It seems that every day brings a new, attention-grabbing headline about the speed at which tablets (iPad, Android, and Windows Surface) are taking over classrooms. But are headlines like these really indicative of what’s happening in U.S. schools?
It’s true that educators nationwide are racing to take advantage of the cost, ease-of-use, and educational advantages that come with equipping K-12 students with tablets. But the provocative headlines that seem to herald a day when the textbook is a thing of the past are just a bit premature.
The truth is that making the transition to tablets in the classroom isn’t an instant process. Although many kids arrive in kindergarten as digital natives, there’s still a gap between the technology available to the poorest students and their more economically blessed counterparts.
More importantly, it takes time, money, teacher training, and planning to integrate tablets into everyday lessons. So, despite the headlines, it’s premature to report the death of the textbook just yet. Many school districts are running into problems they didn’t consider when they began rolling-out a program to bring tablet technologies into the classroom.
One of the biggest issues facing schools is security.
Education is one of the most heavily regulated industries in the country, and maintaining the privacy of student data – from grades to assignments modified under an individual education plan (IEP) – can be a big barrier to tablet roll-outs. On-device encryption, like that provided by Breezy as part of the wireless printing process, can make a big difference in FERPA compliance.
According to Jared Hansen, CEO of Breezy, printing is another issue that many schools have struggled with. Students and teachers print a lot, even in schools with advanced tablet programs. “Unless students can print securely and wirelessly from the tablet, printing out an assignment can quickly become a bottleneck that wastes student and teacher time,” he says. “In many schools, students don’t have access to a printer at home, so even if they do homework on a school-provided tablet, they have to print it out at school. If that means waiting in a lab for an open computer connected to a printer, it can mean long lines before school, at lunch, and between periods.”
Hansen adds that there’s also the question of tracking and cost control for print jobs. “We’ve seen several requests for proposals lately from school districts where Breezy’s print management tools that can restrict students to specific printers and features such as black & white printing, or require that print jobs be linked to specific assignments instead of allowing students to print personal or extracurricular materials at school expense are critical functions for cash-strapped districts.”
Once the basic issues of security, printing, and teacher training have been overcome, the opportunities that tablets bring to education are almost limitless, however. Educationdive reported on a number of important classroom benefits to using tablets, and Hansen believes that solutions like Breezy will enable schools to move more quickly with tablet deployment by removing the last remaining barriers.
Tablets are uniquely suited to some valuable classroom enhancements, such as:
- Showing math processes, not just answers.
- Polling students for instant teacher monitoring of understanding.
- Allowing virtual field trips to distant places, with live interaction with experts.
- Automating attendance and classroom participation reports.
- Improving teacher presentations with video, images, surveys and other interactive tools.
- Graphing data to show correlations and important information.
- Recording lectures and classroom discussions.
- Delivering personalized help to students with special needs.
“Kids spend hours every day interacting with technology at home, and it makes no sense to shut that down when they get to school,” Hansen says. “Breezy is working with school districts, private schools, and universities across the U.S. to deliver secure mobile printing as part of high-technology classrooms. I don’t think there’s any question that tablets will eventually replace most textbooks. The only question is how quickly that happens.”
Gartner Analyst Mikako Kitagawa says that the shift from PCs to tablets for daily content consumption is continuing, even though PC shipments in the U.S. hit 16.1 million units during the third quarter, up 3.5% from the same quarter in 2012.
Worldwide, however, PC shipments dropped 8.6%, Gartner says, marking the sixth consecutive quarter of declining worldwide PC shipments. A total of 80.3 million PCs were shipped during the third quarter, setting the volume back more than five years.
Gartner credits Google's Android mobile OS with a big part in rising 2013 tablet sales and declining PC sales. "A greater availability of inexpensive Android tablets attracted first-time consumers in emerging markets, and as supplementary devices in mature markets," stated Kitagawa. Tablets will continue to put pressure on PC vendors, she said.
The 3rd quarter 2013 tablet sales numbers show a shift from PCs to tablets that is primarily driven by consumers, but it is affecting the IT landscape, too. One of the primary headaches facing IT managers is mobile security for employee-owned devices.
