---
description: Quickly find and compare the leading Symantec PAM vs Admin By Request alternatives. Comprehensive listing of competitors & similar tools for fast software selection and to contact several providers directly.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/getapp/og_logo-94fd2a03a6c7a0e54fc0c9e21a1c0ce9.png
title: Compare Symantec PAM vs Admin By Request | GetApp Canada 2026
---

Breadcrumb: [Home](/) > [Privileged Access Management Software](/directory/1181/privileged-access-management/software) > [Symantec PAM \<span\>vs\</span\> Admin By Request](https://www.getapp.ca/compare/2067079/2067991/ca-privileged-access-manager/vs/admin-by-request)

# Compare Symantec PAM vs Admin By Request

Canonical: https://www.getapp.ca/compare/2067079/2067991/ca-privileged-access-manager/vs/admin-by-request

> Detailed comparison between Symantec PAM and Admin By Request. Check ratings, reviews, pricing, and features to make the best decision for your business.

-----

## At a Glance

| Metric | Symantec PAM | Admin By Request |
| **Overall rating** | 2.0/5 | 4.9/5 |
| **Total Reviews** | 1 | 68 |
| **Starting Price** | - | - |
| **Free Trial** | No | No |
| **Free Version** | No | Yes |
| **Deployment** | Cloud, SaaS, Web-based | Cloud, SaaS, Web-based, Mac (Desktop), Windows (Desktop), Linux (Desktop), Android (Mobile), iPhone (Mobile), iPad (Mobile) |
| **Support** | Chat | Email/Help Desk, FAQs/Forum, Knowledge Base Software, Phone Support, Chat |
| **Training Software** | Live Online | Live Online, Webinars, Documentation, Videos |

## Key features

### Symantec PAM

- Access Management
- Authentication Software
- Behavioral Analytics
- Least Privilege
- Multi-Factor Authentication
- User Activity Monitoring

### Admin By Request

- API
- Access Management
- Activity Tracking
- Anomaly/Malware Detection
- Application Security
- Audit Trail
- Authentication Software
- Behavioral Analytics
- Configurable Workflow
- Customizable Reports
- Event Logs
- Least Privilege
- ML Algorithm Library
- Machine Learning Software
- Monitoring
- Multi-Factor Authentication
- Process/Workflow Automation
- Screen Sharing Software
- Secure Login
- User Activity Monitoring

