The Admin By Request

Security Blog

Cyber attacks, emerging threats, current events, latest news, recent updates, and more.

Data & Compliance: Ticking All Boxes

In today’s landscape of ever-increasing threats to privacy, cybersecurity tools need to be effective at solving the problem they’re designed for. But there is a second key question to be answered when considering a new cybersecurity product for your organization – is it compliant?

macOS Client

Admin By Request Version 3.2 for macOS is here, bringing you a stack of our staple Admin By Request core features previously only available to Windows users.

Secure By Design Part 2

In this blog, PowerON's Steve Beaumont continues his delve into Admin By Request Privilege Access Management (PAM) solution, this time focusing on sub-settings, application elevation tools, and auditing capabilities.

Dear Hacker, Better Luck Next Time

There's no denying that hackers are good. We see this reflected in the frequent cyberattack stories that populate the news channels almost daily - most recently, the Lapsus$ attack on Okta. What we don't hear so much about? That Privileged Access Management software is better.

Secure By Design Series – Part 1

In this blog, PowerON Steve Beaumont weighs up the options available when it comes to managing local admin rights: the pros and cons of manually addressing the issue internally vs. implementing a Privielged Access Management (PAM) solution to do it for you.

ServiceNow Integration

Admin By Request now offers a fully integrated application available on the ServiceNow platform, giving you and your users access to our core security features. Here's the what, why, and how of our ServiceNow integration.

Catching Up With CoolUnite

The CoolUnite Foundation improves the lives of terminally ill and vulnerable children by collaborating with a range of organizations that provide support for them and their families. Here’s what they’re getting up to at the moment – and how you can get involved.