“Every 15 to 20 years, the IT landscape shifts. The last major shift of this magnitude was the shift to the Internet and e-business,” explains Jared Hansen, CEO of Breezy. “But the shift to mobile is no less disruptive. It’s changed the way people work, and the way organizations conduct business. Mobile security is one of the primary initiatives in most IT organizations, whether they purchase company-owned devices or encourage BYOD.”
IDC reports that by 2016, employee owned smartphones, tablets and PCs in the workplace will grow from 2 billion to more than 5.25 billion. These users expect IT to support them in accessing corporate databases and applications seamlessly and securely. This is creating new demands on the corporate network and putting the company’s customer and employee data at risk.
80% of companies are currently at risk of a data breach due one gap in their security architecture, and that risk is likely to increase as more tablets and smartphones enter the workplace. But it doesn’t have to be that way, Hansen says.
Companies are taking steps to protect their data, Hansen says, but most existing MDM and network security problems leave a gaping security hole in the form of mobile printing. “That’s where Breezy comes in. We secure the ‘last mile’ for mobile devices, with secure on-device encryption that allows employees to print from any mobile device, to internal and external printers, with just a few clicks.”
A new video from Breezy, Securing the Last Mile in Your Mobile Deployment, explains how it works. Whether a company has a BYOD policy or is purchasing tablets and smartphones for employee use, the need for secure mobile printing is increasing. Watch the video now to see how Breezy is helping companies of all sizes close the security gap.
In 1975, Business Week Magazine published an article called The Office of the Future. That article predicted that the paperless office – where computers shared information across a vast network, and no one needed to print hard copies any longer – would be a reality before the end of the 20th century.
One reason, according to futurists interviewed for the article, was that smaller devices would allow people to access files when they weren’t at the office, thereby reducing the need for printed documents. Many of the predictions from that old article did come true. But, like the flying car and vacations on Mars, the paperless office is one prediction that hasn’t materialized.
In fact, mobile devices are actually driving investment in printing technology. An IDC report
earlier this year confirmed this trend, reporting that 75% of tablet and smartphone users expect to increase the number of documents printed from mobile devices and that smartphone and tablet users are more likely to print than their non-mobile counterparts. "While total U.S. mobile pages are expected to grow at a compound annual rate of 12% during the 2012-16 forecast period, non-mobile pages will decline 5%," said Angèle Boyd, Group VP and General
Manager, Imaging/Output Document Solutions at IDC.
Mobile Printing “Most Wanted” Feature
According to a report prepared by KPCB, tablet shipments surpassed desktop PCs and notebooks in the fourth quarter of 2012, less than 3 years after the introduction of the original iPad.
32% of employees globally now rely on more than one mobile device during the typical workday. The truth is that printing is a basic productivity tool for most businesses, and most workers expect to be able to print from any work device. So it came as no surprise when British technology analyst TechNavio reported earlier this year that printing is the single most
requested feature in mobile devices.
“Many users assume they can simply click ‘print’ from their tablet or smartphone and print to their normal workplace printer,” TechNavio says. “But that isn’t the case with most mobile
devices. IT has misjudged both the security risks posted by mobile printing and the demand for it, creating a growing problem for many companies.”
The desire for mobile printing creates a security problem for many companies. Over 63% of the employees surveyed in a Check Point study in June 2013 said that they transferred files from a mobile device to a cloud storage service like DropBox or GoogleDrive so that they could print the document from a computer that wasn’t connected to the company network – and therefore not protected by the company’s security software.
Who Uses Mobile Printing?
There are many everyday business applications for printing. Think of these common scenarios:
- Sales people rely on every day. And, as any field sales representative will tell you, often that means a need to print from a mobile device while in a hotel or airport business center, at a client’s office, or delivering contracts and expense reports to their own corporate offices. Secure mobile printing lets IT meet the sales team’s need, while closing a gaping security hole in the corporate network’s endpoint security.
- Real estate agents know that the ability to print a document anytime, anywhere, can make the difference between getting a deal done – and losing it to another agent. Many of the documents Realtors handle are confidential, so a secure print solution for mobile devices is especially important to them.
- Traveling consultants are among the most frequent fliers on the planet. Their need to print documents securely is so important that some travel with their own printers. It’s a consultant’s dream come true: an end to scanning through hundreds of pages of documents on a small screen, or lugging a printer on every flight.
- Hotel staff can now use tablets to check-in guests as soon as they arrive at the hotel, with printed receipts and passes ready and waiting at reception as soon as the guests arrive.
