Using a standard web browser, administrators can now oversee and take control of IT devices online, in real-time, without the need to invest in servers and dedicated management software. TCCM will be demonstrated at the Gartner Symposium ITXPO 2013.
Supporting mixed product and operating system (OS) estates, multiple devices can be managed easily, regardless of platform, OS or user scenario. Not only does this improve organisational efficiency and maintain uptime, it increases productivity as users can access data and apps seamlessly across PCs, laptops, smartphones and tablets.
TCCM automates the administration and support systems that would otherwise need to be looked after manually. For the customer, this means more agile endpoint management via a single, intuitive graphical interface that can be accessed online – all within an architecture that performs tasks quickly and easily.
As part of the service, TCCM offers solutions for patch management, power management and HDD health monitoring. The solution will also provide additional modules to deliver IT asset management, software management and a Mobile Device Manager.
Further enhancements will deliver clear decision-making about hardware and software. IT asset management is an important part of any organisation’s strategy. With TCCM, an administrator can use the management screen to view the full list of devices across the organisation, and then click on one for more detailed inventory information.
The software management function also features useful lists about the different kinds of software found on all of the endpoint devices. By gathering data on both the hardware being used and the software installed on each, users have everything they need to make more informed decisions on IT purchases and redistribution of resources.
With so many employees using smartphones and tablets, mobile device management is also becoming increasingly important. Toshiba’s MDM works across multiple vendors and operating systems/platforms and allows organisations to manage mobile devices by creating user profile permissions (data and app access), deploying security measures such as password strength, encryption, device lock and data wiping. Policies and permissions can be also applied, and business apps contained on a user’s own device and therefore acting as an enabler for ‘Bring Your Own Device’ (BYOD).