Business Software for Admin By Request

Top Software that integrates with Admin By Request as of July 2025

Compare business software, products, and services to find the best solution for your business or organization. Use the filters on the left to drill down by category, pricing, features, organization size, organization type, region, user reviews, integrations, and more. View and sort the products and solutions that match your needs in the results below.

  • 1
    Slack

    Slack

    Salesforce

    Slack is a cloud-based project collaboration and team interaction software solution specially designed to seamlessly facilitate communication across organizations. Featuring powerful tools and services integrated into a single platform, Slack provides private channels to promote interaction within smaller teams, direct channels to help send messages directly to colleagues, and public channels that enables members across organizations to start conversations. Available on Mac, Windows, Android, and iOS apps, Slack offers a plethora of features that include chat, file sharing, collaborative workspace, real-time notifications, two-way audio and video, screen sharing, document imaging, activity tracking and logging, and more.
    Leader badge
    Starting Price: $6.67 per user per month
  • 2
    Microsoft Teams
    Solving today's complex business problems takes teams of engaged people working together. We’ve built an online guide to teach you and your team the secrets of successful teamwork. When you have a place to create and make decisions as a team, there’s no limit to what you can achieve. Teams brings everything together in a shared workspace where you can chat, meet, share files, and work with business apps. Get your team on the same page with group chat, online meetings, calling, and web conferencing. Collaborate on files with built-in Microsoft 365 (formerly Office 365) apps like Word, Excel, PowerPoint, and SharePoint. Add in your favorite Microsoft apps and third-party services to keep the business moving forward. Get end-to-end security, administrative control, and compliance—all powered by Microsoft 365. Teams is designed for groups of all kinds. Get started with the free, no-commitments version. You can also get Teams as part of the best-in-class suite of productivity tools.
    Leader badge
    Starting Price: $12.50 per user per month
  • 3
    Jira

    Jira

    Atlassian

    Jira is the only project management tool you need to plan and track work across every team. Jira by Atlassian is the #1 software development tool for teams planning and building great products. Trusted by thousands of teams, Jira offers access to a wide range of tools for planning, tracking, and releasing world-class software, capturing and organizing issues, assigning work, and following team activity. It also integrates with leading developer tools for end-to-end traceability. From short projects, to large cross-functional programs, Jira helps break big ideas down into achievable steps. Organize work, create milestones, map dependencies and more. Link work to goals so everyone can see how their work contributes to company objectives and stay aligned to what’s important. Your next move, suggested by AI. Atlassian Intelligence takes your big ideas and automatically suggests the tasks to help get it done.
    Leader badge
    Starting Price: Free
  • 4
    Microsoft Power BI
    Power BI is a business intelligence platform that enables users to analyze data using AI-driven tools and intuitive report creation. It consolidates data from various sources into OneLake, creating a centralized data source. This platform aids in embedding actionable insights into applications like Microsoft 365, aiding decision-making. Power BI integrates with Microsoft Fabric, enhancing data management. It offers scalability to handle large data volumes and integrates seamlessly with Microsoft services. Its AI capabilities efficiently identify patterns and generate insights. Power BI ensures data security and compliance. Its Copilot feature allows rapid report generation. Additionally, Power BI Pro offers self-service analytics, and its free version includes data modeling and visualization tools. It's known for unified data management, empowering users with accessibility and training resources. Power BI has demonstrated a significant ROI and economic benefit, as evidenced in a Forres
    Leader badge
    Starting Price: $10 per user per month
  • 5
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.
  • 6
    ChatGPT

    ChatGPT

    OpenAI

    ChatGPT is an AI-powered conversational assistant developed by OpenAI that helps users with writing, learning, brainstorming, coding, and more. It is free to use with easy access via web and apps on multiple devices. Users can interact through typing or voice to get answers, generate creative content, summarize information, and automate tasks. The platform supports various use cases, from casual questions to complex research and coding help. ChatGPT offers multiple subscription plans, including Free, Plus, and Pro, with increasing access to advanced AI models and features. It is designed to boost productivity and creativity for individuals, students, professionals, and developers alike.
    Starting Price: Free
  • 7
    Microsoft Entra ID
    Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control.
  • 8
    Microsoft Sentinel
    Standing watch, by your side. Intelligent security analytics for your entire enterprise. See and stop threats before they cause harm, with SIEM reinvented for a modern world. Microsoft Sentinel is your birds-eye view across the enterprise. Put the cloud and large-scale intelligence from decades of Microsoft security experience to work. Make your threat detection and response smarter and faster with artificial intelligence (AI). Eliminate security infrastructure setup and maintenance, and elastically scale to meet your security needs—while reducing IT costs. Collect data at cloud scale—across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds. Detect previously uncovered threats and minimize false positives using analytics and unparalleled threat intelligence from Microsoft. Investigate threats with AI and hunt suspicious activities at scale, tapping into decades of cybersecurity work at Microsoft.
  • 9
    ServiceNow