- Lawyers use 20,000 to 100,000 sheets of paper every year according to The American Bar Association. There's nothing more confidential than the client files entrusted to an attorney. Secure mobile printing allows attorneys to print vital documents anywhere they can access a printer, whether that’s at the courthouse, a client’s office, or within their own office, without compromising their ethical obligations.
- Field trainers at franchise companies, restaurants, retail stores and many other businesses often travel from city to city conducting staff training and evaluations. These trainers have a constant need to update and print confidential documents such as personnel forms. Adding a secure mobile print solution to their tool kit saves time, money and headache.
- Insurance agents meet with prospective policyholders in a range of locations – and many state insurance rules require that applications be hand-signed in front of a witness. Until recently, that meant at least two face-to-face meetings, so that the agent could get the necessary application documents prepared and printed before returning them to the client for signing. With a secure mobile printing capability, insurance agents can modify documents on the fly during a meeting, then print on any printer network, and get the application ready to submit in one meeting instead of two.
Of course, there are many other day-to-day business activities where the ability to print
from a mobile device can save time and money. For more information about how a secure mobile printing solution from Breezy can help your company take full advantage of BYOD
and mobile devices, get in touch to request a demo.
Photo credit: Shannon Patrick shared this 1975 concept drawing of IBM's "Office of the Future" on Flickr under a Creative Commons License.
According to some research, more than 70% of organizations permit use of personally owned
devices for business purposes. For most companies, BYOD policies came about
when early adopters started bringing iPhones, iPads and Android devices to work
and seeking access to the corporate network.
Gartner estimated that, by 2017, half of employers will require employees to use their own devices for work. So it seems enterprises have a lot of work to do in the next few years when it
comes to practicing safe BYOD. Making every personal device secure can be a daunting task, but, as mobile trends keep gaining momentum, it will become imperative for companies to adapt to changing trends.
One area of BYOD security that’s often lacking is the area of awareness, education and training for end users. Fewer than 1 in 10 mobile device users know that there are malware
apps that don’t attack the infected device, but lie in wait to attack other computers or networks the device subsequently connects to. Even fewer, about 1 in 10,000, realize that many mobile apps are designed with risky behaviors as a core part of the app.
According to Network World, at least 80% of mobile apps have built-in security and privacy holes designed into the app. For instance, there’s often a mismatch between the permissions the app requests vs. the permissions the app actually uses, leaving a built-in security hole that
hackers can exploit to steal unencrypted data.
Risky behaviors inherent in mobile apps include:
- Accessing the user contacts on a smartphone (including the contact information that may come from corporate email that syncs to the phone)
- Accessing the user's calendar information
- Collecting or determining the user's location and tracking his movements
- Passing along any or all of this information to ad networks or analytics companies
According to Network World, 96% of iOS apps and 84% of Android apps can access at least
one of these data risk categories.
The Hidden Risk: Shortcuts to Get a Job Done
But it isn’t just the risky behaviors built into mobile apps that put data at risk. As with any other form of IT security, it’s ordinary human behavior that is the most significant risk. Ask any employee found violating a company security policy why he or she ignored the rules, and there’s a high likelihood that the answer will be, “I was just trying to do my job.”
Security experts have long known that if employees can’t access the data they need, or perform the task they need to perform, quickly and easily within approved channels, they’ll do whatever it takes – in their mind, at that moment – to get the data and perform the task that they perceive as being important. Mobile printing is a good example of a task that is extremely important in performing a range of jobs that often falls through the cracks of BYOD and mobile security policies.
Jared Hansen, CEO and co-founder of secure mobile print solutions provider Breezy, says that there are three reasons that mobile print security has been the hidden risk factor for many companies. First, the complexity around integrating a smartphone or tablet to a legacy system like printers has made this space hard to navigate for IT people.
Second, and perhaps more importantly, “Silicon Valley pundits have been predicting the
paperless office for almost two decades, yet the cost of printing business documents remains the second highest administrative expense (after wages) for many companies,” Hansen points out.
He says that it was clear very early in the tablet and smartphone revolution that end users wanted to be able to print from their mobile devices, so some manufacturers now ship the devices with a print button built in, allowing the device to send a print job wirelessly to a nearby printer.
“What’s been forgotten,” Hansen says, “Is that the security focus needs to shift from the device to the apps that access data – managing it, transmitting it, and sometimes repackaging it before sharing it.
