We attended the Gartner Identity and Access Management Summit in Texas for the first time last year. The conversations with security and IT teams, the interest in what we’re building, the feedback we got: it all confirmed we’re heading in the right direction.
So we’re returning! December 8-10 in Grapevine, just outside Dallas at the Gaylord Texan. We’ll have a booth with live demos, a speaking session on smarter privileged access for leaner operations, and authentic Texas BBQ (because let’s be real – you can’t visit Texas and skip that).
If you’re attending, stop by our booth. We’ve got something worth seeing, and we can show you how privilege management works when you strip away the complexity that bogs down legacy solutions.
Deepening Our Commitment to Gartner
We’ve attended Gartner events in London and last year’s Texas summit, but this year we’ve taken it further – deepening our relationship with Gartner as research clients, working directly with their analysts and fully embedded in their research platform.
“For what we do in our space with Endpoint Privilege Management and Secure Remote Access, the IAM show is perfect for us,” says Ryan Akers, who runs our Americas territory (which also covers the Caribbean, Australia, and New Zealand).
The IAM Summit attracts IT and security teams who are serious about solving privilege and access challenges. Each time we attend, we learn what enterprises actually struggle with. Spoiler: it’s usually dealing with bloated, complicated solutions that take months to deploy and require dedicated teams to maintain.
Why We’re Different from the Big Vendors
Gartner events attract the biggest names in cybersecurity. You’ll see massive booths from vendors who’ve been around for decades, with marketing budgets in the millions.
Ryan worked for Fortune 50 companies before joining us, so he knows exactly what those organizations look like. “What’s amazing about working for Admin By Request is that’s exactly what we’re not. We’re much more nimble and we can respond to customers in a much faster way. The energy in the company and the employees are amazing. The development coming out of our Denmark development hub is fast.”
Our customers often tell us they need something and within months it could be part of the feature set. Try getting that kind of turnaround from a vendor with eighteen approval layers and quarterly release cycles.
The company is growing quickly (both customers and employees), and everyone’s genuinely excited about what we’re building. When you don’t have corporate bureaucracy slowing you down, you can actually fix problems instead of talking about fixing them.

What We’re Showcasing at the Booth
Two products: Admin By Request EPM (our flagship Endpoint Privilege Management solution) and Secure Remote Access (our newest addition to the platform).
Together, they deliver Remote Privileged Access Management (RPAM). You get privilege management on endpoints plus secure remote access, all without VPNs, jump servers, or permanent admin accounts sitting around as targets for attackers.
Secure Remote Access breaks into three components, each solving a specific problem:
- Remote Support – IT teams or end users can initiate screen sharing and control sessions. Either side can start the connection, which kills the “submit a ticket and wait for help desk” bottleneck. When someone needs help, they get it.
 - Unattended Access – Browser-based remote connections to servers and workstations when nobody’s there. After-hours maintenance, managing infrastructure across branch offices, updating systems without disrupting users during business hours. All the scenarios where you need to get in and work without someone present.
 - Vendor Access – Solves the contractor problem. You need to give third-party vendors or consultants access to specific systems, and you definitely don’t want to hand them keys to your entire environment. This lets you control exactly what they can touch and revoke their access instantly when the job’s done.
 
If you’re using our EPM product, the Secure Remote Access client is already installed on your endpoints. Toggle it on in the portal and you’re running (unless you want to run this on your own infrastructure, which is also an option). No new deployment, no additional software package. We built everything into one lightweight client (under 5MB) because nobody wants more bloat in their environment.
“Stop Overloading Your IT Team: Smarter Privileged Access for Leaner Operations”
For CIOs overwhelmed by complex PAM deployments, budget constraints, and user resistance there’s a better way.
That’s the theme of our speaking session and booth this year, presented by Paul Fisher – leading strategist on the future of Privileged Access Management (PAM) and Head of Global Strategy at Admin By Request – and it’s more than ‘marketing talk’ (we promise). It describes how we designed the product from day one.
Traditional PAM solutions demand on-premises infrastructure, extensive configuration, and dedicated teams to maintain them. Enterprises spend tens of thousands (sometimes hundreds of thousands) just getting set up before they can do anything useful.
We built a SaaS-based, cloud-hosted solution. No servers to rack and manage, no appliances to deploy and maintain. Customers push out our client using whatever deployment tools they x`already have (SCCM, Intune, etc.) and get running fast. Most tell us deployment takes hours, measured from start to finish.
“By the time customers license, all the configuration is done,” Ryan explains. “We do all the work before they spend any money with us through pre-sale support.”
The system works whether endpoints are online or offline, on the corporate network or halfway around the world. We don’t require on-premises technology, which matters when you’ve got remote workers everywhere.

Why Simplicity Wins
Ryan’s been in IT since 1997. He’s watched every trend, seen every “revolutionary” product that promised to change everything. The number one complaint he hears is this: Products get bloated, dense, and impossible to actually use.
“I could mention Intune. I could mention something as simple as Microsoft Excel. People use less than 10% of the functionality of Excel. We decided we’d be better off building the 10% that people use every day and making it work phenomenally well.”
That philosophy shows up in customer feedback. When we ask why they chose us over competitors, they consistently say two things: it solved their problem out of the box, and it was easy to use. Not groundbreaking features or endless capabilities. Just solving the actual problem – simply.
The workflow matters too. When end users need privilege elevation, they can submit requests that route to IT teams however those teams want to receive them: portal, email, mobile app, ticketing systems like ServiceNow or Jira, collaboration tools like Teams or Slack. We integrate with the tools you’re already using to make it as painless as possible.
For applications everyone uses that are pre-approved, you can set those to elevate automatically while still logging everything for compliance and auditing. Users don’t wait for approval, IT doesn’t get ticket fatigue, and you still have full visibility into what’s happening.
Passwordless by Design
While other vendors focus on password vaulting, we went a different direction from the beginning. We don’t want privileged accounts sitting around in your environment at all.
“Privileged accounts laying around the organization are bad. It’s a bad security posture, so we won’t even build it in,” Ryan says. “The future is passwordless, not password accounts.”
Bad actors scan for privileged accounts first. Compromise one and they can move laterally, escalate access, and cause real damage. Remove the permanent privileged account entirely and that attack vector disappears.
We deliver just-in-time, passwordless privilege elevation instead. Users get access when they need it for specific applications or time periods, and it goes away when they’re done. Everything’s encrypted, fully logged, and auditable for compliance.
Our system even monitors for admin accounts being added back into the environment. If someone (or something) adds an admin account, we can remove it automatically and alert your team through logs and notifications. Because credential accounts are risks you don’t need.

What to Expect at the Booth
We haven’t been assigned our booth number yet (c’mon Gartner! 😉), but you’ll find us easily; every breakfast and lunch table at the event will have tent cards with our booth location, speaking session details, and a QR code to see everything we’re doing at the summit.
When you stop by, you’ll meet our account executive team. They’re genuinely excited to be there because they don’t get to see customers face to face nearly enough. “You cannot replicate what it’s like to stand face to face with a customer, to have a conversation, to laugh, sometimes even goof around,” Ryan says. “That’s absolutely the number one thing I love about these events.”
You’ll get live demos of both EPM and Secure Remote Access, plus collateral with executive summaries you can take back to your team.
And we’re raffling off a replica F1 helmet from Nico Hulkenberg AT this event! Last year’s Kevin Magnussen helmet was a hit, so we’re keeping the tradition going.
Try It Free Before Spending Anything
This is our actual elevator pitch: use our software in your own environment before spending a dollar with us.
Our Free Plan gives you 25 endpoints with complete functionality, forever. No limited trials, no feature restrictions, no pressure. Prove to yourself that we solve your problems.
“We believe you should use our software full-function without cost and use it in your environment before you spend one dime with us,” Ryan says. “Prove it to yourself that what we do is going to solve the problems you need to solve in your organization.”
The sales team and support team work together to get you configured before you buy, which is backwards from how most vendors operate. Stop by the booth, ask your toughest questions, grab some Texan BBQ, and maybe leave with an F1 helmet and the next big think in passwordless PAM.

				
	
	
	
	