

Allows employees to access current and past pay stubs, W-2 forms, and additional salary information.

96%
(Based on 12 reviews)

Benefits Manager

Allows employees to answer or update questions pertaining to benefits and receive information about benefit providers.

94%
(Based on 7 reviews)

Mobile

Allows employees to view pay stub and W-2 information via a smartphone app or mobile optimized website.

85%
(Based on 6 reviews)

Benefits Administration Platform Features

Benefits Record Management

Track and manage employee benefits information and eligibility information within a centralized database.

Not enough data available

Enrollment Planning

Facilitate employee enrollment in health insurance plans during open enrollment and special enrollment periods. Make changes to benefits data in real time.

Not enough data available

Third-Party Carrier Integration

Access a unique marketplace of benefits products provided by third-party carriers. Select from pre-built bundles or customize your own bundles within the system to offer to your employees.

Not enough data available

Document Management

Store and organize on-boarding benefits documents such as I-9s, W-4s, W-9s, and other employee agreements.

Not enough data available

Total Compensation Statements

Prepare ad-hoc and historical total compensation statements for employees. Employees can access statements to find a comprehensive view of their compensation, including benefits, wages, and stock options.

Not enough data available

Self-Service Portal

Allow employees to log in and review the details of their employee benefits program elections 24/7 and make changes and enroll in benefits as required.

Not enough data available

Regulatory Compliance

Ensure compliance with federal and state benefits regulations, including the Consolidated Omnibus Reconciliation Act (COBRA), Affordable Care Act (ACA), and Health Insurance Portability and Accountability Act (HIPAA).

Not enough data available

Benefits Dashboards

An easy to read, often single page, real-time user interface, showing a graphical presentation of the current status and historical trends of benefits data to enable instantaneous and informed decisions to be made at a glance.

Not enough data available

Mobile Benefits Access

Provide access to employee benefits information including ID numbers, deductibles, in- and out-of-network costs, and more.

Not enough data available

Integrations / APIs

The platform can integrate with HR and payroll software to manage employee data such as new hires, general profiles, salary changes, benefit deductions, and terminations into a single system of record.

Not enough data available

Access Control Types

Endpoint access

Provides ability to control access to PC's, Mobile devices, and other endpoint devices.

Not enough data available

Local Access

Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network.

Not enough data available

Remote Access

Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network.

Not enough data available

Partner Access

Controls access to users that are not company employees that are either within the companies local area network or outside the network

Not enough data available

Supports BYOD users

Enables users to use their own device to access company applications.

Not enough data available

User Maintenance

Self Service Password Reset

Enables users to reset passwords without administrator interaction. Enforces password policies when resetting.

Not enough data available

Bulk Changes

Change users and permissions in bulk

Not enough data available

Bi-directional Identity Synchronization

Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application

Not enough data available

Multi-Factor Authentication

Supports Required Access Types

Works with required networking products and applications out of the box such as: VPN, Web, Cloud applications, Local/Remote Desktop

Not enough data available

Supports Required Authentication systems

Includes or supports required authentication technologies. Example systems: One Time Passwords, bioMetric, knowledge based, key cards, mobile phone based tokens, etc

Not enough data available

Administration

Payroll Entry

Allows administrator to enter payroll for all employees based on salary or total hours worked.

100%
(Based on 13 reviews)

Time Off Accrual

Calculation and tracking of sick and vacation days.

97%
(Based on 5 reviews)

Direct Deposit

Automatically deposits paychecks into employees' bank accounts.

100%
(Based on 12 reviews)

Expense Reimbursement

Allows administrator to reimburse employees for business-related purchases.

96%
(Based on 8 reviews)

Pre-tax Deductions

Automatically deducts wages for health care, 401(k) plans, etc. from paychecks.

98%
(Based on 7 reviews)

Wage Garnishment

Allows administrator to set up for wage garnishments to be deducted automatically from employers' paychecks.

Not enough data available

Approvals

Administrator can submit payroll approval request and the approver can approve, deny, or re-assign it to the appropriate approver.

96%
(Based on 8 reviews)

Check/W-2 Printing

Allows administrators to print valid paychecks and W-2 forms.

100%
(Based on 5 reviews)

Check/W-2 Delivery

Sends printed checks to administrator to distribute to employees.

97%
(Based on 5 reviews)

Usability & Access

Quick Login

Expedites user logins using methods like a master password or password autofill.