“Software companies make money by selling a license to use the software, plus annual renewals or upgrades, and perhaps some services or a support contract. They invest heavily in quality control of their products. If they didn’t, they’d be out of business,” Hansen says.
It’s different in the world of mobile apps, he points out. “In the world of mobile apps, there are hundreds of thousands of developers. They put together code quickly to rush the app to market, and they deliver their product free or at very low cost. So there’s a strong incentive for mobile app developers to reuse and repurpose code, and to collect as much data as possible that can be shared with ad networks and third parties. And that’s a problem for enterprises that
need to protect sensitive data.
”Small development shops or start-ups in search of revenue don't necessarily wait for permission to collect data. Even when I deny an app permission to access my location information, the app can figure it out using geo-IP tracking, cell phone triangulation or Wi-Fi network recognition. Sometimes the user agreement that users accept (and hardly ever read) when downloading an app grants permission to collect and share data beyond that particular app. People don’t realize that the app may have code from ad networks or analytic frameworks built in – and that permission given to one app may be grandfathered to those third parties we
“If I sync my work email with my smartphone, my work contact list can be sent outside the company without anyone knowing,” Hansen adds. Another risky behavior associated with mobile devices is the so-called background permission. A lot of mobile apps say they are going to work in the background.
“What that really means is that they are on all the time, and therefore collect data all the time – even when the user isn’t using the app,” Hansen says. “This is why on-device encryption is an increasingly important part of any secure mobile print solution,” he adds. Every document printed with Breezy is encrypted on the mobile device using public key encryption before it is
submitted for printing, regardless of what app is being used to access the data.
It’s the stuff of an IT manager’s nightmare: a government agency known by its initials sweeps in to audit the company for compliance with a set of vague regulations that may or may not clearly spell out clearly what constitutes compliance.
Increasingly, compliance audits for FINRA, FERPA, HIPAA, MIPPA, NAIC, PCI and 22 other federal standards are focusing on mobile device security. Whether it’s a public Wi-Fi connection in a restaurant or office conference room or an employee owned tablet or smartphone connecting to a corporate network, there’s one place where many compliance audits are finding a crack in the security perimeter: mobile printing.
One reason for the awareness among regulators is a rise in prosecutions and litigation related to the Computer Fraud and Abuse Act (18 USC §1030) or CFA. Publicity about the CFA makes state and federal regulators more intent on compliance related to the most highly publicized data breaches – and increasingly, such breaches include some kind of mobile device or removable storage device.
Shawn E. Tuma, an attorney recognized nationally as an expert in computer fraud and the legal issues surrounding data security, says that 90% of businesses have suffered a data loss that could be considered computer fraud under the CFA – and that’s just within the past 12 months. Tuma points out that cell phones, tablets, and printers all meet the definition of a computer for purposes of the CFA.
That’s because in 2011, in U.S. vs. Kramer, the U.S. Eighth Circuit Court of Appeals ruled that a computer could be defined as any device with storage and processing capabilities – and the Fourth Circuit Court of Appeals took things a step further specifically naming devices like watches, telephones, MP3 players, and printers so long as they are “protected” under the CFA. What does it take for a device with a processor and storage capabilities to be “protected” under the CFA? It has to be connected to the Internet or a network that is connected to the Internet.
Compliance Rules for Mobile Printing
The first rule is that there is no consistent standard for mobile printing compliance. The rules vary depending on what kind of business you work in. For instance, if your business is subject to FINRA, NAIC, FERPA or HIPAA oversight – meaning that your network process, stores, or handles banking, financial services, insurance, health care, pharmaceutical, or educational data – then the security standards for mobile devices and printers are the same as those for any other “computer”.
In a compliance audit, you may be asked to show that:
- Data stored on these devices can be remotely wiped in the event of a data breach.
- Access to data stored on these devices – temporarily or permanently – is restricted and monitored, with accessible logs.
- You have secured the data on these devices with “appropriate measures” that meet industry standards.
If that’s not completely clear to you, then you’re not alone. The truth is that the CFA and the various industry oversight regulations are very complex, and the rules for compliance continue
to change and evolve. In general, most compliance experts advise businesses to:
- Ensure that software and systems are updated regularly, including installing any recommended patches.
- Remediate identified vulnerabilities.
