The Admin By Request
Security Blog
Cyber attacks, emerging threats, current events, latest news, recent updates, and more.
Auto-Approval, In Case of Emergency
How to have your (ICE Cream) cake and eat it too.
RDP Exposed (…Literally)
Despite RDP being the number one attack vector used by cyber criminals, the protocol is being adopted increasingly across the globe as teleworking solidifies its place in working culture. If your organization can’t do without it, here’s a few tips on what you can do to keep your systems...
Awake from your PrintNightmare!
Six options to deal with Microsoft’s PrintNightmare KB5005652.
What’s New in Admin By Request 7.1
Learn from the development team what's new in version 7.1 plus the thinking behind each feature.
Combating Common Ransomware Tactics
In the unrelenting battle of the good guys versus cybercriminals, ransomware perpetrators have come out swinging in 2021. This blog investigates the common behaviors of the latest attackers on the scene; what are their tried and tested tactics, and how can you combat them?
What’s In The Box?
Unpack Admin By Request’s Privileged Access Management free plan and discover exactly what you can get your hands on – no strings attached.
Version 7 Feature Review
Joymalya Basu Roy from Atos gives you his take on the new features in version 7 of Admin By Request.
Support Assist Feature Review
Joymalya Basu Roy from Atos shows you everything you need to know about Support Assist.
Admin By Request Review
Using Admin By Request to manage local admin rights on Azure AD-joined Windows 10 devices was a joy, writes Joymalya Basu Roy - MS Intune Architect, Atos.
Don’t Cut Corners While Running LAPS
Microsoft LAPS was released in 2015 with the main purpose of making it more difficult for hackers to spread accross IT networks. This Infosecurity Magazine blog explains how MS LAPS works and how it compares to Admin By Request.
Supporting Critically Ill Children’s Charity
Admin By Request is backing the "Team Rynkeby" cycling team, who raise money for organisations that support children with critical illnesses. Learn how your company can help too.
UAC: The Feature You Love to Hate
Although necessary, the user experience with Window’s User Account Control has never been smooth. Admin By Request adds flexibility to the UAC experience to provide a solution that achieves everything the Microsoft security tool aims for in a comprehensive, user-friendly solution straight out of the box.
What’s New in Admin By Request 7
Learn from the development team what's new in version 7, and the thinking behind the features.
How Much Could You Lose Over a Data Breach?
The 2020 IBM Cost of a Data Breach Report reveals some alarming figures about data breaches. Take the right steps now to avoid your organization suffering a breach and becoming part of the statistics.
Are You Responsible for Losing the Mothership?
It doesn't matter how many high-tech defenses and security systems you have protecting your network – they can all be thwarted if you let hackers slip onto the Mothership via an administrator account.
Integrate Admin By Request with Azure AD & MEM/Intune
How to: Integrate Admin By Request Azure AD and MEM / Intune. A walkthrough by Atos technical architect, Hubert Maslowski.
REvil Ransomware Aims Below the Belt
The latest victim of REvil ransomware is the alcohol parent company of Jack Daniel’s. Learn how Privileged Access Management could counter such attacks and give you the upper hand.
Post-Covid-19 and Remote Working Cyber Attacks
Remote Working Cyber Attacks are a big risk the world will be facing post-Covid-19 pandemic. This blog discusses why you should be concerned and how you can ensure your remote workforce is protected.
Privileged Access Management Made Simple
Admin By Request takes the burden out of implementing a PAM solution and makes the task a quick and easy one. Here's how.
Snake Ransomware Sinks Teeth into Honda and Enel
Industrial companies Honda and Enel were recently attacked by Snake ransomware. Get a breakdown on the malware and see how Admin By Request prevents these attacks out of the box.
The Minimum Cyber Security Requirements
Many countries have set out minimum cyber security requirements that government and other agencies should meet to ensure a common, high level of security. Learn how Admin By Request supports these requirements.
The Light at the End of the Funnel
Admin By Request tackles almost 100% of vulnerabilities within your network by managing local administrator rights and scanning files with 30+ anti-malware engines.
Deploying Hi-Rise Security Compliance to the Home
8 reasons why Admin By Request is the ideal solution to deploy privilege management for the (work from home) masses.
MetaDefender Cloud
This external blog from OPSWAT discusses the integration between Admin By Request PAM solution and OPSWAT's MetaDefender Cloud anti-malware tool.
RobbinHood and His Not-So-Merry Malware
Learn about kernel-based malware and how managing privileged accounts and preventing privilege escalation combats this threat.
Deadline Approaching? Stay Cool.
Stay on task with a privileged access management solution that puts ease of use at the forefront of its system.
One MetaDefender to Rule Them All
Learn about OPSWAT's MetaDefender anti-virus software and why a single solution is not effective enough to provide adequate cybersecurity.