|Role based workflows|
|Enterprise grade security|
Our company uses Form Approvals for requisitions. Our process is complicated, but the add-on has converted it into a workflow that is transparent, flexible and secure. I particularly like the improved version whereby each layer's scope (recommend, edit or approve or simply gets cc-ed) can be set. Support is also always available and prompt.
Esmond Han Head of Business Transformation, Agritrade Resources Ltd
We previously had many problems with our payment requests because even when we used Google Forms, the approval process was slow and inefficient. We looked for different solutions and Form Approvals was the easiest and most affordable. The embedded "approve/deny" option in email notifications is fast and simple to use.
José Rubén Martínez Director of Technology and Operations, unete.org
We previously used Sharepoint and a few other methods (for Leave Management and Professional Development processes), but I continue to be shocked at the usability and simplicity of this add-on. It is highly configurable, yet so simple. The customer service is also extremely reliable.
Aznan Nagor Head of Technologies Unit, The International School of Penang
Gone are the days of bespoke and expensive workflow tools, Form Approvals provides you with a highly configurable workflow framework, allowing you to automate any process requiring approval. Common use cases are:
Establish governance around requests for personal development. Allow managers to approve / reject then set the add-on to automatically notify the requestor once approved.
Capture time off requests, allowing managers to plan team resource by approving / rejecting accordingly. Set up the add-on to, if approved, automatically send request information to Payroll.
Provide management visibility into business expense reimbursement requests, allowing them to approve / reject. Set up the add-on to send request information to Payroll for reimbursement.
Establish governance over the use of cloud software. Set the add-on to route to the requestor's manager, IT Security and other teams for approval before permitting use in your organization.