- Encrypt data.
- Establish data surveillance and IT alert policies
For specifics on what compliance rules apply to your industry, check on the compliance guidelines published by national trade associations.
Closing the Mobile Printing Security Gap
Breezy is the only mobile print provider that secures data on any mobile device – iPhone, iPad, Android tablet or smartphone, or BlackBerry device – with military-grade encryption before transferring the encrypted files safely via SSL to any approved printer or print network. Breezy
can be installed in minutes, and is already integrated with five of the top 6 mobile security platforms.
Add Breezy to these general tips on compliance, and you’ll be ready for any federal or state compliance audit.
- Understand your users' habits as well as their physical environment. For example, hospitals have to cope with lead-walled radiology departments, and every business runs into issues with elevators, bathrooms, 1970’s era concrete and steel buildings, and interference from amateur radio bands.
- Build future bandwidth needs into any security plan. If your company doesn’t currently use VoIP, or a unified communications system, chances are that it will soon. A dramatic increase in the number of tablets and smartphones accessing the company network via Wi-Fi is also a near certainty in many industries.
- Check references for any vendor you’re considering for a secure mobile print solution. Make sure they can support the current range of printers in your network, and aren’t tied to any specific manufacturer, and talk to the vendor's current customers and to the mobile security or MDM vendor you’re using to make sure that their integration meets other vendor’s standards.
- Consider guest use carefully. What information will you collect from guests who log on to the network? Email addresses only? How will you limit their use of the network, as well as secure protected data? Firewalls; network partitions; strong authentication; wired equivalent
privacy, or WEP; key management; and expiration can all be part of the plan.
- Plan to monitor for rogue access points. A rogue access point can be “friendly fire” – an executive bringing in a router or personal printer for convenience in his office, for example – not a hacker attempting to penetrate the network. Build a written policy for rogue access points into your plan, and make sure that the secure mobile print solution you select can manage a user’s attempts to skirt policy by adding unapproved devices.
Breezy, the leading provider of secure mobile device print solutions, has been added as a sponsor to the AirWatch Connect 2013 User Group Conference this week in Atlanta.
Breezy will be showcasing its secure enterprise mobile device printing solution in the App Pavillion during the show, which opens this morning and continues through Thursday at the Hyatt Regency Atlanta (265 Peachtree Street NE Atlanta, GA, 30303).
Breezy is a printer-agnostic application that provides on-device encryption for any mobile device (iOS, Android, BlackBerry, and Windows tablets and smartphones). Breezy is fully integrated with AirWatch, the global leader and innovator in mobile security and the largest Enterprise Mobility Management (EMM) provider.
Jared Hansen, CEO of Breezy, says that participating in Connect Atlanta is an exciting opportunity for Breezy. “This is a collaborative forum that will bring together leading users of AirWatch’s EMM solutions, top industry analysts, and the vendors and suppliers who are helping enterprises adapt to the changes required to protect sensitive data and keep up with ever-changing compliance rules. We’re very proud to be part of the process, and to be able to offer the missing link in many mobile security solutions with our proven secure mobile print app.”
For details about AirWatch Connect, visit the conference website at http://www.air-watch.com/connect/atlanta-2013/
Two recent surveys confirm what many IT managers have long suspected: if employees are unhappy with company policies on mobile devices or strict mobile security policies that they see as hindering their ability to get work done, they will find a way around the policies so that they can use unsecured devices to access company files.
Every day, IT walks a fine line between balancing mobile security issues and giving people the tools they need to get the job done. Every day, employees move sensitive data around. IT is in charge of securing that data, but what about things like secure mobile printing that tend to fall through the cracks?
Employees cite the need to work while “on the go”, as well as the difficulty of complying with company mobile security policies as reasons for violating policy. For most IT managers and compliance officers,
however, the reasons for the security risks posed by mobile devices are less important than the fact that sensitive data is being put at risk.
For example, a survey done by Harris Interactive on behalf of Fiberlink asked 2,064 U.S. adults about their mobile behavior. Most of the survey respondents said their behavior was “just an effort to get the job done”, but they could still expose sensitive corporate data.
- More than 50% reported uploading sensitive data to cloud services like Dropbox, Google Drive, and iCloud.
- More than 70% of Millennials use their own phones and tablets for work, and open sensitive data in mobile apps such as QuickOffice, Dropbox, or Evernote that aren’t covered by corporate security protections.
