Swif Features
What are the features of Swif?
User on/off Boarding
- Self Service Access requests
- Smart/Automated Provisioning
- Role Management
- Policy Management
- Access Termination
- Approval Workflows
User Maintenance
- Self Service Password Reset
Administration
- Reporting
Top Rated Swif Alternatives
(6,644)
4.8 out of 5
Visit Website
Sponsored
Swif Categories on G2
Filter for Features
User on/off Boarding
Self Service Access requests | Users can request access to an application and be automatically provisioned if they meet policy requirements This feature was mentioned in 10 Swif reviews. | 100% (Based on 10 reviews) | |
Smart/Automated Provisioning | Automates account/access rights creation, changes and removals for on-premise and cloud apps 10 reviewers of Swif have provided feedback on this feature. | 100% (Based on 10 reviews) | |
Role Management | As reported in 10 Swif reviews. Establish roles that create a set of authentication rights for each user in the role | 97% (Based on 10 reviews) | |
Policy Management | Enables administrators to create access policies and applies policy controls throughout request and provisioning processes 10 reviewers of Swif have provided feedback on this feature. | 92% (Based on 10 reviews) | |
Access Termination | Based on 10 Swif reviews. Terminate access to multiple applications based on dates | 97% (Based on 10 reviews) | |
Approval Workflows | Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow 10 reviewers of Swif have provided feedback on this feature. | 97% (Based on 10 reviews) |
User Maintenance
Self Service Password Reset | Enables users to reset passwords without administrator interaction. Enforces password policies when resetting. 10 reviewers of Swif have provided feedback on this feature. | 98% (Based on 10 reviews) | |
Bulk Changes | Change users and permissions in bulk | Not enough data | |
Bi-directional Identity Synchronization | Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application | Not enough data |
Governance
Identifies and Alerts for Threats | Alerts administrators when inappropriate access occurs | Not enough data | |
Compliance Audits | Proactively audits access rights against policies | Not enough data |
Administration
Reporting | Standard and customized report creation to ensure appropriate access rights have been assigned 10 reviewers of Swif have provided feedback on this feature. | 97% (Based on 10 reviews) | |
Mobile App | Provides mobile application that alerts administrators of potential issues and allows administrators manage access rights | Not enough data | |
Ease of set up for target systems | Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured | Not enough data | |
APIs | Provides appropriate application interfaces to enable custom integrations for unique business requirements | Not enough data |
Operating System
Multi-Systems Support | Supports differing operating systems and mobile devices | Not enough data | |
Apple Support | Supports Apple devices | Not enough data | |
Android Support | Support Android devices | Not enough data |
Management
Applicatons Management | Centrally manages, configures, and oversees applications on employees' mobile devices | Not enough data | |
Applications Consolidation | Separates work apps and data from personal apps and data | Not enough data | |
Whitelist | Implements whitelist policy to easily and securely deploy recommended or required applications | Not enough data | |
Blacklist | Implements blacklist policy to block unwanted or suspicious applications | Not enough data | |
Usage Information | Offers visibility into employee mobile device activity | Not enough data | |
Device Enrollment | Registers employee-owned or company-distributed devices for IT access. | Not enough data | |
Device Configuration | Configures devices to seamlessly work with business-required applications, WiFi, VPN, etc. | Not enough data | |
Device Compliance | Ensures that employee devices are compliant with business regulations and requirements. | Not enough data | |
Usage Information | Offers visibility into employee device activity. | Not enough data | |
Data Separation | Separates personal data on devices from business-specific data. | Not enough data |
Security
Remote Wipe | Enable the remote locking down and encryption of employee mobile devices | Not enough data | |
Security | Protects employee, company, and data from potential vulnerabilities or malware | Not enough data | |
Reporting and Alerts | Creates custom reports and alerts about security updates, existing or upcoming software licenses, data access, and more. | Not enough data | |
Endpoint Protection | Protects employee, company, and data from potential vulnerabilities or malware. | Not enough data | |
Remote Wiping | Remotely clears all data from compromised devices. | Not enough data |
Platform - Mobile Device Management (MDM)
Regulation Compliant | Ensures that employees mobile devices are compliant with business regulations and requirements | Not enough data |
Scope
Endpoint Inclusiveness | Manages numerous endpoint types, including mobile, desktop, IoT, and wearable. | Not enough data | |
Multi-OS Support | Supports diverse operating systems across several endpoint types. | Not enough data |