Thycotic, a provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, including 25 of the Fortune 100, announced enhanced cellphone capabilities for its award-winning PAM solution, Secret Server. Secret Server customers can now extend comprehensive privileged access management to cellphone devices to keep remote teams productive and secure.

More than half of business users use their personal cellphone device to access work-related items, according to research from the Ponemon Institute. As much of the workforce continues to work from home due to COVID-19, mobile access is essential to maintaining business continuity. Thycotic's newly released native apps for iPhone and Android allow business users to access privileged credentials and use those credentials to log in to services and applications from their cellphone device.

Password management features

Sensitive systems and data stay secure and productivity is never interrupted by bottlenecks. "Business users aren't sitting at their desk and don't always have their laptop in front of them. But they need seamless access to tools and information," says Jai Dargan, Thycotic Vice President of Product Management. "Now, they can have on-the-go access from their cellphone devices without compromising the industrial-grade security of enterprise PAM."

Users authenticate to a Secret Server instance (on-prem or cloud) via their cellphone device using the built-in password management features. When users are logged in with their own account, they can navigate Secret Server's folder structure to access their secrets. Secret Server cellphone apps can be installed and configured in minutes. An intuitive UX, appealing UI, and a simple onboarding process ensures quick adoption, so companies can bolster their security posture and improve their ROI.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...