security weaver

5.0
(1)

Superior Application Performance: Allows your staff to complete compliance work in less time than with competitive products allowing them to focus more time on other work

Work for security weaver?

Learning about security weaver?

We can help you find the solution that fits you best.

security weaver Reviews

Ask security weaver a Question
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
Industry
Showing 1 security weaver review
LinkedIn Connections
security weaver review by Administrator
Administrator
Validated Reviewer
Verified Current User
Review Source

"Simple and effective"

What do you like best?

Ability to pre-approve emergency fire call access without having service desk calls.

What do you dislike?

Sometimes the job scheduling in ER can seem a little awkward but you get used how it works.

What business problems are you solving with the product? What benefits have you realized?

Two primary business processes. The first is using the ER tool to handle firecall access which has allowed us to significantly reduce off-hours help desk calls and resolutions. The second is through the SE tool to assist with streamlining our audit compliance process and documentation of mitigating controls.

Sign in to G2 Crowd to see what your connections have to say about security weaver

What User Provisioning/Governance solution do you use?

Thanks for letting us know!

There are not enough reviews of security weaver for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
ManageEngine ADAudit Plus Logo
ManageEngine ADAudit Plus
4.1
(11)
Real-time Windows Active Directory and File-Server change audit solution
2
ManageEngine ADManager Plus Logo
ManageEngine ADManager Plus
4.1
(12)
Active Directory Management and Reporting Solution
3
Avigilon ACM Logo
Avigilon ACM
3.9
(4)
Access Control Manager (ACM) helps organizations keep people, property and assets safe with an easy-to-use, role-based system that can grow with you. It has the flexibility to work with the systems you already have, which helps eliminate extra work and increase productivity.
4
ActivID® Authentication and Credential Management Logo
ActivID® Authentication and Credential Management
4.8
(4)
HID Identity Assurance portfolio delivers a full range of authentication and credentialing options that help you gain confidence in your users’ identities and effectively protect access to all your physical resources, internal networks, systems and services, and public and private cloud-based applications.
5
holaSpirit Logo
holaSpirit
5.0
(3)
Holaspirit is a web platform designed for teal organisation, especially Holacracy practitioners.
6
RSA Identity Governance and Lifecycle Logo
RSA Identity Governance and Lifecycle
4.5
(3)
Using a business-driven approach, RSA Aveksa’s solution integrates access governance, provisioning, authentication, and single sign-on (SSO) in one platform. Whether on-premise or in the cloud, the platform reduces risk and complexity while improving security, visibility, and compliance.
7
SMACS Logo
SMACS
4.8
(3)
SMACS by Stack8 is a productivity tool for Voice Operations Teams to facilitate moves, adds, and changes instantly within Cisco’s Unified Communications Manager, Unity Connection, and Unified Communications Manager IM & Presence applications. The user interface is so intuitive that you don’t need any Cisco experience to perform basic requests: it’s designed with the user in mind and the task at hand.
8
Office 365 Reports Logo
Office 365 Reports
4.3
(3)
The software provides more than 200+ reports ready to use without using Powershell scripts. With automated and actionable reports straight to your Desktop, the truly multi-purpose solution offers unsurpassed customization and usability of its report data for collaboration and sharing, ensuring smooth and optimal functioning of your Office 365.
9
Dell Identity Manager Logo
Dell Identity Manager
3.8
(2)
Identity management solution that automates and streamlines access governance
10
Micro Focus Identity Governance Logo
Micro Focus Identity Governance
4.0
(1)
Mitigate Risk, Ensure Compliance and Empower Users to Manage and Certify Access
Show more
Kate from G2 Crowd

Learning about security weaver?

I can help.
* We monitor all security weaver reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.