Not enough data available

Browser Extension

Integrates the tool with your browser for easy use.

Not enough data available

Mobile App Usability

Integrates with your mobile device for use on mobile apps.

Not enough data available

Multi-Device Use

Enables user to use the tool across multiple devices.

Not enough data available

Admin Management

Allows an employer or administrator to manage employee access.

Not enough data available

System Control

Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

Not enough data available

System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied.

Not enough data available

Device Control

Manages user network accessibility on laptops and mobile devices.

Not enough data available

Web Control

Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.

Not enough data available

Application Control

Blocks endpoint users from accessing restricted applications.

Not enough data available

Platform - Mobile Device Management (MDM)

Regulation Compliant

Ensures that employees mobile devices are compliant with business regulations and requirements

Not enough data available

Administration

Ease of installation on server

Installation process is easy and flexible.

Not enough data available

Password Policy Enforcement

Options for resetting and enforcing password policies

Not enough data available

Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks

Not enough data available

Ease of connecting applications

Easily provisions new systems, platforms or applications using configuration and not customization.

Not enough data available

Self Service Password Administration

Users can set, change passwords without interaction from IT staff

Not enough data available

Governance

Identifies and Alerts for Threats

Alerts administrators when inappropriate access occurs

Not enough data available

Compliance Audits

Proactively audits access rights against policies

Not enough data available

Identity Directories

On-premise identity repositories supported

Variety and Quality of integrations (ie Active Directory, LDAP)

Not enough data available

Application as profile master

Directory treats the user's profile that is in an application as the ongoing source of truth for that user's profile. Changes to profile in master application drive changes to profiles in other applications.

Not enough data available

Cloud Directory

Provides cloud based directory option that contains all user names and attributes

Not enough data available

Taxes

Tax Calculation

Calculates taxes due and may include resources or tools for federal and state tax compliance.

98%
(Based on 9 reviews)

Tax Filing

Files payroll tax forms automatically for federal, state, and local taxes.

95%
(Based on 9 reviews)

Automatic Tax Payment

Allows payroll vendor, via power of attorney, to make electronic payments of withheld taxes to government.

97%
(Based on 9 reviews)

Security Measures

Password Generator

Generates passwords for each of your logins.

Not enough data available

Two-Factor Authentication

Provides extra security by requiring an extra for of verification in addition to a password.

Not enough data available

Security Audits

Analyzes and evaluates the quality and variety of your passwords.

Not enough data available

Vulnerability Prevention

Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

Not enough data available

Firewall

Protects endpoint devices from a variety of attacks and malware threats.

Not enough data available

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data available

Operating System

Multi-Systems Support

Supports differing operating systems and mobile devices

Not enough data available

Apple Support

Supports Apple devices

Not enough data available

Android Support

Support Android devices

Not enough data available

Platform

Multiple Operating system support

Supports Endpoint access control to multiple operating systems

Not enough data available

Multi-Domain Support

Allows user authentication to be honored by all the hosts in two or more domains

Not enough data available

Cross Browser support

Support access to browser based applications across required browser types

Not enough data available

Fail over protection

Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate

Not enough data available

Third Party Web Services support

Can call and pass credentials to third party web services.

Not enough data available

Reporting

Contains pre-built and custom reporting tools to required to manage business

Not enough data available

Auditing

Provides mechanism for auditing authentication for trouble shooting purposes.

Not enough data available

Administration

Reporting

Standard and customized report creation to ensure appropriate access rights have been assigned

Not enough data available

Mobile App

Provides mobile application that alerts administrators of potential issues and allows administrators manage access rights

Not enough data available

Ease of set up for target systems

Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured

Not enough data available

APIs

Provides appropriate application interfaces to enable custom integrations for unique business requirements

Not enough data available

Provisioning

Self Service Access requests

Users can request access to an application and be automatically provisioned if they meet policy requirements

Not enough data available

Smart/Automated Provisioning

Automates account/access rights creation, changes and removals for on-premise and cloud apps

Not enough data available

Bi-directional Profile Synchronization

Keeps all profile attributes consistent across applications whether the change is made in the provisioning system or the application

Not enough data available

Profile attribute transformation

Transforms profile atributes to the required format for all of the systems being updated

Not enough data available

Role Management

Establish roles that create a set of authentication rights for each user in the role

Not enough data available

Policy Management

Enables administrators to create access policies and applies policy controls throughout request and provisioning processes

Not enough data available

Access Termination

Terminate access to multiple applications based on dates

Not enough data available

Approval Work-flows

Allow business stake-holders/managers to approve or reject requested changes to access via a defined work-flow

Not enough data available

Integration

API / Integration

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc with other software applications.

