IT departments struggling with the Bring-Your-Own-Device (BYOD) trend have another tool in their arsenal. On Wednesday, Dell released its new cloud client managing solution, the software -as-a-service-based Wyse Cloud Client Manager.
The Cloud Client Manager provides a cloud-based management option for thin and zero clients, allowing IT departments to securely manage devices that are either company- or user-owned, without ongoing software installation, updates and maintenance. Austin, Texas-based Dell acquired the technologies used in the new offering in April when it purchased Wyse Technology, which sold cloud computing and desktop virtualization technologies.
Tarkan Maner, vice president and general manager of Cloud Client Computing at Dell, said in a statement that organizations "are increasingly seeing a shift from the 'one-size-fits-all' and 'corporate owned', 'corporate managed' computing approach, to a rapidly evolving 'BYOD' model."
Integration with PocketCloud
This has led to IT logistical and technical nightmares, but Maner said that his company's Cloud Client Manager helps reduce IT's burden by "providing a comprehensive overview of all devices, applications and content," as well as a granular approach.
Dell said its new offering provides several key capabilities. It enables cloud-based, remote configuration and management of thin and zero clients either on or off-premise, with extensive over-the-air mobile device management (MDM) and mobile application management (MAM) for iOS and Android smartphones and tablets.
Administrators also have the ability to enable remote desktop and content management between mobile devices and desktops/laptops via integration with Dell Wyse PocketCloud software. This allows users to manage the content on their office or home computers from a smartphone or tablet .
The Client Manager also lets IT define end user rights and permissions through individual or group membership, which employees can manage via a self-service portal. Employees can register their own devices in order to gain access to company resources, see which of their devices are registered, and view applicable policies about their use. Workers can also reset their own system passwords, and, if a registered device is lost or stolen, can locate, lock or wipe the device themselves. (continued...)