Fastpath Features
What are the features of Fastpath?
User on/off Boarding
- Self Service Access requests
- Smart/Automated Provisioning
- Role Management
- Policy Management
- Access Termination
- Approval Workflows
User Maintenance
- Self Service Password Reset
- Bulk Changes
- Bi-directional Identity Synchronization
Governance
- Identifies and Alerts for Threats
- Compliance Audits
Administration
- Reporting
- Mobile App
- Ease of set up for target systems
- APIs
Top Rated Fastpath Alternatives
(161)
4.6 out of 5
Visit Website
Sponsored
Fastpath Categories on G2
Filter for Features
User on/off Boarding
Self Service Access requests | Based on 30 Fastpath reviews and verified by the G2 Product R&D team. Users can request access to an application and be automatically provisioned if they meet policy requirements | 82% (Based on 30 reviews) | |
Smart/Automated Provisioning | Based on 29 Fastpath reviews and verified by the G2 Product R&D team. Automates account/access rights creation, changes and removals for on-premise and cloud apps | 79% (Based on 29 reviews) | |
Role Management | Based on 35 Fastpath reviews and verified by the G2 Product R&D team. Establish roles that create a set of authentication rights for each user in the role | 87% (Based on 35 reviews) | |
Policy Management | Based on 30 Fastpath reviews and verified by the G2 Product R&D team. Enables administrators to create access policies and applies policy controls throughout request and provisioning processes | 84% (Based on 30 reviews) | |
Access Termination | Based on 29 Fastpath reviews and verified by the G2 Product R&D team. Terminate access to multiple applications based on dates | 86% (Based on 29 reviews) | |
Approval Workflows | Based on 29 Fastpath reviews and verified by the G2 Product R&D team. Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow | 82% (Based on 29 reviews) |
User Maintenance
Self Service Password Reset | Based on 25 Fastpath reviews and verified by the G2 Product R&D team. Enables users to reset passwords without administrator interaction. Enforces password policies when resetting. | 82% (Based on 25 reviews) | |
Bulk Changes | Based on 23 Fastpath reviews and verified by the G2 Product R&D team. Change users and permissions in bulk | 73% (Based on 23 reviews) | |
Bi-directional Identity Synchronization | Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application 23 reviewers of Fastpath have provided feedback on this feature. | 83% (Based on 23 reviews) |
Governance
Identifies and Alerts for Threats | Alerts administrators when inappropriate access occurs This feature was mentioned in 34 Fastpath reviews. | 84% (Based on 34 reviews) | |
Compliance Audits | Based on 41 Fastpath reviews and verified by the G2 Product R&D team. Proactively audits access rights against policies | 90% (Based on 41 reviews) |
Administration
Reporting | Based on 45 Fastpath reviews and verified by the G2 Product R&D team. Standard and customized report creation to ensure appropriate access rights have been assigned | 88% (Based on 45 reviews) | |
Mobile App | Provides mobile application that alerts administrators of potential issues and allows administrators manage access rights This feature was mentioned in 15 Fastpath reviews. | 64% (Based on 15 reviews) | |
Ease of set up for target systems | Based on 36 Fastpath reviews and verified by the G2 Product R&D team. Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured | 83% (Based on 36 reviews) | |
APIs | Based on 32 Fastpath reviews and verified by the G2 Product R&D team. Provides appropriate application interfaces to enable custom integrations for unique business requirements | 80% (Based on 32 reviews) |
Functionality
User provisioning | Simplifies or automates user provisioning, deprovisioning, and other user role changes. | Not enough data | |
Password manager | Offers password management tools to end users. | Not enough data | |
Single Sign-on | Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts. | Not enough data | |
Enforces policies | Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data. | Not enough data | |
Authentication | Authenticates users prior to granting access to company systems. | Not enough data | |
Multi-factor authentication | Offers multi-factor authentication methods to verify a user's identity. | Not enough data |
Type
On-premises solution | Provides an IAM solution for on-prem systems. | Not enough data | |
Cloud-solution | Provides an IAM solution for cloud-based systems. | Not enough data |
Reporting
Tracking | Tracks user activities across protected systems. | Not enough data | |
Reporting | Provides reporting functionality. | Not enough data |
Workflows - Audit Management
Audit Trail | Displays all the changes made during audits, including details such as username, timestamp, or type of change in a centralized repository. | Not enough data | |
Recommendations | Coordinate and track recommended remediation actions. | Not enough data | |
Collaboration Tools | Facilitates collaboration between teams and stakeholders through shared workspaces. | Not enough data | |
Integrations | Integrates with risk management platforms, GRC tools, and other systems. | Not enough data | |
Planning & Scheduling | Facilitates the creation of audit plans, schedules, and reminders. | Not enough data |
Documentation - Audit Management
Templates & Forms | Provide out of the box audit templates and forms for various processes and industries. | Not enough data | |
Checklists | Provides checklists | Not enough data |
Reporting & Analytics - Audit Management
Dashboard | Dashboard provides real time or near real time updates and notifications in a centralized location. | Not enough data | |
Audit Performance | Provide information on the performance of the audit activities and processes. | Not enough data | |
Industry Compliance | Ensures audits are compliant with industry-specific regulations and standards. | Not enough data |