The Admin By Request
Security Blog
Cyber attacks, emerging threats, current events, latest news, recent updates, and more.
Feature Focus: The macOS & Linux Client User Interfaces
Dive into the details of the Admin By Request macOS & Linux Client interfaces - the first thing your end users will see and interact with after installation.
The 10 Biggest Ransomware Payouts of the 21st Century
Step into the high-stakes world of 21st-century cyber warfare, where ransomware attacks have evolved into a digital menace haunting organizations across the spectrum. Picture this: your valuable data held hostage, encrypted into a digital puzzle, and the only way out is a hefty ransom.
Webinar: Introduction to Remote Access
Join Jeff Jones as he takes you on a guided tour of our latest cybersecurity feature: Secure Remote Access, available with Admin By Request Server Edition.
Healthcare Under Siege: 100 Hospitals Hit Amid Rising Attacks
Recent ransomware attacks on hospitals in Romania highlight the urgent need for healthcare organizations worldwide to strengthen their cybersecurity posture. With patient data at risk, proactive defense strategies are vital to safeguarding critical healthcare services.
Feature Focus: The Windows Client Interface
Dive into the details of the Admin By Request Windows Client interface - the first thing your end users will see and interact with after installation.
PAM for Dummies: What is Privileged Access Management?
Dive into the acronym-filled world of cybersecurity, where PAM (Privileged Access Management) takes center stage. In this blog, we demystify PAM – what it is, how it works, and why it's crucial in the ever-evolving landscape of cybersecurity.
VPN Vulnerabilities Exposed: Rethinking Remote Access
Explore the vulnerabilities exposed by the Ivanti VPN incident and discover why Admin By Request's Remote Access offers a superior alternative in the era of remote work.
Admin By Request Named FrontRunner
Admin By Request has been recognized in Software Advice's 2023 FrontRunner’s Report thanks to its Machine Learning capabilities.
Remote Access is Here
It’s official… 𝗦𝗲𝗰𝘂𝗿𝗲 𝗥𝗲𝗺𝗼𝘁𝗲 𝗔𝗰𝗰𝗲𝘀𝘀 𝗵𝗮𝘀 𝗮𝗿𝗿𝗶𝘃𝗲𝗱 to the Admin By Request product suite! 🛡️🖥️🔒 That’s right: you can now leverage familiar Admin By Request approval flows and features to enable secure, browser-based connections to your servers. Remote Access is a feature-rich addition to Admin By Request Server Edition which eliminates the need...
Local Admin Rights: The Nitro Boost of IT
In IT, 'Nitro Boost' equates to local admin rights, offering a swift digital pace. Yet, like motorsports, it poses risks. EPAM emerges as a solution, ensuring security without compromising efficiency.
Decoding Local Admin Rights: An Everyday Comparison
Think of local admin rights as like having keys to your house, or a keycard to a restricted area in your establishment – just like a regular set of keys, local admin rights provide access and control.
Best Value & Ease of Use 2023
Admin By Request has received the 2023 Best Ease of Use and Best Value badges from Gartner via verified reviewers on Capterra.
Linux users: it’s your time.
Ensure every endpoint in a mixed IT environment is covered by a single comprehensive Privileged Access Management tool with our latest release for Linux.
How do we use ChatGPT?
With our latest integration, the web-scraping capabilities of ChatGPT are available to administrators from within the Admin Portal.
Webinar: Air-Tight Security on Linux
The key to a minimized attack surface is strengthening all weak points in your IT environment - and it's not just Windows and macOS devices that need protecting.
CISA’s Cybersecurity Strengthening Campaign
Every organization - large and small - should adopt a heightened posture when it comes to cybersecurity and protect their most critical assets against disruptive cyber incidents.
Admin Person 1 of 5: The ‘Pop’
A disruptive scenario of high volume, unpredictability, and urgency - here's how it can play out with and without Admin By Request.
macOS 4.0 is Live.
Admin By Request Version 4.0 for macOS is here, adding new and improved core features including application Pre-Approval and Run as Admin. Download it today and kick the year off with comprehensive cybersecurity across all operating systems.
