security weaver


Superior Application Performance: Allows your staff to complete compliance work in less time than with competitive products allowing them to focus more time on other work

Work for security weaver?

Learning about security weaver?

We can help you find the solution that fits you best.

security weaver Reviews

Ask security weaver a Question
Write a Review
Filter Reviews
Filter Reviews
Company Size
User Role
Showing 1 security weaver review
LinkedIn Connections
Validated Reviewer
Verified Current User
Review Source

"Simple and effective"

What do you like best?

Ability to pre-approve emergency fire call access without having service desk calls.

What do you dislike?

Sometimes the job scheduling in ER can seem a little awkward but you get used how it works.

What problems are you solving with the product? What benefits have you realized?

Two primary business processes. The first is using the ER tool to handle firecall access which has allowed us to significantly reduce off-hours help desk calls and resolutions. The second is through the SE tool to assist with streamlining our audit compliance process and documentation of mitigating controls.

Sign in to G2 to see what your connections have to say about security weaver

What User Provisioning/Governance solution do you use?

Thanks for letting us know!

There are not enough reviews of security weaver for G2 to provide buying insight. Below are some alternatives with more reviews:

Okta Logo
Okta is an on-demand identity and access management service for web based applications, both in the cloud and behind the firewall
Rippling Logo
Payroll • Benefits • HR • IT — Rippling is the first end-to-end Employee Management Platform
OneLogin Logo
Extend enterprise security & compliance to all public and private cloud apps with secure single sign-on (SSO), multi-factor authentication & user provisioning.
Idaptive Next-Gen Access Logo
Idaptive Next-Gen Access
Today’s new reality requires a new kind of access platform. Built on Zero Trust, Idaptive is creating a new era -secure access everywhere- that uniquely combines leading capabilities to seamlessly integrate SSO, MFA, EMM and UBA. Using our proven technologies, we’re ushering in a new generation of access technology that not only protects companies, but also leads to happier customers, better products and more valuable organizations.
Oracle Identity Management Logo
Oracle Identity Management
Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services.
JumpCloud Logo
JumpCloud is a directory-as-a-service (DaaS), designed to securely connect employee identities to IT resources- devices, apps, & networks.
Avatier Identity Anywhere Logo
Avatier Identity Anywhere
The World's First Identity-as-a-Container (IDaaC) Platform. Docker Container Cloud-Independent Identity Management for Everyone.
CA Identity Suite Logo
CA Identity Suite
The CA Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the CA Identity Suite performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement
CA Identity Manager Logo
CA Identity Manager
Increase user productivity and business flexibility with user provisioning & identity management.
ManageEngine ADManager Plus Logo
ManageEngine ADManager Plus
Active Directory Management and Reporting Solution
Show more
Kate from G2

Learning about security weaver?

I can help.
* We monitor all security weaver reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.