About ElevateIQ

Endpoint privilege elevation that runs inside the standard Windows UAC prompt — built so standard users stay standard.

Our story

ElevateIQ was born from frustration — the kind that comes from watching every IT team in the world choose between giving users local admin or living in a help-desk ticket queue.

Every Windows-shop admin knows the dance: a user needs to install something, change a network setting, or update a driver. They hit UAC, the prompt asks for credentials they don't have, and then it's a Slack message to IT, a remote session, an admin password being typed across someone else's keyboard. Every time. For every install. Forever.

The "fix" the industry settled on was worse than the problem: hand out local admin and pray, or buy a privileged-access tool that replaces UAC with its own modal — a separate prompt, a separate trust path, and a whole new attack surface. Neither felt right.

So we built ElevateIQ instead. A native Windows credential provider that lives inside the standard UAC prompt. The user verifies their identity with MFA, writes one line about why, and the elevation goes through — backed by your rules, the audit log, and an AI risk score that helps your team decide faster. UAC keeps doing exactly what Windows expects it to do. Local admin disappears. Help-desk tickets shrink.

Jorge Corona

Founder & CEO

With over 20 years in IT, Jorge has spent the last decade building the tools he wished he had as an IT manager. Before ElevateIQ he led IT teams through the same cycle every shop knows — local-admin sprawl, audit findings, and weekend tickets that should never have been tickets.

Jorge founded Tiny Electrons LLC in 2017 with a simple mission: make enterprise-grade security accessible to teams that don't have an enterprise security budget. ElevateIQ is the third product in that mission — built on the conviction that privilege elevation should be a one-click MFA tap, not a help-desk ticket.

20+ Years in IT
10+ Years building software
2017 Founded

The problems we solve

Local admin sprawl

Every user with local admin is a security finding waiting to happen. ElevateIQ removes the need to hand it out at all.

Help-desk overhead

"Can you elevate this for me?" is the most common ticket in IT. With ElevateIQ, users self-serve in seconds; admins approve with one click.

Shared admin passwords

Nobody types the admin password into anyone else's machine, ever. The credential provider fills it in for them — and it's never displayed.

Audit gaps

Every elevation is signed with MFA, scored by AI, decided by a human (or an explicit rule), and recorded in a tamper-evident log.

UAC replacements

Other PAM tools wrap UAC with their own modal, breaking what Windows expects. ElevateIQ runs inside the native prompt — same UI, same trust path.

Rule sprawl

Approve a request once, optionally turn it into a rule. Build your allowlist as you go — no upfront policy work required.

Our mission

Standard users should stay standard. Local admin should belong to nobody. Every privilege change should be MFA-signed, policy-bound, and audited. And it should all happen without a help-desk ticket.

That's the bar. ElevateIQ is how we hit it.

See it on a real endpoint

30-minute walkthrough — bring an installer that's been giving you trouble.