---
description: Learn what are the benefits of Heimdal Privileged Access Management vs Admin By Request for the UK businesses. Our free platform provides a detailed side-by-side comparison that will help you learn more about each of these software.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/getapp/og_logo-94fd2a03a6c7a0e54fc0c9e21a1c0ce9.png
title: Compare Heimdal Privileged Access Management vs Admin By Request | GetApp UK 2026
---

Breadcrumb: [Home](/) > [Privileged Access Management Software](/directory/1181/privileged-access-management/software) > [Heimdal Privileged Access Management \<span\>vs\</span\> Admin By Request](https://www.getapp.co.uk/compare/2049138/2067991/heimdal-privileged-access-management/vs/admin-by-request)

# Compare Heimdal Privileged Access Management vs Admin By Request

Canonical: https://www.getapp.co.uk/compare/2049138/2067991/heimdal-privileged-access-management/vs/admin-by-request

> Detailed comparison between Heimdal Privileged Access Management and Admin By Request. Check ratings, reviews, pricing, and features to make the best decision for your business.

-----

## At a Glance

| Metric | Heimdal Privileged Access Management | Admin By Request |
| **Overall rating** | 4.6/5 | 4.9/5 |
| **Total Reviews** | 22 | 68 |
| **Starting Price** | - | - |
| **Free Trial** | Yes | No |
| **Free Version** | - | Yes |
| **Deployment** | Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop) | Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop), Linux (Desktop), Android (Mobile), iPhone (Mobile), iPad (Mobile) |
| **Support** | Email/Help Desk, FAQs/Forum, Knowledge Base, Phone Support | Email/Help Desk, FAQs/Forum, Knowledge Base, Phone Support, Chat |
| **Training** | Live Online, Webinars, Documentation, Videos | Live Online, Webinars, Documentation, Videos |

## Key features

### Heimdal Privileged Access Management

- API
- Access Controls/Permissions
- Access Management
- Active Directory Integration
- Activity Tracking
- Approval Process Control
- Audit Trail
- Compliance Management
- Endpoint Management
- Event Logs
- Least Privilege
- Monitoring
- Remote Access Management
- Reporting & Statistics
- Reporting/Analytics
- Role-Based Permissions
- Secure Login
- Single Sign On
- Two-Factor Authentication
- User Activity Monitoring

### Admin By Request

- API
- Access Controls/Permissions
- Access Management
- Active Directory Integration
- Activity Tracking
- Approval Process Control
- Audit Trail
- Compliance Management
- Endpoint Management
- Event Logs
- Least Privilege
- Monitoring
- Remote Access Management
- Reporting & Statistics
- Reporting/Analytics
- Role-Based Permissions
- Secure Login
- Single Sign On
- Two-Factor Authentication
- User Activity Monitoring

