---
description: Compare CyberArk Privileged Access Management Solutions vs Admin By Request regarding their features, reviews, pricing, specifications, screenshots & more.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: CyberArk Privileged Access Management Solutions vs Admin By Request Comparison
---

Breadcrumb: [Home](/) > [Vulnerability Management Software](/directory/4286/vulnerability-management/software) > [CyberArk Privileged Access Management Solutions \<span\>vs\</span\> Admin By Request](https://www.softwareadvice.ie/compare/398430/418541/cyberark-privilege/vs/admin-by-request)

# Compare CyberArk Privileged Access Management Solutions vs Admin By Request

Canonical: https://www.softwareadvice.ie/compare/398430/418541/cyberark-privilege/vs/admin-by-request

> Detailed comparison between CyberArk Privileged Access Management Solutions and Admin By Request. Check ratings, reviews, pricing, and features to make the best decision for your business.

-----

## At a Glance

| Metric | CyberArk Privileged Access Management Solutions | Admin By Request |
| **Overall rating** | 4.3/5 | 4.9/5 |
| **Total Reviews** | 27 | 68 |
| **Starting Price** | - | - |
| **Free Trial** | Yes | No |
| **Free Version** | No | Yes |
| **Deployment** | Cloud, SaaS, Web-based, Windows (Desktop) | Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop), Linux (Desktop), Android (Mobile), iPhone (Mobile), iPad (Mobile) |
| **Support** | Email/Help Desk, Knowledge Base, Phone Support | Email/Help Desk, FAQs/Forum, Knowledge Base, Phone Support, Chat |
| **Training** | - | Live Online, Webinars, Documentation, Videos |

## Key features

### CyberArk Privileged Access Management Solutions

- API
- Access Controls/Permissions
- Access Management
- Activity Dashboard
- Activity Tracking
- Alerts/Escalation
- Application Access Control
- Audit Trail
- Behavioural Analytics
- Compliance Management
- Configurable Workflow
- Endpoint Management
- Least Privilege
- Monitoring
- Multi-Factor Authentication
- Policy Management
- Reporting/Analytics
- Security Auditing
- Single Sign On
- Workflow Management

### Admin By Request

- API
- Access Controls/Permissions
- Access Management
- Activity Dashboard
- Activity Tracking
- Alerts/Escalation
- Application Access Control
- Audit Trail
- Behavioural Analytics
- Compliance Management
- Configurable Workflow
- Endpoint Management
- Least Privilege
- Monitoring
- Multi-Factor Authentication
- Policy Management
- Reporting/Analytics
- Security Auditing
- Single Sign On
- Workflow Management

## Links

- [View CyberArk Privileged Access Management Solutions Profile](https://www.softwareadvice.ie/software/398430/cyberark-privilege)
- [View Admin By Request Profile](https://www.softwareadvice.ie/software/418541/admin-by-request)
- [View Original Comparison](https://www.softwareadvice.ie/compare/398430/418541/cyberark-privilege/vs/admin-by-request)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"CyberArk Privileged Access Management Solutions vs Admin By Request Comparison","description":"Compare CyberArk Privileged Access Management Solutions vs Admin By Request regarding their features, reviews, pricing, specifications, screenshots & more.","url":"https://www.softwareadvice.ie/compare/398430/418541/cyberark-privilege/vs/admin-by-request","about":[{"@id":"https://www.softwareadvice.ie/software/398430/cyberark-privilege#software"},{"@id":"https://www.softwareadvice.ie/software/418541/admin-by-request#software"}],"breadcrumb":{"@id":"https://www.softwareadvice.ie/compare/398430/418541/cyberark-privilege/vs/admin-by-request#breadcrumblist"},"@id":"https://www.softwareadvice.ie/compare/398430/418541/cyberark-privilege/vs/admin-by-request#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.ie/#website"},"inLanguage":"en-IE","publisher":{"@id":"https://www.softwareadvice.ie/#organization"}},{"name":"CyberArk Privileged Access Management Solutions","description":"Cyberark Privilege is designed to help businesses across banking, federal, insurance and healthcare industries control access for administrative and privileged accounts. The application enables organizations to reduce information leaks, assess risks and generate custom reports via a unified platform.\n\n\nIt lets administrators prevent unauthorized users from accessing privileged account credentials using access control capability. Cyberark Privilege allows supervisors to synchronize users’ privileged account passwords and SSH keys across multiple devices including smartphones, tablets or PCs. Additionally, it offers a host of features such as onboarding, permissions management, task tracking, configurable workflows, threat detection and analytics.\n\n\nCyberark Privilege comes with an API, which facilitates integration with several third-party platforms, such as ServiceNow, OneLogin, Docker Cloud, SAP, Splunk, Workday and more. Pricing is available on request and support is extended via phone, email and documentation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/fecb7720-0d3b-45c8-b0cd-06fa0243656c.png","url":"https://www.softwareadvice.ie/software/398430/cyberark-privilege","@id":"https://www.softwareadvice.ie/software/398430/cyberark-privilege#software","@type":"SoftwareApplication","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"applicationCategory":"BusinessApplication","aggregateRating":{"@type":"AggregateRating","ratingValue":4.3,"bestRating":5,"ratingCount":27},"operatingSystem":"Cloud, Windows"},{"name":"Admin By Request","description":"Admin By Request is a cybersecurity solution designed to make comprehensive security simple. Our main goal is to enable enterprises to lock down administrative privileges across all endpoints by revoking local admin rights - while still providing means for end users to gain elevated privileges when they need it.\n\nOnce local admin rights are removed based on user or group, end users are still able to gain elevated privileges when they need it via the self-service endpoint application.\n\nPrivileges can be elevated per app (single app elevation), or for a set period of time (session elevation). All elevated activity undertaken by the user while they have elevated privileges is logged in the Admin By Request Auditlog, which can be accessed via a user-friendly online Admin Portal.\n\nAlso accessible from the Admin Portal is a full hardware and software Inventory, customizable reports, features such as Break Glass (a LAPS-replacement feature for creating emergency local admin accounts), Device Owner, and Clean Up Local Admins, as well as all Settings and Sub-Settings, which allow organizations to create granular access control rules to tailor the software to their specific needs.\n\nFile downloads are scanned by over 35 anti-malware engines which comprise OPSWAT's MetaDefender Cloud API, and flagged if malware is detected.\n\nIntegration with ServiceNow, Slack, Teams, Intune, SIEM tools, and a number of other popular software, make adoption of Admin By Request  effortless for end users and administrators.\n\nEnd users can remain productive, Help Desk personnel can focus on more important tasks, and company compliance requirements can be met with a single security tool.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/f70c6f79-0017-491c-b8c1-873632dedf20.png","url":"https://www.softwareadvice.ie/software/418541/admin-by-request","@id":"https://www.softwareadvice.ie/software/418541/admin-by-request#software","@type":"SoftwareApplication","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"applicationCategory":"BusinessApplication","aggregateRating":{"@type":"AggregateRating","ratingValue":4.9,"bestRating":5,"ratingCount":68},"operatingSystem":"Cloud, Apple, Windows, Linux, Android, Platform ios, Platform ipad"},{"@id":"https://www.softwareadvice.ie/compare/398430/418541/cyberark-privilege/vs/admin-by-request#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Vulnerability Management Software","position":2,"item":"/directory/4286/vulnerability-management/software","@type":"ListItem"},{"name":"CyberArk Privileged Access Management Solutions vs Admin By Request","position":3,"item":"https://www.softwareadvice.ie/compare/398430/418541/cyberark-privilege/vs/admin-by-request","@type":"ListItem"}]}]}
</script>
