As print security becomes an increasingly important part of any enterprise printing environment, we've had a number of customers ask us to implement some restrictions around the size and length of documents users can print with Breezy.Read More
Today we are excited to announce the release of a new generation of our award-wining mobile printing software. Under development for over a year, this release is a complete rewrite, featuring hundreds of new features, bug fixes, UI enhancements and other product improvements.Read More
We spend a lot of time here on the Breezy blog talking about enterprise mobility, mobile security, and related topics, but traditionally we haven't focused on the real customer successes that drive our business.
That's changing today, with the introduction of a new feature on the blog: the Customer Story. Once a month, we'll bring you a true story of one of our customers, highlighting the kind of customer, the printing problems they faced and how Breezy worked with the customer to solve the problem.
Let's get started with a recent example:Read More
There’s no question that we’re in the post-PC era. A look at a recent presentation by Benedict Evans of Andreessen Horowitz has all the stats. Here are a few data points among the most mind-boggling in a document filled with amazing data that shows how mobile technology is becoming universal.Read More
Where do the mobile devices that connect to your network go when they leave the premises? No one really knows, and that’s one of the reasons that mobile security worries IT, but not rank-and-file employees.Read More
Breezy integration partners AirWatch, Citrix, Good Technology, IBM and MobileIron made it into the coveted leaders' quadrant again this year in Gartner's 2015 Magic Quadrant for Enterprise Mobility Management Suite report. Several other vendors (Symantec, Tangoe, and Absolute Software) were dropped, and Microsoft was included in the visionaries’ quadrant for the first time along with smaller companies Sophos and Soti.Read More
Once upon a time, hackers were computer hobbyists who tried their network penetration skills as a kind of rite of passage. They might poke around on a corporate network, but few did intentional damage.Read More
Everybody prints. And, increasingly, everybody needs to print from multiple devices, including laptops, smartphones, and tablets – not just desktop computers. They print memos, presentations, sales literature, emails, web pages and a staggering variety of other documents, images, and files. So, of course, everybody understands the printing process, right?Read More
Last year, mobile devices around the globe generated more than 86 exabytes of traffic. That’s 94.5 trillion megabytes, or more than 90.1 million terabytes of data.Read More
Do you need more reasons to attend MobileIron’s Mobile First Conference this week in San Francisco? How about these statistics, then.Read More