## Links

- [View Heimdal Privileged Access Management Profile](https://www.getapp.co.uk/software/2049138/heimdal-privileged-access-management)
- [View Admin By Request Profile](https://www.getapp.co.uk/software/2067991/admin-by-request)
- [View Original Comparison](https://www.getapp.co.uk/compare/2049138/2067991/heimdal-privileged-access-management/vs/admin-by-request)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Compare Heimdal Privileged Access Management vs Admin By Request | GetApp UK 2026","description":"Learn what are the benefits of Heimdal Privileged Access Management vs Admin By Request for the UK businesses. Our free platform provides a detailed side-by-side comparison that will help you learn more about each of these software.","url":"https://www.getapp.co.uk/compare/2049138/2067991/heimdal-privileged-access-management/vs/admin-by-request","about":[{"@id":"https://www.getapp.co.uk/software/2049138/heimdal-privileged-access-management#software"},{"@id":"https://www.getapp.co.uk/software/2067991/admin-by-request#software"}],"breadcrumb":{"@id":"https://www.getapp.co.uk/compare/2049138/2067991/heimdal-privileged-access-management/vs/admin-by-request#breadcrumblist"},"@id":"https://www.getapp.co.uk/compare/2049138/2067991/heimdal-privileged-access-management/vs/admin-by-request#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.getapp.co.uk/#website"},"inLanguage":"en-GB","publisher":{"@id":"https://www.getapp.co.uk/#organization"}},{"name":"Heimdal Privileged Access Management","description":"Heimdal Privileged Access Management is a PAM solution that allows sysadmins to view and check escalation requests, as well as approve or decline them on the go. Available in both the dashboard tab and on mobile, it is the ideal tool for full granular visibility into the company network.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/1629a338-eee6-4037-9ecb-a51f36e77b6d.png","url":"https://www.getapp.co.uk/software/2049138/heimdal-privileged-access-management","@id":"https://www.getapp.co.uk/software/2049138/heimdal-privileged-access-management#software","@type":"SoftwareApplication","publisher":{"@id":"https://www.getapp.co.uk/#organization"},"applicationCategory":"BusinessApplication","aggregateRating":{"@type":"AggregateRating","ratingValue":4.6,"bestRating":5,"ratingCount":22},"operatingSystem":"Cloud, Apple, Windows"},{"name":"Admin By Request","description":"Admin By Request is an endpoint privilege management solution that enables organizations to manage, monitor, and control local admin rights across Windows, macOS, and Linux devices. Built on the principle of least privilege, it eliminates the need for users to have standing administrative access. \n\nInstead, it provides temporary, audited elevation only when necessary, minimizing the attack window and reducing the risk of account compromise and lateral movement.\n\nJust-In-Time Privilege Elevation\n\nAt the core of Admin By Request is just-in-time privilege elevation. Users can elevate privileges in two ways: per-application elevation grants temporary admin rights to a single application or installer without elevating the entire user session, keeping the process sandboxed. Session elevation provides time-limited, system-wide administrative access for tasks requiring broader permissions, such as installing drivers or changing system settings. Both methods are fully audited, with all activity (including applications run, installations performed, and session duration) logged for compliance and security review.\n\nFlexible Approval Workflows\n\nOrganizations can configure approval workflows to match their security policies. Requests can require IT approval, require a business reason from the user, or be pre-approved based on application vendor or checksum. Applications can also be blocklisted to prevent elevation entirely, giving IT teams granular control over what software can run with elevated privileges.\n\nBreak Glass Emergency Access\n\nFor emergency situations such as a broken domain trust relationship or temporary server access for consultants, Admin By Request offers Break Glass accounts. These temporary, one-time-use local administrator accounts feature automatically generated complex credentials, must be used within an hour of creation, and are automatically removed on reboot. This provides a secure alternative to Microsoft LAPS, with passwords stored securely in the portal rather than in plain text alongside Active Directory records.\n\nSecure Remote Access\n\nAdmin By Request includes secure remote access capabilities. Remote Support enables IT teams to connect to endpoints for screen sharing and remote control via secure Cloudflare tunnels, with sessions initiated by either the admin or end user. Unattended Access allows browser-based remote connections to servers and network devices without requiring a user to be present, supporting both cloud-hosted and self-hosted on-premise gateway deployments. Vendor Access extends secure connectivity to third-party vendors, allowing access to internal resources through a browser without additional software. All remote sessions are audited and can be recorded for review.\n\nCentralized Management and Auditing\n\nThe web portal provides centralized management across all endpoints. Administrators can configure global settings or create granular sub-settings for specific Active Directory, Entra ID, Google Identity, JumpCloud, or Okta groups. A comprehensive audit log captures all privileged activity, and email notifications can be configured for approval requests, malware detection, and other events. Privacy controls support compliance with data protection requirements by allowing organizations to anonymize data collection.\n\nAdditional Capabilities\n\nAdmin By Request also provides real-time anti-malware file scanning during elevation requests, complete software and hardware inventory across managed endpoints, and integration with SIEM tools and ticketing systems. The solution deploys via standard installation methods or MDM platforms like Intune and Jamf, and operates with minimal resource consumption once installed.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/5255d4b2-86df-426e-a01d-c0e3d9947540.png","url":"https://www.getapp.co.uk/software/2067991/admin-by-request","@id":"https://www.getapp.co.uk/software/2067991/admin-by-request#software","@type":"SoftwareApplication","publisher":{"@id":"https://www.getapp.co.uk/#organization"},"applicationCategory":"BusinessApplication","aggregateRating":{"@type":"AggregateRating","ratingValue":4.9,"bestRating":5,"ratingCount":68},"operatingSystem":"Cloud, Apple, Windows, Linux, Android, Platform ios, Platform ipad"},{"@id":"https://www.getapp.co.uk/compare/2049138/2067991/heimdal-privileged-access-management/vs/admin-by-request#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Privileged Access Management Software","position":2,"item":"/directory/1181/privileged-access-management/software","@type":"ListItem"},{"name":"Heimdal Privileged Access Management vs Admin By Request","position":3,"item":"https://www.getapp.co.uk/compare/2049138/2067991/heimdal-privileged-access-management/vs/admin-by-request","@type":"ListItem"}]}]}
</script>
