Welcome to our new website. We’ve updated the layout, so if you have not logged in before, the ‘Sign In’ link has been replaced by the ‘Login’ button in the top menu. If you are logged in already or didn’t sign out last time you were here, the link to go to back to the portal will appear as . If you have problems logging in, please contact us here.

Local Admin Rights, Managed.

Eliminate Local Admin Rights.

Full control at your fingertips.

Why Choose Us?

A high-level look at the what, why, and how

App Elevation

Elevate applications without elevating the user

Break Glass / LAPS

Provision temporary local admin accounts

Malware Detection

Multi-scanning with over 35 engines

Endpoint MFA/SSO

Enforce business rules with MFA and SSO prior to elevation

AI Approval

Allow our AI engine to auto-approve requests for elevation

Machine Learning

Allow auto-approvals after a set number of manual approvals

GDPR Compliance

Ensuring all sensitive data is protected

Get started with the free plan

Our Customers

Trusted by Global Leaders

''We use Admin By Request to manage local admin rights at Atos on more than 100.000 endpoints in 60 countries. We would definitely recommend Admin By Request to any organization looking to solve the local admin rights problem.''

Product Explainer Video

Bridge the Gap

Between security and user productivity.

Play Video

Admin By Request Milestones

1 K+
Happy Customers
1 K+
Malware Preventions
1 M+
Managed endpoints
1 +
Countries

Latest News

Formula 1 Sponsorship

Admin By Request is the proud sponsor of American F1 team MoneyGram HAAS driver, Kevin Magnussen.

Take control of your local admin accounts

Revoke without the revolt

Poeple we've helped

Here's what they're saying

Numbers at a Glance

1 %
Of data breaches and cyber security incidents are preventable
1 %
Of cyber attacks are aimed at small & midsize businesses (SMBs)
1 %
Of SMBs are adequately prepared to defend themselves from a cyber attack
1 %
Is the expected CAGR of the PAM solutions market from 2022 to 2026

The Problem

Employee workstations are one of the most vulnerable parts of your company’s IT system.

Lack of Security

Your employees' workstations can be easily compromised if a user with Local Admin Rights runs an executable that contains malware.

Compromised Network

The Network security of your company can be compromised by an attacker to steal data, financials, and IP if just one compromised user is operating with unrestricted local admin rights.

Disrupted Productivity

Removing Local Admin Rights from managed endpoints mitigates critical vulnerabilities but prevents users from running every-day, trusted tasks that require privilege elevation.

Impacted Performance

The lack of Just-In-Time Privileged Access Management (PAM) can lead to a decline in staff productivity, impacting on the company’s overall performance.

The Solution

Web3-02.png

Gain Admin Rights Compliance

With rapid provisioning of Just-In-Time privilege elevation across your entire workforce. On-board and manage workstations and servers via a user-friendly portal.

Web3-01.png

Monitor and Audit Behavior

To reveal risky users and assets through thread and behavioral analytics to identify malicious software and prevent data breaches and malware attacks.

Web3-03.png

Enhance User Productivity

By elevating applications - not users. Delegate privileges based on the user or groups to save time and monetary resources.

See it in action

Core Features

Ways to Elevate

Run as Admin

Elevate a single application.

Break Glass / LAPS

Provision temporary / emergency local admin accounts.

Machine Learning

Create Pre-Approved lists as employees use the software.

Admin Session

Gain admin rights for a period of time.

Pre Approvals

Decide which programs are safe and allow elevations for them ahead of time.

AI Approvals

Let our Artificial Intelligence engine decide what's safe for auto-approval.

All Key Features

Available on Mobile

Dashboard

Provides a summary of your subscription, usage, recent activity, clients, and recently installed software.

Auditlog

Records details from all elevated sessions, including the user who initiated, reason for elevation, programs executed, and software installed.

Requests

Displays all requests for elevated privileges that are pending approval, with the option to approve or deny these requests from your mobile device.

Inventory

Lists the hardware and software details for all devices that have Admin By Request deployed, including disk space, location, and software versions.

Improve your Workflow

Integrate

Admin By Request

With your favourite software tools.

Get Protected

Sign up for our Free Plan

No strings attached.

Our free, lifetime subscription comes with all core features and is available for up to 25 endpoints, on Windows, macOS, and Linux.
Fill out the form with your work email and we’ll send your login credentials straight to your inbox.

Stay Up To Date

Cybersecurity Blog

Problem | Solution | Implementation

Case Studies

Atlantic Technological University
The Atlantic Technological University (ATU) is the learning place of over 22,000 students, offering almost 600 academic programs from pre-degree to doctoral level. Their mission is to advance economic, social, and environmental sustainability through education and engagement, producing graduates who are innovative, confident, and capable of leading the development of the region and beyond.
ADVA
With a team of 2000 spread across the globe, ADVA Optical Networking SE is a technology leader and the architects of some of the world's most advanced networks. Their goal since establishment in 1994 is to provide scalable solutions for transporting data, to meet increasing bandwidth demands and the needs of their customers.
Afa Insurance
Owned by Sweden’s labor market parties, Afa Insurance provides comprehensive cover for employees within the private sector, municipalities, and county councils. Today, more than 4.9 million people are covered by at least one of Afa’s insurances.

Newsletter Sign-Up

Join our Mailing List

And be the first to know about latest updates, recent cybersecurity blogs, upcoming events, and more.