Security and user management
Built-in security in the app
Unlike “traditional” Mobile Device Management solutions, AGETOR Mobility has built-in security in the individual applications. When developing apps for the company as an external supplier or internal IT-developer, you do not have to take other security systems into account – you can simply focus on developing apps.
Reuse users’ login information
AGETOR Mobility supports integration towards the company’s existing user systems and verifies user information against the company’s Active Directory. When users log in to an app, they can use the same login information they use for other business systems. This means that it is not necessary to create the same users in several different places.
Simple user management
When a new mobile user requests access to an app for the first time, the administrator automatically receives all information about the user and the mobile unit the user would like to use (smartphone or tablet pc). If you need to make ad hoc approvals, the administrator must simply grant or deny access to the user and the relevant mobile unit, and the rights will be automatically created in the system.
Control access to individual mobile units
If necessary, the administrator can easily block access for a user, and it is also possible to block access to specific mobile units. If an employee loses their smartphone, the administrator can block access to this specific unit and the employee does not then lose access through other permitted units.
AGETOR Mobility gives you great flexibility as you are free to manage which users should be granted access, and which apps or specific mobile units they should gain access to.
Read more about how AGETOR Mobility technically ensures secure data exchange.