- 84% of respondents reported sending sensitive data via their personal email addresses, usually free mail accounts from Google, Yahoo, and other services.
In a survey by Symantec, 62% of respondents said that it was acceptable to transfer work documents to personal computers, tablets or smartphones. The majority of these files, according to Symantec, are never deleted because employees don't understand the risks involved with keeping them. In fact, the company’s director of product marketing, Robert Hamilton, wrote that half of employees who left their position or lost their job in the last 12 months kept confidential company data on personal mobile devices when they left.
The Fiberlink survey adds some disturbing detail to this by reporting that 51% of employed U.S. adults surveyed who have personal smartphones/tablets use these mobile devices for work-related purposes and a third of those in the survey reported that they have lost a USB drive with confidential information on it.
Don’t Add Mobile Printing to Security Risks
One of the employee behaviors that could put company data at risk is transferring files to unsecured workstations (desktops or laptops) because employees need a way to print files stored on mobile devices like smartphones and tablets. Fortunately, there’s a simple, easy-to-use solution that gives employees real ease-of-use and secure mobile printing from any device.
That solution is Breezy. It’s the only scalable solution that can handle high-volume mobile printing to any printer on any network, from any mobile device, with secure device-level encryption for sensitive data. But don’t take our word for it. Check out what Gartner had to say about Breezy in its 2013 report on Cool Vendors in Imaging and Print Services.
Or see for yourself, with a free trial of Breezy’s secure mobile print solution for your company. You’ll be able to deploy the app across your existing print infrastructure in minutes, allowing your users secured, policy-compliant printing from any mobile device, whether at headquarters or through the global Breezy Partner Network of print locations. Click here to start your free
Forrester Research Analyst Michael O’Grady says that if you don’t own a tablet yet, you probably will soon. In a new forecast on the tablet market, O’Grady and his team predict that 6 out of 10 consumers in North America will own a tablet by the year 2017. Worldwide, the report predicts sales of tablets will reach 381 units in 2017, resulting in a global installed base of 905 million units.
The report also says that companies will continue to ramp up their adoption of tablets in the workplace, with about 18 percent of all tablets bought by 2017 used exclusively for work. As this happens, the need for mobile device management tools will skyrocket – and so will the need for mobile printing solutions.
Forrester analyst J.P. Gownder wrote that while companies are now purchasing tablets for specific classes of workers – such as field salespeople and front-line customer support personnel – the number of employees who are bringing their own devices to work is exploding.
However, Forrester says the current mix of BYOD and company-issued tablets is also changing with a new model: companies sharing the cost of a tablet purchase with an employee who wants to be able to select a specific brand, with specific features. These picky consumers don’t want to risk letting the IT department dictate what brand of tablet they use, or whether they have options like an external keyboard, or what carrier provides their Internet access, so they’d rather buy their own device – or split the cost with an employer.
Jared Hansen, CEO of Breezy, agrees with the analysts who say that consumers remain the driving force in tablet adoption within corporate America. “With more and more employees selecting the brand of tablet they are using, the need for a secure way to allow these tablets to access company resources is becoming critical. We’re getting more and more inquiries from companies that need to provide access to secure printing from a very wide range of tablets. It’s something that mobile device management software tools often forget.
“The ability to enable a fleet of printers for secure printing from any mobile device in seconds is the primary reason that Breezy is becoming the mobile printing leader,” Hansen added.
As tablets pass the threshold from new technology (less than 50% consumer usage) to mainstream technology, the demand for secure wireless mobile print solutions will continue to grow. Forrester predicts that tablets will achieve 50% of the U.S., Canadian, Japanese, Hong Kong, and Korean markets in about three years (by the end of 2016 or beginning of 2017), with Europe lagging slightly behind with tablets becoming mainstream in 2019.
Photo credit: This photograph of a sales person using a tablet computer was offered on Flickr under a Creative Commons License.
Today at Citrix Synergy™, Citrix announced the new Citrix Ready Worx Verified
program - and Breezy is pleased to be an inaugural launch partner.
What does this mean? In short, it means that Breezy has become Citrix Ready Worx Verified, integrating with the new Citrix Worx SDK, a set of mobility management tools that enables Citrix MDX technology to provide security and streamlined IT control of numerous like data encryption, password authentication, inter-app communication and micro-VPNs. And of course, it means that Citrix customers and resellers can now benefit from the industry's leading secure mobile print technology.
