Admin By Request Endpoint Privilege ManagementAdmin By Request
|
||||||
About
Admin By Request’s Endpoint Privilege Management gives organisations full control over local admin rights, application elevation, and endpoint privilege access across Windows, macOS, and Linux, without the complexity of traditional PAM solutions.
For mid-market organisations, EPM acts as a complete, easy-to-deploy solution for managing endpoint access and privilege. It removes standing admin rights, enables just-in-time elevation, supports approval workflows, and provides full audit trails to strengthen security and meet compliance requirements.
For enterprise organisations, EPM fits alongside existing security and identity stacks as a focused control layer that closes endpoint gaps traditional PAM solutions often leave behind, improving control without increasing support costs or requiring a full PAM overhaul.
|
About
ThreatLocker is a Zero Trust Platform that prevents cyber threats by blocking unknown applications, enforcing least privilege, and controlling what can run across your environment. Using Allowlisting, Ringfencing, Network Control, and more, ThreatLocker stops ransomware, zero-day attacks, and unauthorized activity before execution, rather than relying on detection after the fact.
Built for modern IT and cybersecurity teams, the platform delivers centralized visibility and policy management across endpoints, users, and applications. ThreatLocker reduces attack surface, limits lateral movement, and supports compliance with detailed audit logs. With fast deployment, a large built-in application library, and streamlined approvals, organizations can strengthen security while minimizing operational overhead and maintaining business continuity.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Growing businesses and enterprise organisations that need stronger endpoint access control, compliance, and privileged access management without operational overhead.
|
Audience
IT pros looking for a Zero Trust Platform
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationAdmin By Request
United States
www.adminbyrequest.com/en/endpoint-privilege-management
|
Company InformationThreatLocker
Founded: 2017
United States
www.threatlocker.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Endpoint Protection Features
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Privileged Access Management Features
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Loss Prevention Features
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Firewall Features
Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Access Control (NAC) Features
Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access
|
||||||
Integrations
Okta
ServiceNow
Splunk Cloud Platform
ThreatAware
Active Directory
ChatGPT
HaloPSA
IT Glue
Jira
Kaseya BMS
|
Integrations
Okta
ServiceNow
Splunk Cloud Platform
ThreatAware
Active Directory
ChatGPT
HaloPSA
IT Glue
Jira
Kaseya BMS
|
|||||
|
|