Comprehensive | Secure | Integrated

Secure Remote Access

Navigate the remote work landscape with confidence: leverage familiar approval flows and features to enable secure, browser-based connections to workstations, servers, and network devices, and provide remote support for end users.

Orange admin by request circle tick logo. » admin by request » admin by request

A New Approach to Remote Access

Secure Remote Access by Admin By Request is a cutting-edge SaaS solution that provides a secure, efficient, and integrated approach to remote device management with key benefits including Remote Support and Unattended Access, enhanced security controls, and comprehensive logging and session recording - all integrated into the existing Admin By Request ecosystem.
Whether you're an existing Admin By Request user looking to expand your security toolkit, or a new customer seeking an intuitive, all-encompassing remote access and management solution, Admin By Request Secure Remote is for you.

Let us show you.

Three Core Remote Access & Management Features

Unattended Access

Allows for access to servers, devices, and workstations via standard protocols and can be configured as a cloud service or as an on-premises solution (including agent-less devices).

Remote Support

Offers the ability to initiate screen sharing and control directly between the devices of an IT admin and an end user.

Vendor Access

Allows for external users, such as third-party vendors, to be given secure access to internal devices via an external portal.

Leadership Insights

CEO & Director discuss the product, vision, impact, and more.

Enhanced Security Controls

Multi-Factor Authentication
Only authorized personnel who authenticate with MFA can initiate remote sessions, adding an essential layer of security.
Request-Based Access
Remote access is granted only after a user request is approved by an IT admin, reducing the risk of unauthorized connections.
Just-In-Time Connectivity
Connections are established only when needed and are securely terminated after each session, eliminating persistent access points that could be exploited.

Integrated into the Admin By Request Ecosystem

Secure Remote Access is fully integrated into the existing Admin By Request platform. This integration allows for the creation of tailored security profiles, ensuring that remote access is as secure as other elements of your IT infrastructure. Activation of this feature is seamless, requiring no additional deployment if the Admin By Request client is already installed.

Comprehensive Audit Logging & Session Recording

Every remote session is fully logged and recorded, providing a transparent and complete audit trail. This ensures compliance with regulatory requirements and supports accountability by enabling detailed reviews of all remote activities.

No Proprietary Software Required

Remote sessions can be conducted directly through a standard web browser, reducing the complexity of installation and ensuring broad compatibility across devices. The existing client from our Endpoint Privilege Management (EPM) solution is all that is needed on the end-user’s device, making the activation process straightforward and maintenance-free

Get started

Secure Remote Access

Executive Summary

Admin by request secure remote access executive summary page 1 » admin by request » admin by request
Admin by request secure remote access executive summary page 2 » admin by request » admin by request

Includes Core Workstation Features:

Auditlog

Track all privileged activity on servers

Inventory

Gather all details about devices in your network

Sub-Settings

Create granular access controls

Auto-Approval

Allow auto-approval of requests for elevation

Endpoint MFA/SSO

Enforce business rules with MFA and SSO

Integrations

Teams, Slack, Splunk, Sentinel, Intune, and more

Feature Highlight

Unattended Access

Animated graphic from admin by request remote access feature explainer video illustrating other remote access solutions are cumbersome to configure. » admin by request » admin by request

The Need:

Complex IT environments require secure user access to servers and network endpoints.

Current solutions such as VPNs or jump servers pose efficiency and security challenges.

Exposing protocols like RDP and SSH to the internet for remote access is not secure.

Tracking user activity during remote sessions is difficult with existing methods.

Setting up and using current products on the market is often cumbersome and requires re-learning.

The Solution

Just-In-Time Access
Secure Remote Access is built on the principles of Just-in-time (JIT) access where the necessary connections and access is provided on a just-in-time, as needed basis.
Secure Access Principles
Built on secure access principles, Secure Remote Access ensures the security of remote connections while providing convenient, efficient, and immediate access to internal assets.
Flexible Deployment Options
Available as a fully managed or on-premises setup, Secure Remote Access offers flexibility in deployment to suit the needs of different organizations.
Comprehensive Auditing
All remote sessions facilitated by Admin By Request Secure Remote Access are audited and video-recorded, providing comprehensive visibility and security.
User-Friendly Design
Designed with user-friendliness in mind, Secure Remote integrates seamlessly into the Admin By Request web Portal, offering a familiar interface and straightforward usability.
» admin by request » admin by request
Play Video about Thumbnail for Admin By Request Remote Access Feature Explainer video, depicting the Admin By Request circle tick logo uncovering some padlock icons

Unattended Access

Feature Explainer

Admin by request remote access feature breakdown page 1 » admin by request » admin by request
Admin by request remote access feature breakdown page 2 » admin by request » admin by request

Feature Breakdown

Unattended Access

Cloudflare Tunnelling: How It Works

The core concept of Remote Access is to empower users to connect to remote endpoints effortlessly through their browsers. This is achieved by establishing a Secure WebSocket connection to a Docker-based gateway, whether hosted internally or as a managed service. The connection is facilitated through a secure Cloudflare tunnel, as illustrated in the diagram. The gateway consists of three integral components:
  1. Connector – Manages data validation, translation between the portal and proxy container, log management, health checks, and other critical functions.
  2. Proxy – Establishes a protocol connection between Admin By Request and your endpoint, supporting RDP, SSH, or VNC protocols.
  3. Discovery – Automates the discovery of connectable devices within the same network as the gateway.
Admin by request remote access gateway connection diagram for secure connections to servers » admin by request » admin by request
Ready to elevate your remote work security? Request a demo today.

The future of remote work

Flexible Configuration

With two setups available

A fully managed setup with seamless operation via Admin By Request. Prerequisites: Requires only an outbound connection to establish a secure tunnel and installation of the Admin By Request Server agent.
On-premises deployment using Docker within your infrastructure. Prerequisites: Involves running Docker containers and allowing outbound connections to Cloudflare for tunnel establishment.

Revolutionized Connectivity

An innovative browser-based solution simplifies device access.

Streamlined IT Management

Integrated PAM features ensure centralized, efficient management.

Flexibility at Its Core

Customizable for both managed cloud and self-hosted solutions.

Key Benefits

Seamless and Tailored Integration

Fits seamlessly into existing infrastructures without disruptions.

Innovative Technology

Leverage Cloudflare tunnels for cutting-edge, secure remote connectivity.

Prerequisites Made Easy

Simple solutions for self-hosted or cloud service configurations.

Simplified Experience

Connect effortlessly through a user-friendly remote access environment.

Orange admin by request circle tick logo. » admin by request » admin by request

Admin By Request Secure Remote

Your key to unlocking secure, flexible, and productive remote access, management, and support.