Sign up now

24 May 09:00-10:30 CESTIdeon Science Park, Backstage

In today's fast-paced digital environment, cyber threats loom large, posing significant risks to businesses and municipalities alike. Join us as we explore innovative strategies to strike the delicate balance between granting users flexibility and maintaining robust security measures. Led by industry expert Dan Svensson, Regional Manager at Admin By Request, this seminar will delve deep into the realm of Privileged Access Management (PAM). Discover how leading-edge PAM solutions empower organizations to streamline operations while fortifying defenses against cyber threats. Key Discussion Points:

  • Understanding the Local Admin Problem
  • Navigating the Landscape of Privileged Access Management
  • Ensuring Regulatory Compliance and Data Protection
  • Demonstration on how to manage Privileged Access Like a Pro with Admin By Request


Light breakfast served from 8.45 (seminar starts at 9.00)

For questions or additional info, please contact liza.johansson@ideonsciencepark.se

PAM for Dummies: What is Privileged Access Management?

If there’s one industry where acronyms are rife, it’s the world of cybersecurity. One such acronym that’s coming up more and more often is PAM,  three innocent letters that stand for ‘Privileged Access Management’. 

Privileged vs. Standard Users 

In the cybersecurity arena, privileged users wield administrative might, holding the keys to critical systems. These individuals have the authority to configure systems, install software, alter user accounts, and access secure data. They’re essentially the architects of the digital realm. On the other side of the spectrum, standard users navigate this same landscape with limited access. The standard user interacts with systems, applications, and data within the boundaries set by their privileged counterparts. 

The Need 

Managing who can do what on your computer is vital, but orchestrating this manually simply takes too much time, especially for larger enterprises.  

The Solution 

This is where Privileged Access Management comes in; it makes sure only the most trusted people in your organization have special access, allowing companies control and stop access easily when and as needed.

Sign up now

Dan Svensson, a seasoned cybersecurity professional with a Microsoft MSCE background, delved into the realm of cybersecurity in 2014.Joining Denmark-based company Admin By Request at its inception, he embarked on a journey to bolster security for Swedish and Finnish businesses.Under his guidance, Admin By Request has evolved into a formidable platform in Sweden and Finland, garnering accolades from industry authorities such as Gartner and Capterra for its PAM (Privileged Access Management) solution, recognized for its unparalleled ease of use and exceptional value proposition.Presently, as the Regional Manager overseeing Sweden and Finland, Dan leads strategic initiatives, driving market expansion and fostering client relationships to fortify cybersecurity landscapes across the region.

Admin By Request is a Privileged Access Management (PAM) security solution that enables organizations to manage, monitor, and control local administrator rights on their endpoints. It offers Just-In-Time per-app and session elevation, logging of privileged activity, real-time file scanning for malware, temporary local administrator accounts (LAPS replacement), integration with SIEM tools and ticketing systems, and a comprehensive software and hardware inventory - all accessible from an intuitive web portal.

Organized by

This event is a part of Sweden Secure Tech Hub

Ideon Science Park together with five leading science parks in tech and digitalization form a consortium that helps small and medium-sized tech companies to create safer digital products and solutions – starting already in the design and development phase. >> Read more here

By signing up for this event, you agree to that the organizer can contact you in the future for other relevant events and activities.