The Admin By Request
Security Blog
Cyber attacks, emerging threats, current events, latest news, recent updates, and more.
Data & Compliance: Ticking All Boxes
In today’s landscape of ever-increasing threats to privacy, cybersecurity tools need to be effective at solving the problem they’re designed for. But there is a second key question to be answered when considering a new cybersecurity product for your organization – is it compliant?
Splunk Integration
Get Auditlog data sent in real-time from your User Portal to your Splunk environment to be indexed, structured, analyzed, and searched for your way.
Teams Integration
Your users can now use Teams for more than just communication; they can approve or deny Requests for administrative access via a dedicated Teams channel.
Power BI Integration
You can now keep track of Events with our custom-built Power BI template - for customers who use data visualization as part of their business and security strategy.
macOS Client
Admin By Request Version 3.2 for macOS is here, bringing you a stack of our staple Admin By Request core features previously only available to Windows users.
Slack Integration
Access our staple Admin By Request feature and handle requests for privileged access within your existing company communication tool: Slack.
Microsoft Sentinel Integration
Add another layer of enterprise security with our latest integration: send Auditlog data from your User Portal to your Microsoft Sentinel setup.
New Feature Spotlight: Device Owner
Lots of devices with a multitude of users causing security concerns? You can now set a Device Owner for each device, and lockdown the endpoint to that specific user with our latest Windows feature.
New Feature Spotlight: Break Glass Account
The new feature designed to eliminate the need for Microsoft LAPS.
Secure By Design Part 2
In this blog, PowerON's Steve Beaumont continues his delve into Admin By Request Privilege Access Management (PAM) solution, this time focusing on sub-settings, application elevation tools, and auditing capabilities.
Dear Hacker, Better Luck Next Time
There's no denying that hackers are good. We see this reflected in the frequent cyberattack stories that populate the news channels almost daily - most recently, the Lapsus$ attack on Okta. What we don't hear so much about? That Privileged Access Management software is better.
Revoke: No Big Deal, No Big Squeal
Adopting a less ‘pig-headed’ approach to removing Local Admin rights from staff will always return happier project outcomes.
Ransomware Comes A’Marching
March is almost upon us, and at the rate we’re going, so is another year of ransomware prevailing. Here’s an update on the ransomware scene so far in 2022 – and some predictions for where it’s headed in the future.
LAPS for Autopilot Device
This blog by Simon Hartman Eriksen shares his experience with the LAPS-replacement feature - currently available on Windows andmacOS, and coming soon to Linux.
LAPS vs. Break Glass: You Be the Judge
MS LAPS is a necessity and, like most necessities, only covers the bare minimum. That’s why we decided to take the necessary parts of LAPS and turn them into something much cooler. But hey - we’ll let you be the judge.
Adapting to the Threat Landscape in 2022
The whole world has been left vulnerable amid the global Coronavirus pandemic, but at the same time there’s been a cybersecurity pandemic raging, with ransomware payouts repeatedly surpassing the $2 million mark. Safe to say, the two very different things are likely related.
New Feature Spotlight: Clean Up Local Admins
This feature makes the job of tidying up your rogue - and potentially dangerous - local admin accounts easy.
Secure By Design Series – Part 1
In this blog, PowerON Steve Beaumont weighs up the options available when it comes to managing local admin rights: the pros and cons of manually addressing the issue internally vs. implementing a Privielged Access Management (PAM) solution to do it for you.
New Year, New Plan: Secure Your Endpoint
The disrupted past few years have made it very difficult to plan ahead. But valuable lessons learnt throughout 2020 and 2021 can be applied to help us plan for 2022 – not least, lessons on cybersecurity.
New Feature Spotlight: Break Glass Account
The new feature designed to eliminate the need for Microsoft LAPS.
Time Flies When You’re Getting Hacked
In 2021 it took organizations an average of 212 days to discover a data breach - that’s a long time compared to the 24-48 hours it takes a hacker to compromise domain admin once they’ve gained initial access to your system. Here’s how to disrupt the attack timeline so...
ServiceNow Integration
Admin By Request now offers a fully integrated application available on the ServiceNow platform, giving you and your users access to our core security features. Here's the what, why, and how of our ServiceNow integration.
Linux Client
Admin By Request's Privileged Access Management solution now supports Linux.
Catching Up With CoolUnite
The CoolUnite Foundation improves the lives of terminally ill and vulnerable children by collaborating with a range of organizations that provide support for them and their families. Here’s what they’re getting up to at the moment – and how you can get involved.
SCIM Integration
Admin By Request now supports SCIM integration. Here's what our implementation of the standard offers, and what you need to do to get it set up.
It’s Time to Take macOS Security Seriously
Despite contrary belief, security is a big problem for the modern Mac operating system. Admin By Request’s cross-platform solution can help you address this problem and get your Apples under control.
Auto-Approval, In Case of Emergency
How to have your (ICE Cream) cake and eat it too.