Toshiba's risk-management approach

Hardware vendor lauds software-plus strategy

Tags: Toshiba CorporationUnited Arab Emirates
  • E-Mail
Toshiba's risk-management approach Varghese: So many devices are connected to the Internet now and that needs to be managed.
By  Stephen McBride Published  April 7, 2014

Toshiba Gulf last week brought a curious software solution to the Dubai-hosted Garner Symposium. Toshiba Smart Client Manager (TSCM), now in its second version, and its newly released Software-as-a Service counterpart, Toshiba Cloud Client Manager (TCCM), are device management solutions that go beyond security-only models and touch upon machine health, power management and disaster recovery.

Santosh Varghese, general manager, Middle East and Africa, Computer Systems Division, took time out from the symposium to tell ITP.net just why a hardware manufacturer had made the move into security software solutions.

"Toshiba used to be a hardware vendor, but if you look at where the hardware industry is going, you have the vendor, the distributor, the system integrator, and nobody makes money [because of] cheap Chinese manufacturers," he said.

"So now we have come up with a strategy of hardware plus services. Maybe a few years down the line nobody will buy hardware; they will buy services and hardware will be given free."

Any large gathering of ICT professionals today involves a discussion about the consumerisation of IT and the proliferation of personal devices across corporate networks. Network administrators need to worry about digital asset security, but are also tasked with keeping users productive wherever they are.

Solutions to the bring-your-own-device (BYOD) conundrum have tended to revolve around security issues, such as the control of data and real-time monitoring of devices. TSCM bears some resemblance to these solutions, but is characterised by Varghese as more of a risk-management solution that a security solution. It is installed on end points, but also centrally and allows management of a number of aspects of the device not normally considered in security solutions.

Continues on next page>>

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code