Learn More

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 7 Ratings

Description

Achieve swift onboarding and management of your entire workforce's workstations and servers with Just-In-Time privilege elevation through an intuitive portal. This system allows for a comprehensive analysis of risky users and assets by utilizing thread and behavioral analytics to detect harmful software, thus safeguarding against data breaches and malware threats. Instead of elevating user privileges, the focus is on elevating applications, enabling privilege delegation tailored to specific users or groups, which in turn optimizes both time and financial resources. Regardless of whether the individual is a developer within IT, a novice in HR, or a third-party contractor servicing an endpoint, there exists a suitable elevation method for each profile. Additionally, all functionalities are readily available with Admin By Request and can be customized to meet the unique requirements of various users or groups, ensuring a secure and efficient operational environment. This approach not only enhances security but also fosters a more streamlined workflow across departments.

Description

Securden Endpoint Privilege Manager (EPM) enables enterprises to remove admin rights without impacting productivity on Windows, Mac, and Linux endpoints. Securden EPM helps elevate applications for standard users and grant admin rights on a Just-in-Time (JIT) basis, eliminating standing privileges while ensuring users can run required applications without friction. Organizations can enforce application control using allowlisting and blocklisting to prevent unauthorized or risky software execution while enabling secure operations. The solution supports on-demand application elevation and policy-based granular application elevation control, allowing security teams to define exactly which apps can run with elevated rights and under what conditions. Privilege management continues even on offline endpoints, ensuring protection for remote and traveling users. Built-in JIT local admin rights reduce risk by granting temporary elevation only when required. Additional capabilities include application usage tracking for better policy decisions, continuous local administrator group monitoring to prevent privilege creep, and secure remote access for IT helpdesk teams to troubleshoot systems without exposing credentials. Securden EPM also helps organizations meet compliance requirements such as HIPAA, PCI-DSS, GDPR, and NERC-CIP. With a highly scalable architecture and a wide array of integrations, the platform delivers enterprise-grade endpoint privilege management while maintaining operational efficiency and user productivity.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Active Directory
Jira
Microsoft Entra ID
Okta
ServiceNow
Cisco Duo
Freshservice
Google Authenticator
IBM QRadar SIEM
LogRhythm SIEM
Microsoft Authenticator
Microsoft Sentinel
Microsoft Teams
OctoXLabs
OneLogin
Ping Identity
SolarWinds Log Analyzer
Splunk Cloud Platform
VirusTotal
Yubico YubiKey

Integrations

Active Directory
Jira
Microsoft Entra ID
Okta
ServiceNow
Cisco Duo
Freshservice
Google Authenticator
IBM QRadar SIEM
LogRhythm SIEM
Microsoft Authenticator
Microsoft Sentinel
Microsoft Teams
OctoXLabs
OneLogin
Ping Identity
SolarWinds Log Analyzer
Splunk Cloud Platform
VirusTotal
Yubico YubiKey

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Admin By Request

Country

United States

Website

www.adminbyrequest.com

Vendor Details

Company Name

Securden

Founded

2018

Country

United States

Website

www.securden.com/endpoint-privilege-manager/index.html

Product Features

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Remote Support

Diagnostic Tools
File Transfer
Live Chat
Real-time Chat
Remote Control
Screen Sharing
Session Recording
Session Transfer
Surveys & Feedback

Single Sign On

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

Product Features

Application Control

Securden EPM provides detailed application management on endpoint devices via allowlisting and blocklisting techniques. It enables the temporary granting of access to designated applications through a streamlined request-and-release process. With the Securden Audit Engine, you can monitor application usage with exceptional precision. Additionally, it prevents users from downloading and installing harmful applications by implementing strong privilege management protocols.

Endpoint Privilege Management

Securden Endpoint Privilege Manager offers a holistic approach to eliminating admin rights while ensuring that user productivity and experience remain unaffected. Its powerful workflows allow for the on-the-fly allocation of application-specific privileges to users. Additionally, its policy framework streamlines and automates the management of privileges throughout the organization.

Alternatives

Alternatives