Ah, man. We feel ya, Gary. You need an approval today, except the admin's OOO. Ugh. Foiled by the Maldives once again. They'll get you every time. You wouldn't design your network with a single point of failure. So why set up your approval workflows that way? Let's not. Some requests are high-risk, but many are not! And when you build approval logic that knows the difference — like, say, within Rippling; just a thought -- you stop setting up blockers and start making progress. P.S. Once again, please pay no attention to that city-wrecking creature flying over the boss' shoulder. That does not concern us.
Rippling IT
IT System Operations and Maintenance
Effortlessly secure and automate identity, access, device, and inventory management in one platform.
About us
Stop juggling different tools for identity, access, device, and inventory management. Rippling brings it all together in one seamlessly unified system— deeply integrated and powered by rich employee data. Automate painful, manual tasks like device setup, access provisioning, and offboarding in just a few clicks. Get complete visibility across users and hardware, close security gaps before they become risks, and do it all without needing to hire more headcount. It’s the fastest path to scalable, secure IT—without the tool sprawl or overhead.
- Website
-
https://www.rippling.com/rippling-it
External link for Rippling IT
- Industry
- IT System Operations and Maintenance
- Company size
- 1,001-5,000 employees
Updates
-
Next week, we're sitting down with Andy Phelps, a customer of ours and the CTO and co-founder of Longevity Consulting. He uses every element of the Rippling IT suite -- Identity & Access, Device Management, and Inventory Management -- to consolidate what used to be a sprawling mess of different SaaS tools. Centralized IT ops helps him manage device deployment, onboarding + offboardings, and compliance audit cycles in one unified platform. So Andy will be going through all that and more with Carter Francis and James Sorrenti, and we'd love to see ya there! Come on down. Wednesday, March 4 @ 3p ET / 12p PT. Register here: https://lnkd.in/e-9t9Zfu
-
-
More awards! Which, as previously established, we love. 🏆 Rippling IT has been ranked one of the Fastest Growing Products on G2 in 2026. Here's why it matters, straight from a customer: 💬 "Rippling IT integrates device management, access, app, and onboarding processes into one system — helping streamline coordination between HR, IT, and operations without compromising security and visibility." – Ashwath S. We're in very good company, and we hope to be in more and more of *your* companies — we're talkin to you, people of LinkedIn! — soon. Honored to be recognized and looking forward to continuing this momentum.
-
-
Rippling IT reposted this
If I automate what I do, then… what will I do? More interesting stuff. I learned earned early in my tech career that automation and documentation are virtues that seem like they could be career killers, but just make you more valuable. I tie those two together, because the first steps of automation are rooted in documentation. You need to do the thing, write how the thing should be done, then if appropriate (or fun) automate it. You get some time back from repetitive tasks and you've locked in a level of consistency. Win win, go do it again. Next week I'll be having a chat with Alec Pesola from Rippling as well as two folks I've followed in the Mac Admins space for some time Nathan Felton and Alan W. (Alan who I'll also be meeting up with in Nashville right after I post this.) Come join us online for: 👨🏻💻 How to Keep Your IT Job While Implementing Automation 🗓️ Wed, Feb. 25th at Noon PST / 3pm EST https://lnkd.in/eunSz6-V
-
Don't let unreliable offboardings foil your master plans. People like Bryan can be a real pain. (Or, well... let's go with *employees* like Bryan, whose species remains undetermined. We'll get back to you.) But they don't have to be! Not when your offboarding workflow is already automated. Device trust keeps everything visible, the departing employee's device can be automatically locked and wiped the moment they leave, and pre-built integrations with Microsoft and Google keep your sensitive data from leaving with them. That's running IT like a mastermind. P.S. Pay no attention to the other individual of indeterminate species hanging out of a helicopter in the first few seconds.
-
Voting closes tomorrow for Expert Insights' 2026 Cybersecurity Community Awards!!! The Best Community Impact award honors the company that's given the most to the broader IT-security community this year, and while we're admittedly biased, we happen to think that's kind of our thing. So, if you agree, take 10 seconds out of your day and cast your vote below. (We're the second one down. Got you.) Vote here: https://lnkd.in/e7iW4mbs
-
-
Rippling IT reposted this
Here at Productiv, we’ve been on a journey for the past couple of years to eliminate manual processes and the productivity loss from clickOps for our internal IT team. For all the same reasons engineering teams build automated pipelines, we wanted to implement streamlined, automated processes for our standard IT workflows, like user onboarding and offboarding, in order to consistently meet our compliance obligations, free up time for our SysAdmins to work on value add projects, and most importantly, promote a high quality end user experience. We needed a technology partner who could integrate with our existing tech stack, help manage the physical overhead of our device inventory, and understand the context of our user base. Enter Rippling IT. What used to take hours per month in data reconciliation, device clean up, and access provisioning now just happens automatically without my IT team having to lift a finger. 14 days out, the device ships. 7 days out, Okta access gets assigned with preconfigured birthright access. They get their laptop, they log in with the temp password they’ve been provided, and their accounts/access are already available. That’s it. It was a pleasure to sit down recently with James Sorrenti and talk through some of the ways Rippling has been able to help us here at Productiv. You can read the whole case study here: https://lnkd.in/ehRVg2VH
-
We love an award. And we especially love a *community* award. That's what makes us so glad to be a nominee in Expert Insights' 2026 Cybersecurity Community Awards. The Best Community Impact award honors a company delivering value to the broader IT-security community, and we'd like to think that describes us pretty dang well. So, if you agree, use the 10 seconds it takes to cast your vote and show us some love. (We're the second ballot down from the top. We got you.) Vote here: https://lnkd.in/e7iW4mbs
-
-
Rippling IT reposted this
Our E-Waste Dropoff Day was one for the books. One last time, huge thanks to everyone in the Bay Area who came out to support and made it such a great community event. Thanks also to our event partners, Mac Admins Foundation & GALIDE, as well as Rippling IT's true wizards of event magic, Devin Williams & Olya Surits, for pulling this whole awesome thing together! Here's a quick recap by the numbers, because of course I asked for the numbers: ♻️ 3,222 lbs of e-waste donated 💻 107 laptops ☕ 200+ espressos 🍵 88 matcha lattes 👕 65 sweatshirts 🛍️ 370 tote bags 🧢 75 hats 🎮 5 Xboxes All 100% good vibes, all 100% #CertifiedDestroyed. (Think we're well past my allotted emoji cap, or I'd throw that one in too. You 💯 know the one.) Thanks again or coming out, and if you're interested in learning more about Rippling IT's Device Buyback program: https://lnkd.in/endDUpqy
-
-
-
-
-
+2
-
-
Every growing company hits the same wall. You start with spreadsheets. Then you add more tools, trying to stay on top of who has access to what. And, of course, you promise you'll do regular reviews to make sure everything's on the straight and narrow. When audit season comes around, the teams that pass with confidence aren't the ones with the best Excel skills. They're the ones who built explicit controls into their access workflows from the jump. Meaning: (1) Role-based access control (2) Automated provisioning and deprovisioning (3) Real-time visibility into who can access what Not because it sounds nice in a deck! Because it's the best way to scale securely. And just for the record, that sounds nice in a deck too. At least we think so. Hear more from Paul here: https://lnkd.in/enzsQ95i