AdminByRequestAdminByRequest eliminated admin rights on endpoint and servers, including secure remote access to RDP/SSH/VNC resources with VPN or Jump server. it also allows you to use Remote Help to securely connect to endpoint devices to support users and Every remote session is fully logged and recorded
|
Privileged Access ManagementAdminByRequest Eliminate Local Admin Rights, your Users will never know they lost their admin rights and no one in IT has to install software or create whitelists.
Elevate applications without elevating the user, enforce business rules with MFA, SSO and device compliance. decide which programs are safe and allow seamless user elevations for them ahead of time. allow some users to gain admin rights for a period of time. Suitable for revoking admin rights for standard users, developers and even IT Helpdesk teams. |
Secure Remote AccessUnattended Access Allows for access to servers, devices, and workstations via standard protocols and can be configured as a cloud service or as an on-premises solution (including agent-less devices).
Remote Help offers the ability to initiate screen sharing and control directly between the devices of an IT admin and an end user. Vendor Access Allows for external users, such as third-party vendors, to be given secure access to internal devices via an external portal. |
|
|
Additional EPM Features |
Additional Remote Access Features |
Run as Admin feature is ideal for users with the occasional need for app elevations. It elevates the application – not the user. Use Run as Admin when you need to run one or two apps with admin privileges rather than many.
Admin Session feature is the better choice for users who have a high need for administrative privileges. It gives the user administrator rights on their device for a predefined period of time, during which they can run multiple apps elevated. Use this feature when you need to undertake several admin tasks at a time. Pre-Approval allows you to add add frequently used, known applications to the Pre-Approved list so that users can skip the approval flow (i.e., making a request, providing a reason, and waiting for approval) and access the pre-approved application from the get-go. |
Multi-Factor Authentication Only authorized personnel who authenticate with MFA can initiate remote sessions, adding an essential layer of security.
Request-Based Access is granted only after a user request is approved by an IT admin, reducing the risk of unauthorized connections. Just-In-Time Connectivity as connections are established only when needed and are securely terminated after each session, eliminating persistent access points that could be exploited. No Propriety software required as Remote sessions can be conducted directly through a standard web browser, reducing the complexity of installation and ensuring broad compatibility across devices. The existing client from our (EPM) solution is all that is needed on the end-user’s device, making the activation straightforward and maintenance-free |