Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Entitle integrates a security-centric strategy for provisioning and governance while also prioritizing business facilitation across all departments, including R&D, sales, HR, and finance. Accelerate the provisioning process to enable security policies that adapt automatically to the evolving infrastructure and the varying needs of employees. Assign permissions to designated resources such as Google Drive directories, database tables, Git repositories, and more to maintain control. Protect sensitive resources and roles by allowing access only when necessary and revoking it when it is no longer needed. Empower colleagues, managers, and resource owners to authorize access requests, ensuring that the permissions granted are reliable. With automated access requests and a zero-touch provisioning approach, DevOps, IT, and other teams can significantly enhance efficiency and resource management. Users have the convenience of requesting access through platforms like Slack, Teams, Jira, or email, facilitating a smooth approval experience. Additionally, quickly grant bulk permissions to streamline the onboarding and offboarding processes, effectively adapting to the dynamics of the organization. This comprehensive approach not only safeguards data but also fosters a collaborative environment where teams can thrive.
Description
Phonism was designed to streamline the intricate landscape of the current VoIP market. With a single, cohesive interface, you can easily set up and provision all of your VoIP devices. Forget the tedious process of manually editing configuration files or navigating through various device Web GUIs. You can configure lines, busy lamp fields (BLF), soft keys, side carts, and more without ever needing to touch a text editor! If you require additional customization, our Custom Config feature provides access to raw configuration options when needed. The Visual Button Manager simplifies device key customization, allowing users to effortlessly adapt their devices using a drag-and-drop tool without requiring a technician or an on-site visit. Additionally, Phonism’s Templates empower administrators to apply common settings through an intuitive interface. These Templates can be easily implemented on individual devices or across an entire network deployment. If you need to switch voice servers, just update the voice server address in your Template, and every device’s configuration will be automatically refreshed, ensuring seamless operations. This innovative approach significantly reduces the time and effort involved in managing VoIP devices.
API Access
Has API
API Access
Has API
Integrations
Datadog
Docusign
Dropbox
GitLab
Google Cloud BigQuery
Google Kubernetes Engine (GKE)
Greenhouse
HubSpot CRM
Intercom
Jira
Integrations
Datadog
Docusign
Dropbox
GitLab
Google Cloud BigQuery
Google Kubernetes Engine (GKE)
Greenhouse
HubSpot CRM
Intercom
Jira
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$200 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
BeyondTrust
Founded
1985
Country
United States
Website
www.entitle.io
Vendor Details
Company Name
Phonism
Founded
2012
Country
United States
Website
phonism.com/provisioning
Product Features
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
User Provisioning and Governance
Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service
Product Features
User Provisioning and Governance
Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service