Thycotic, a provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, including 25 of the Fortune 100, announced enhanced cellphone capabilities for its award-winning PAM solution, Secret Server. Secret Server customers can now extend comprehensive privileged access management to cellphone devices to keep remote teams productive and secure.

More than half of business users use their personal cellphone device to access work-related items, according to research from the Ponemon Institute. As much of the workforce continues to work from home due to COVID-19, mobile access is essential to maintaining business continuity. Thycotic's newly released native apps for iPhone and Android allow business users to access privileged credentials and use those credentials to log in to services and applications from their cellphone device.

Password management features

Sensitive systems and data stay secure and productivity is never interrupted by bottlenecks. "Business users aren't sitting at their desk and don't always have their laptop in front of them. But they need seamless access to tools and information," says Jai Dargan, Thycotic Vice President of Product Management. "Now, they can have on-the-go access from their cellphone devices without compromising the industrial-grade security of enterprise PAM."

Users authenticate to a Secret Server instance (on-prem or cloud) via their cellphone device using the built-in password management features. When users are logged in with their own account, they can navigate Secret Server's folder structure to access their secrets. Secret Server cellphone apps can be installed and configured in minutes. An intuitive UX, appealing UI, and a simple onboarding process ensures quick adoption, so companies can bolster their security posture and improve their ROI.

Download PDF version Download PDF version

In case you missed it

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How Do New Security Technologies Transform Retail And Loss Prevention?
How Do New Security Technologies Transform Retail And Loss Prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...