    ServiceNow

    ServiceNow

    Digitize your workflows - they'll love you for it. Your company can be more productive and your people more engaged. ServiceNow makes work, work better for people. Transform old, manual ways of working into modern digital workflows, so employees and customers get what they need, when they need it—fast, simple, easy. ServiceNow delivers digital workflows that create great experiences and unlock productivity for employees and the enterprise. We simplify the complexity of work on a single, enterprise cloud platform. The Now Platform: The intelligent and intuitive cloud platform for work. Choose from our workflows or build your own apps. Built on the Now Platform, our product portfolio delivers the  IT,  Employee, and  Customer Workflows that matter with enterprise solutions to help drive every part of your digital transformation. Create the great experiences you want and unlock the productivity you need, now with native mobile capabilities for everyday work across the enterprise.
    Starting Price: $100 per month
  • 10
    Splunk Cloud Platform
    Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale.
  • 11
    OPSWAT MetaDefender
    MetaDefender layers an array of market-leading technologies to protect critical IT and OT environments and shrinks the overall attack surface by detecting and preventing sophisticated known and unknown file-borne threats like advanced evasive malware, zero-day attacks, APTs (advanced persistent threats), and more. MetaDefender easily integrates with existing cybersecurity solutions at every layer of your organization’s infrastructure. With flexible deployment options purpose-built for your specific use case, MetaDefender ensures files entering, being stored on, and exiting your environment are safe—from the plant floor to the cloud. This solution uses a range of technologies to help your organization develop a comprehensive threat prevention strategy. MetaDefender protects organizations from advanced cybersecurity threats in data that originates from a variety of sources, such as web, email, portable media devices, and endpoints.
    Starting Price: $0
  • 12
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 13
    ThreatAware

    ThreatAware

    ThreatAware

    Leveraging API feeds from your existing tools, validate your controls are correctly deployed and functioning across every cyber asset. Our clients come from all industries, from legal to finance, charities to retail. We are trusted by leading organizations to discover and protect their valuable cyber assets. Create a highly accurate device inventory by connecting to your existing systems via API. When issues arise the workflow automation engine can trigger actions via a webhook. ThreatAware provides clarity of the security control health of your cyber assets in a clear and simple design. Gain a macro view of your security control health regardless of how many controls you are monitoring. Generated from any field from a device, allows you to quickly group your cyber assets for monitoring and configuration purposes. When your monitoring systems accurately depicts your live environment, every alert is real.
  • 14
    VirusTotal

    VirusTotal

    VirusTotal

    VirusTotal inspects items with over 70 antivirus scanners and URL/domain blocklisting services, in addition to a myriad of tools to extract signals from the studied content. Any user can select a file from their computer using their browser and send it to VirusTotal. VirusTotal offers a number of file submission methods, including the primary public web interface, desktop uploaders, browser extensions and a programmatic API. The web interface has the highest scanning priority among the publicly available submission methods. Submissions may be scripted in any programming language using the HTTP-based public API. VirusTotal can be useful in detecting malicious content and also in identifying false positives, normal and harmless items detected as malicious by one or more scanners. As with files, URLs can be submitted via several different means including the VirusTotal webpage, browser extensions and the API.
  • 15
    OctoXLabs

    OctoXLabs

    OctoXLabs

    Detect, prioritize, and respond to asset security threats in minutes. Get Cyber asset attack surface management and improve your visibility. Manage all your cybersecurity inventory. Discover vulnerabilities for all your assets. Fill in the gaps left by agent-based asset management solutions. Discover server, client, cloud, and IoT device gaps. Octoxlabs works with agentless technology and enhances your visibility with 50+ API integrations. Keep track of your installed applications licenses at any time. You can see how many licenses you have left, how many have been used, and the renewal date from a single point. Keep track of your installed applications licenses at any time. Users that you have to open separately for each product. Enrich your user data with integrations with intelligence services. Follow the local account and you can do this for all products. Devices that have a vulnerability but no security agents installed can be discovered.
  • 16
    Lucidum

    Lucidum

    Lucidum

    Your attack surface is not just what’s connected to the internet, it’s not just your IOT or endpoints, it’s everything. Other CAASM providers want to replace your SIEM or upgrade your spreadsheet. We don’t disrupt your workflow, we serve it, we don’t fight your SIEM, we fit it. Lucidum opens your eyes to the main sources of data loss, security incidents, and mismanagement. You’ll get amazing value out of 4-6 connections. But we don’t charge for connectors or ingestion, hook them all up. Directly inject our CAASM into your SIEM. Cut costs through significantly reduced ingestion and streamlined computing. We empower cybersecurity professionals with CAASM-driven insights to map, manage, and monitor every cyber asset, enhancing their ability to uncover hidden threats and mitigate risks. By leveraging the combined strength of CAASM for comprehensive asset visibility and AI for predictive analytics and automation, we offer unprecedented control over the technology landscape.
  • 17
    MetaDefender Vault
    Transferring files into and out of any environment exposes systems to breach and infection. Portable media are often used to conduct these transfers, bypassing security protocols. MetaDefender Vault is a secure file storage and retrieval solution that protects critical data and keeps threats at bay. It limits access within an organization and provides important tracking and auditing information. Prevent zero-day attacks and ensure your organization can handle false negatives through a variety of options. Lock any new file in a time-specific quarantine, continuously re-scan with multiple antimalware engines, and implement role-based access rules to reduce exposure. Enforce workflow processes that require authentication and restrict access and sharing of files, by job role and file type. Control the list of supervisors authorized to perform certain actions like lock access to any file that has not been pre-approved.
  • Previous
  • You're on page 1
  • Next