Privileged Access Management Just Got Personal.
The terms ‘use case’ or ‘usage scenario’ are cold and soulless words and not a good representation of the type of work we do here. Introducing ‘Usage Persona’: a more human approach to use case scenarios.
Intune
Our latest integration to join the Integration Hub is Microsoft Intune. With this simple feature you can now block elevations on devices that are not compliant with your existing Intune policies.
Endpoint MFA/SSO
Multi-Factor Authentication on the endpoint is quickly becoming a must-have for enterprises who value security and have compliance regulations to adhere to. So far MFA has been largely unavailable as a feature of existing PAM solutions - that's about to change with Admin By request version 8.0.
Machine Learning
Instead of Pre-Approving a huge number of applications ahead of time, let the system build the list for you - as the applications are being used. Reduce your manual approval workload considerably with the latest feature coming with Admin By Request version 8.0.
AI Approval
Forget spending extensive amounts of time creating manual pre-approved lists - with the new Admin By Request AI Approval feature, you can allow our Artificial Intelligence engine to decide which applications are safe to be auto-approved for you.
Venus Ransomware Hits Healthcare
Initial infection via RDP, killing 39 processes, deleting event logs, then encryption - but all stages of the Venus ransomware attack can be prevented with the right tools.
Looking to get ISO Certified? We Can Help.
ISO certification is a mammoth process, but adopting an effective Privileged Access Management solution is a cost-effect and sure-fire way to tick off a number of controls and help get you over the line – while also providing comprehensive security for your entire enterprise.
ISO 27001: Certified
You've seen it before, but what does it actually entail? In a nutshell: security, sustainability, and continually improved products and services. Admin By Request is now ISO certified, and this is how it benefits your enterprise.
Data & Compliance: Ticking All Boxes
In today’s landscape of ever-increasing threats to privacy, cybersecurity tools need to be effective at solving the problem they’re designed for. But there is a second key question to be answered when considering a new cybersecurity product for your organization – is it compliant?
Splunk Integration
Get Auditlog data sent in real-time from your User Portal to your Splunk environment to be indexed, structured, analyzed, and searched for your way.
Teams Integration
Your users can now use Teams for more than just communication; they can approve or deny Requests for administrative access via a dedicated Teams channel.
Power BI Integration
You can now keep track of Events with our custom-built Power BI template - for customers who use data visualization as part of their business and security strategy.
macOS Client
Admin By Request Version 3.2 for macOS is here, bringing you a stack of our staple Admin By Request core features previously only available to Windows users.
Slack Integration
Access our staple Admin By Request feature and handle requests for privileged access within your existing company communication tool: Slack.
Microsoft Sentinel Integration
Add another layer of enterprise security with our latest integration: send Auditlog data from your User Portal to your Microsoft Sentinel setup.
New Feature Spotlight: Device Owner
Lots of devices with a multitude of users causing security concerns? You can now set a Device Owner for each device, and lockdown the endpoint to that specific user with our latest Windows feature.
New Feature Spotlight: Break Glass Account
The new feature designed to eliminate the need for Microsoft LAPS.
Secure By Design Part 2
In this blog, PowerON's Steve Beaumont continues his delve into Admin By Request Privilege Access Management (PAM) solution, this time focusing on sub-settings, application elevation tools, and auditing capabilities.
Dear Hacker, Better Luck Next Time
There's no denying that hackers are good. We see this reflected in the frequent cyberattack stories that populate the news channels almost daily - most recently, the Lapsus$ attack on Okta. What we don't hear so much about? That Privileged Access Management software is better.
Revoke: No Big Deal, No Big Squeal
Adopting a less ‘pig-headed’ approach to removing Local Admin rights from staff will always return happier project outcomes.
Ransomware Comes A’Marching
March is almost upon us, and at the rate we’re going, so is another year of ransomware prevailing. Here’s an update on the ransomware scene so far in 2022 – and some predictions for where it’s headed in the future.
LAPS for Autopilot Device
This blog by Simon Hartman Eriksen shares his experience with the LAPS-replacement feature - currently available on Windows andmacOS, and coming soon to Linux.