---
description: Compare ThreatLocker vs Admin By Request regarding their features, reviews, pricing, specifications, screenshots & more.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: ThreatLocker vs Admin By Request Comparison
---

Breadcrumb: [Home](/) > [Privileged Access Management Software](/directory/4241/privileged-access-management/software) > [ThreatLocker \<span\>vs\</span\> Admin By Request](https://www.softwareadvice.co.uk/compare/314278/418541/threatlocker/vs/admin-by-request)

# Compare ThreatLocker vs Admin By Request

Canonical: https://www.softwareadvice.co.uk/compare/314278/418541/threatlocker/vs/admin-by-request

> Detailed comparison between ThreatLocker and Admin By Request. Check ratings, reviews, pricing, and features to make the best decision for your business.

-----

## At a Glance

| Metric | ThreatLocker | Admin By Request |
| **Overall rating** | 4.9/5 | 4.9/5 |
| **Total Reviews** | 87 | 68 |
| **Starting Price** | US$0.01 | - |
| **Free Trial** | Yes | No |
| **Free Version** | No | Yes |
| **Deployment** | Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop) | Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop), Linux (Desktop), Android (Mobile), iPhone (Mobile), iPad (Mobile) |
| **Support** | Email/Help Desk, FAQs/Forum, Knowledge Base, Phone Support, 24/7 (Live rep), Chat | Email/Help Desk, FAQs/Forum, Knowledge Base, Phone Support, Chat |
| **Training** | In Person, Live Online, Webinars, Documentation, Videos | Live Online, Webinars, Documentation, Videos |

## Key features

### ThreatLocker

- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Tracking
- Alerts/Escalation
- Anomaly/Malware Detection
- Application Security
- Audit Trail
- Customisable Reports
- Device Management
- Endpoint Management
- Event Logs
- Monitoring
- Policy Management
- Reporting & Statistics
- Reporting/Analytics
- Secure Login
- Server Monitoring
- Summary Reports
- Workflow Management

### Admin By Request

- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Tracking
- Alerts/Escalation
- Anomaly/Malware Detection
- Application Security
- Audit Trail
- Customisable Reports
- Device Management
- Endpoint Management
- Event Logs
- Monitoring
- Policy Management
- Reporting & Statistics
- Reporting/Analytics
- Secure Login
- Server Monitoring
- Summary Reports
- Workflow Management

## Links

- [View ThreatLocker Profile](https://www.softwareadvice.co.uk/software/314278/threatlocker)
- [View Admin By Request Profile](https://www.softwareadvice.co.uk/software/418541/admin-by-request)
- [View Original Comparison](https://www.softwareadvice.co.uk/compare/314278/418541/threatlocker/vs/admin-by-request)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"ThreatLocker vs Admin By Request Comparison","description":"Compare ThreatLocker vs Admin By Request regarding their features, reviews, pricing, specifications, screenshots & more.","url":"https://www.softwareadvice.co.uk/compare/314278/418541/threatlocker/vs/admin-by-request","about":[{"@id":"https://www.softwareadvice.co.uk/software/314278/threatlocker#software"},{"@id":"https://www.softwareadvice.co.uk/software/418541/admin-by-request#software"}],"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/compare/314278/418541/threatlocker/vs/admin-by-request#breadcrumblist"},"@id":"https://www.softwareadvice.co.uk/compare/314278/418541/threatlocker/vs/admin-by-request#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"inLanguage":"en-GB","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"}},{"name":"ThreatLocker","description":"Stop ransomware! ThreatLocker helps organizations reduce their surface areas of attack with policy-driven endpoint security. Instead of only blocking known threats, block everything that is not explicitly trusted. Combine Allowlisting with Ringfencing app containment and storage policies to enable a Zero Trust posture and block attacks that live off the land.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/f9498ebb-5057-41ac-9d76-e4eda3c0ba81.png","url":"https://www.softwareadvice.co.uk/software/314278/threatlocker","@id":"https://www.softwareadvice.co.uk/software/314278/threatlocker#software","@type":"SoftwareApplication","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"applicationCategory":"BusinessApplication","aggregateRating":{"@type":"AggregateRating","ratingValue":4.9,"bestRating":5,"ratingCount":87},"offers":{"price":"0.01","@type":"Offer","priceCurrency":"USD"},"operatingSystem":"Cloud, Apple, Windows"},{"name":"Admin By Request","description":"Admin By Request is a cybersecurity solution designed to make comprehensive security simple. Our main goal is to enable enterprises to lock down administrative privileges across all endpoints by revoking local admin rights - while still providing means for end users to gain elevated privileges when they need it.\n\nOnce local admin rights are removed based on user or group, end users are still able to gain elevated privileges when they need it via the self-service endpoint application.\n\nPrivileges can be elevated per app (single app elevation), or for a set period of time (session elevation). All elevated activity undertaken by the user while they have elevated privileges is logged in the Admin By Request Auditlog, which can be accessed via a user-friendly online Admin Portal.\n\nAlso accessible from the Admin Portal is a full hardware and software Inventory, customizable reports, features such as Break Glass (a LAPS-replacement feature for creating emergency local admin accounts), Device Owner, and Clean Up Local Admins, as well as all Settings and Sub-Settings, which allow organizations to create granular access control rules to tailor the software to their specific needs.\n\nFile downloads are scanned by over 35 anti-malware engines which comprise OPSWAT's MetaDefender Cloud API, and flagged if malware is detected.\n\nIntegration with ServiceNow, Slack, Teams, Intune, SIEM tools, and a number of other popular software, make adoption of Admin By Request  effortless for end users and administrators.\n\nEnd users can remain productive, Help Desk personnel can focus on more important tasks, and company compliance requirements can be met with a single security tool.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/f70c6f79-0017-491c-b8c1-873632dedf20.png","url":"https://www.softwareadvice.co.uk/software/418541/admin-by-request","@id":"https://www.softwareadvice.co.uk/software/418541/admin-by-request#software","@type":"SoftwareApplication","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"applicationCategory":"BusinessApplication","aggregateRating":{"@type":"AggregateRating","ratingValue":4.9,"bestRating":5,"ratingCount":68},"operatingSystem":"Cloud, Apple, Windows, Linux, Android, Platform ios, Platform ipad"},{"@id":"https://www.softwareadvice.co.uk/compare/314278/418541/threatlocker/vs/admin-by-request#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Privileged Access Management Software","position":2,"item":"/directory/4241/privileged-access-management/software","@type":"ListItem"},{"name":"ThreatLocker vs Admin By Request","position":3,"item":"https://www.softwareadvice.co.uk/compare/314278/418541/threatlocker/vs/admin-by-request","@type":"ListItem"}]}]}
</script>
