EN

Australia (EN)

Canada (EN)

Canada (FR)

France (FR)

Germany (DE)

Ireland (EN)

United Kingdom (EN)

United States (EN)

EN

Australia (EN)

Canada (EN)

Canada (FR)

France (FR)

Germany (DE)

Ireland (EN)

United Kingdom (EN)

United States (EN)

Gain total visibility over your users and devices in one place

Get the full picture of your devices and users, stay on top of security requirements and prove SOC 2 compliance — all from one command centre.

IT Devices Dashboard enUS

The source of truth for all user and device data

Quickly check the status of your security posture, users and devices — all from one place. No more hopping between systems to piece together reports or audits.

Empower leaders without sacrificing security

Automatically assign the appropriate level of access with role-based permissions.

HR Admin profile card showing visibility level dropdown menu set to “Partial” with an eye icon indicator.
Set role-based permissions

If a user’s role changes, so too does their access. This ensures they have what they need while keeping data secure.

Computer inventory report settings panel with read-only toggle off and unrestricted access toggle on
Specify access to reports

Rippling allows for flexible access so users can share reports based on role or choose to give viewers unrestricted access.

Get more from your data with intuitive tools

Rippling's point-and-click interface empowers you to create insightful reports from data across your entire organisation.

Dynamic visuals

Choose from an array of visual display options like bubble charts, line graphs, scatter plots and more.

Pivot tables

Summarise and analyse large amounts of data into an interactive table to better conduct analysis.

Formula fields

Automatically calculate a value based on other fields, records or formulas to get more out of your data.

FAQs

Rippling offers several types of reports out of the box, including “joined reports” that allow users to create reports leveraging any field across any app, “custom reports” with flexibility to analyse almost any data tracked within Rippling and “advanced reports” that consist of multiple data modules or report formulas.

Data in Rippling is shared securely using access-controlled methods such as creating time-limited and access-controlled URL links and using secure platforms like Jira, Salesforce or Google Drive for sharing customer data. Additionally, Rippling emphasises the importance of marking documents as “CONFIDENTIAL” and implementing access controls to ensure only those with a need-to-know can access sensitive information. Furthermore, Rippling has established a Data Perimeter project to secure data movement across all touchpoints, ensuring that only trusted identities access secure resources from specified networks.

In Rippling, the ability to run reports is generally available to employees who have been granted access through configurable field-level permissions. This allows a greater number of employees to “create workflows, run reports, etc.” by increasing the proportion of employees with access to other people’s data in Rippling.

See Rippling IT in action

See how Rippling IT can help you manage your identity, devices and inventory in one platform.