Not enough data available

Time Tracking Integration

Enables administrator to import hours from time tracking systems.

Not enough data available

Accounting Integration

Provides standard integration with third party accounting software.

Not enough data available

Core HR Integration

Provides standard integration with third party core HR software.

Not enough data available

Storage

Digital Wallet

Stores records like credit cards or receipts in addition to passwords.

Not enough data available

File Storage

Stores files in addition to passwords.

Not enough data available

Security Management

Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

Not enough data available

Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge.

Not enough data available

Compliance

Monitors assets and enforces security policies to audit assets and infrastructure security.

Not enough data available

Management

Applicatons Management

Centrally manages, configures, and oversees applications on employees' mobile devices

Not enough data available

Applications Consolidation

Separates work apps and data from personal apps and data

Not enough data available

Whitelist

Implements whitelist policy to easily and securely deploy recommended or required applications

Not enough data available

Blacklist

Implements blacklist policy to block unwanted or suspicious applications

Not enough data available

Usage Information

Offers visibility into employee mobile device activity

Not enough data available

Platform

Customization

Allows administrators to customize to accomodate their unique processes. Includes ability to create custom objects, fields, rules, calculations, and views.

84%
(Based on 12 reviews)

Integration APIs

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc with other software applications.

95%
(Based on 12 reviews)

Internationalization

Enables users to view and transact business with the same content in multiple languages and currencies.

93%
(Based on 8 reviews)

User, Role, and Access Management

Grant access to select data, features, objects, etc. based on the users, user role, groups, etc.

97%
(Based on 18 reviews)

Performance and Reliability

Software is consistently available (uptime) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took.

95%
(Based on 18 reviews)

Mobile User Support

97%
(Based on 10 reviews)

Reporting

Enables reporting of all data contained within the system. Typically contains standard reports as well as the ability to create ad-hoc reports.

89%
(Based on 16 reviews)

Dashboards

An easy to read, often single page, real-time user interface, showing a graphical presentation of the current status and historical trends of an organization’s Key Performance Indicators (KPIs) to enable instantaneous and informed decisions to be made at a glance

88%
(Based on 18 reviews)

Governance

Identifies and Alerts for Threats

Alerts administrators when inappropriate access occurs

Not enough data available

Compliance Audits

Proactively audits access rights against policies

Not enough data available

Platform

Reporting and Dashboards

Access pre-built and custom reports and dashboards.

97%
(Based on 9 reviews)

User, Role, and Access Management

Grant access to select data, features, objects, etc. based on the users, user role, groups, etc.

100%
(Based on 9 reviews)

Performance and Reliability

Software is consistently available (uptime) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took.

97%
(Based on 11 reviews)

Scalability

Allows administrator to easily add employees and grow payroll process as their company grows.

99%
(Based on 11 reviews)

Security

Remote Wipe

Enable the remote locking down and encryption of employee mobile devices

Not enough data available

Security

Protects employee, company, and data from potential vulnerabilities or malware

Not enough data available

Administration

Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks

Not enough data available

Ease of set up for target systems

Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured

Not enough data available

Bulk Changes

Change users and permissions in bulk

Not enough data available

Self Service Password Administration

Users can set, change passwords without interaction from IT staff

Not enough data available

Platform

Customization

Supports customizable UI

Not enough data available

Reliability

Cloud based service has minimal downtime

Not enough data available

Performance/Scalability

Service performs well under significant use and can scale to support large number of users

Not enough data available

Security

Vendor follows appropriate security protocols and has appropriate certifications to ensure no breech of confidential data occurs

Not enough data available

Logging and Reporting

Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.

Not enough data available

Federation/SAML support

Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.

Not enough data available

Cross Browser support

Support access to browser based applications across required browser types

Not enough data available

Reporting

Contains pre-built and custom reporting tools to required to manage business

Not enough data available

APIs

Provides appropriate application interfaces to enable custom integrations for unique business requirements

Not enough data available