## Links

- [View Symantec PAM Profile](https://www.getapp.ca/software/2067079/ca-privileged-access-manager)
- [View Admin By Request Profile](https://www.getapp.ca/software/2067991/admin-by-request)
- [View Original Comparison](https://www.getapp.ca/compare/2067079/2067991/ca-privileged-access-manager/vs/admin-by-request)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Compare Symantec PAM vs Admin By Request | GetApp Canada 2026","description":"Quickly find and compare the leading Symantec PAM vs Admin By Request alternatives. Comprehensive listing of competitors & similar tools for fast software selection and to contact several providers directly.","url":"https://www.getapp.ca/compare/2067079/2067991/ca-privileged-access-manager/vs/admin-by-request","about":[{"@id":"https://www.getapp.ca/software/2067079/ca-privileged-access-manager#software"},{"@id":"https://www.getapp.ca/software/2067991/admin-by-request#software"}],"breadcrumb":{"@id":"https://www.getapp.ca/compare/2067079/2067991/ca-privileged-access-manager/vs/admin-by-request#breadcrumblist"},"@id":"https://www.getapp.ca/compare/2067079/2067991/ca-privileged-access-manager/vs/admin-by-request#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.getapp.ca/#website"},"inLanguage":"en-CA","publisher":{"@id":"https://www.getapp.ca/#organization"}},{"name":"Symantec PAM","description":"Symantec PAM is a privileged access management (PAM) platform that helps businesses control access to devices and data. Teams can remove hard-coded passwords from applications, configuration files, and scripts to enable secure communications.\n\nSymantec PAM Suite assists with authentication, authorization, and access management. Businesses can store sensitive administrative credentials in an encrypted database. It lets users restrict the entitlements for specific accounts to ensure the least privileged access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/4b582ea9-1d7e-4a3b-b315-f63ee4be1ed2.png","url":"https://www.getapp.ca/software/2067079/ca-privileged-access-manager","@id":"https://www.getapp.ca/software/2067079/ca-privileged-access-manager#software","@type":"SoftwareApplication","publisher":{"@id":"https://www.getapp.ca/#organization"},"applicationCategory":"BusinessApplication","aggregateRating":{"@type":"AggregateRating","ratingValue":2.0,"bestRating":5,"ratingCount":1},"operatingSystem":"Cloud"},{"name":"Admin By Request","description":"Admin By Request is an endpoint privilege management solution that enables organizations to manage, monitor, and control local admin rights across Windows, macOS, and Linux devices. Built on the principle of least privilege, it eliminates the need for users to have standing administrative access. \n\nInstead, it provides temporary, audited elevation only when necessary, minimizing the attack window and reducing the risk of account compromise and lateral movement.\n\nJust-In-Time Privilege Elevation\n\nAt the core of Admin By Request is just-in-time privilege elevation. Users can elevate privileges in two ways: per-application elevation grants temporary admin rights to a single application or installer without elevating the entire user session, keeping the process sandboxed. Session elevation provides time-limited, system-wide administrative access for tasks requiring broader permissions, such as installing drivers or changing system settings. Both methods are fully audited, with all activity (including applications run, installations performed, and session duration) logged for compliance and security review.\n\nFlexible Approval Workflows\n\nOrganizations can configure approval workflows to match their security policies. Requests can require IT approval, require a business reason from the user, or be pre-approved based on application vendor or checksum. Applications can also be blocklisted to prevent elevation entirely, giving IT teams granular control over what software can run with elevated privileges.\n\nBreak Glass Emergency Access\n\nFor emergency situations such as a broken domain trust relationship or temporary server access for consultants, Admin By Request offers Break Glass accounts. These temporary, one-time-use local administrator accounts feature automatically generated complex credentials, must be used within an hour of creation, and are automatically removed on reboot. This provides a secure alternative to Microsoft LAPS, with passwords stored securely in the portal rather than in plain text alongside Active Directory records.\n\nSecure Remote Access\n\nAdmin By Request includes secure remote access capabilities. Remote Support enables IT teams to connect to endpoints for screen sharing and remote control via secure Cloudflare tunnels, with sessions initiated by either the admin or end user. Unattended Access allows browser-based remote connections to servers and network devices without requiring a user to be present, supporting both cloud-hosted and self-hosted on-premise gateway deployments. Vendor Access extends secure connectivity to third-party vendors, allowing access to internal resources through a browser without additional software. All remote sessions are audited and can be recorded for review.\n\nCentralized Management and Auditing\n\nThe web portal provides centralized management across all endpoints. Administrators can configure global settings or create granular sub-settings for specific Active Directory, Entra ID, Google Identity, JumpCloud, or Okta groups. A comprehensive audit log captures all privileged activity, and email notifications can be configured for approval requests, malware detection, and other events. Privacy controls support compliance with data protection requirements by allowing organizations to anonymize data collection.\n\nAdditional Capabilities\n\nAdmin By Request also provides real-time anti-malware file scanning during elevation requests, complete software and hardware inventory across managed endpoints, and integration with SIEM tools and ticketing systems. The solution deploys via standard installation methods or MDM platforms like Intune and Jamf, and operates with minimal resource consumption once installed.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/5255d4b2-86df-426e-a01d-c0e3d9947540.png","url":"https://www.getapp.ca/software/2067991/admin-by-request","@id":"https://www.getapp.ca/software/2067991/admin-by-request#software","@type":"SoftwareApplication","publisher":{"@id":"https://www.getapp.ca/#organization"},"applicationCategory":"BusinessApplication","aggregateRating":{"@type":"AggregateRating","ratingValue":4.9,"bestRating":5,"ratingCount":68},"operatingSystem":"Cloud, Apple, Windows, Linux, Android, Platform ios, Platform ipad"},{"@id":"https://www.getapp.ca/compare/2067079/2067991/ca-privileged-access-manager/vs/admin-by-request#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Privileged Access Management Software","position":2,"item":"/directory/1181/privileged-access-management/software","@type":"ListItem"},{"name":"Symantec PAM vs Admin By Request","position":3,"item":"https://www.getapp.ca/compare/2067079/2067991/ca-privileged-access-manager/vs/admin-by-request","@type":"ListItem"}]}]}
</script>