By way of a little more background on MDX Technologies and the Worx Verified program: Citrix MDX Technologies, a set of key features of Citrix XenMobile, enable complete management, security and control over native mobile apps and their associated data. With MDX technology, corporate apps and data reside in a container, separated from personal apps and data on the user’s mobile device. This allows IT to secure any custom developed, third-party or bring-your-own (BYO) mobile app with comprehensive policy-based controls, including mobile DLP and the ability to remote lock, wipe and encrypt apps and data.
As a Citrix Ready Worx Verified partner, Breezy will soon be available to over 260,000 existing Citrix enterprise customers. We're very excited about this partnership, as it extends Breezy's secure mobile printing capabilities even further, and soon we will be featured in the Citrix Worx App Gallery when it launches in early Q3.
To learn more about Breezy's secure mobile printing for your enterprise, download our datasheet:
The future looks bright as Breezy races ahead with a new corporate logo.
As we head into the weekend, we thought you'd enjoy a preview of our new modern logo and design direction.
Did we dislike our original logo? No! Actually, we are all quite fond of it and feel it has served us well over the last couple years. But like any forward thinking brand, we think change is good - and we believe our new logo clarifies, and launches Breezy into our next phase of growth.
We will miss the always enjoyable musings about our original logo, including “It’s Breezy! Easy!”, “Are you sailors?”, “Are you a clean energy [wind] company?”, “Are you a Cloud provider?”, “Life should be Breezy!” and my personal favorite: “Your logo just makes me happy when I see it.” Now I can’t argue with that one, so why make the change?
Changing your corporate logo or tagline is not something you do lightly, no matter how big or small your business. It is the visual representation to the world at large of who you are as a company - including employees, products, services and reputation.
I’m sure, at this very moment, you can rattle off a few brands that have changed logos or taglines for better or worse: Apple, Pepsi-Cola, Shell, Ford Motor, Starbucks and Microsoft all come to mind. (And for those interested in the art and science of logo design, here’s a cool blog post that looks at the transformation of well known company logos over time: http://www.hongkiat.com/blog/logo-evolution/.)
In the two years since our original logo was developed, Breezy has grown to become the leading mobile printing platform for the security minded enterprise around the world. As our base of global enterprise customers and technology partners has grown, we felt this was a great time to strengthen and position our logo with our future direction in focus.
Sarun Pinyarat, a new design intern at Breezy, was excited to explore visual opportunities that highlight the brand and our key business elements: secure, mobile, print, cloud, integrated system, easy to use, and of course our name, Breezy.
The new logo needs to work across multiple formats, including web, print, mobile app icons across multiple devices on iOS, Android and Blackberry, quick launch icons and system tray icons - and it needs to be uniquely and easily identifiable as Breezy.
Here’s a brief snapshot of the visual journey Sarun took before arriving at the final design:
While the image of a cloud printing a sheet of paper is not exactly new, the visual solution Sarun came up with captures the key markers of Breezy’s business, and graphically indicates some differences from our competitors.
All the elements of the logo are interconnected, and can be read clockwise as a cycle: from the beginning of the process – “b”, up to the cloud, then down to the end – “y”, the outcome is a securely printed page. Since the word “breezy” is among very few that can provide such a seamless form, it reaffirms exactly who we are:
The world’s leading provider of fully integrated, secure mobile printing.
The interconnected aspect of the logo is a key differentiator of Breezy's platform in relation to our competitors. We believe the ecosystem is as important as the app in providing the user with a secure, functional, seamless experience. Breezy integrates with leading mobile security platforms, identity federation companies and pull print providers to provide a cohesive and secure end-to-end experience.
Mobile printing in a business setting is rarely a standalone event. The user needs to access secure information across various types of apps and devices, and then securely make the information available to Breezy for encryption and transmission to the printer of choice. Breezy ensures all these pieces of the puzzle work seamlessly behind the scenes, allowing the user to print easily, when and where they need to, from any mobile device.
You'll be seeing the new logo soon across our website, documentation and mobile apps. We hope you like it!
To learn more about how Breezy works for the mobile enterprise:
For a closer look at Breezy's Enterprise Edition, download the datasheet: