The Admin By Request
Security Blog
Cyber attacks, emerging threats, current events, latest news, recent updates, and more.
UAC: The Feature You Love to Hate
Although necessary, the user experience with Window’s User Account Control has never been smooth. Admin By Request adds flexibility to the UAC experience to provide a solution that achieves everything the Microsoft security tool aims for in a comprehensive, user-friendly solution straight out of the box.
What’s New in Admin By Request 7
Learn from the development team what's new in version 7, and the thinking behind the features.
How Much Could You Lose Over a Data Breach?
The 2020 IBM Cost of a Data Breach Report reveals some alarming figures about data breaches. Take the right steps now to avoid your organization suffering a breach and becoming part of the statistics.
Are You Responsible for Losing the Mothership?
It doesn't matter how many high-tech defenses and security systems you have protecting your network – they can all be thwarted if you let hackers slip onto the Mothership via an administrator account.
Integrate Admin By Request with Azure AD & MEM/Intune
How to: Integrate Admin By Request Azure AD and MEM / Intune. A walkthrough by Atos technical architect, Hubert Maslowski.
REvil Ransomware Aims Below the Belt
The latest victim of REvil ransomware is the alcohol parent company of Jack Daniel’s. Learn how Privileged Access Management could counter such attacks and give you the upper hand.
Post-Covid-19 and Remote Working Cyber Attacks
Remote Working Cyber Attacks are a big risk the world will be facing post-Covid-19 pandemic. This blog discusses why you should be concerned and how you can ensure your remote workforce is protected.
Privileged Access Management Made Simple
Admin By Request takes the burden out of implementing a PAM solution and makes the task a quick and easy one. Here's how.
Snake Ransomware Sinks Teeth into Honda and Enel
Industrial companies Honda and Enel were recently attacked by Snake ransomware. Get a breakdown on the malware and see how Admin By Request prevents these attacks out of the box.
The Minimum Cyber Security Requirements
Many countries have set out minimum cyber security requirements that government and other agencies should meet to ensure a common, high level of security. Learn how Admin By Request supports these requirements.
The Light at the End of the Funnel
Admin By Request tackles almost 100% of vulnerabilities within your network by managing local administrator rights and scanning files with 30+ anti-malware engines.
Deploying Hi-Rise Security Compliance to the Home
8 reasons why Admin By Request is the ideal solution to deploy privilege management for the (work from home) masses.
MetaDefender Cloud
This external blog from OPSWAT discusses the integration between Admin By Request PAM solution and OPSWAT's MetaDefender Cloud anti-malware tool.
RobbinHood and His Not-So-Merry Malware
Learn about kernel-based malware and how managing privileged accounts and preventing privilege escalation combats this threat.
Deadline Approaching? Stay Cool.
Stay on task with a privileged access management solution that puts ease of use at the forefront of its system.
One MetaDefender to Rule Them All
Learn about OPSWAT's MetaDefender anti-virus software and why a single solution is not effective enough to provide adequate cybersecurity.
How-to: Use PowerShell to Query Admin By Request
A step-by-step guide on how use Windows PowerShell to test functionality and get data from Admin By Request.
Admin By Request makes TeamViewer a Team Do-er
How sealing the Apple Mac compliance 'air gap' also prevents Team-viewer remote support sessions from going pear shaped.
Local Admin Rights Elevation, Served Three Ways!
A privilege management taster explaining our three main elevation modes, and the scenarios to use them.
Local Admin: How to Revoke Without the Revolt
The unique killer feature that ensures your rights revocation project runs without rebellion - only with Admin By Request.
Sub Settings And Portal User Scopes Put To Work
Zero in on how using sub-settings and departmental delegation helps torpedo time wasting rights elevation help-desk support tickets.
Cyber Privilege Access Management in No Time
How Admin By Request enables you to comply with UK Cyber Essentials privilege management requirements.