Blog Banner

Breezy Blog - Mobile Printing Experts

Making EMM FUN

Posted on Thu, Sep 18, 2014

A Screw’s Loose is one of the more interesting technical blogs out there. Katz, a Director of Mobility Engineering at Sanofi and a widely recognized thought leader in enterprise mobility, wrote a great post recently on the a continuing gap between what users want and what IT delivers – and noted that the cause of that gap is the way IT views the users.

In the post, Katz writes that IT shouldn’t view employees as IT users, but as IT customers. Changing the definition makes a big difference in how products and services are developed, rolled out, and supported. “Whenever people talk about creating apps the conversation turns to delighting the customer. Companies build apps that will delight people. They will have a great user interface (UI) and an even better user experience (UX). They will enable people to do what they want/need to do. We learn from day one when you walk into a company it’s all about pleasing the customer. That’s why we build consumer apps the way that we do,” Katz wrote.

Read More

Tags: mobile security, enterprise mobility, EMM, mobile app development, IT mobility planning, mobile apps

Why School District 1:1 Mobile Device Programs Fail

Posted on Tue, Sep 09, 2014

As schools around the country kick off the 2014-2015 school year, the headlines seem tell a story of one school district after another abandoning highly touted programs to put laptop or tablets into the hands of every student. Here are just a few recent articles that seem to mark these programs as failures:

Read More

Tags: secure mobile printing, mobile security, mobile device management, mobile devices, education, K-12 iPad deployment, K-12 1:1 mobile device deployment, Breezy in education, Chromebook K-12 usage

The BYOD War is Over & Users Won: Now What?

Posted on Wed, Sep 03, 2014

IDC says that 1.2 billion workers were using mobile devices at the end of 2013. If there was a battle about whether or not mobile devices were welcome in the workplace, the war is over and users won. In fact, IDC says that the adoption of mobile technology is moving at unprecedented speeds, putting the needs and experience of end users at the forefront of any company's mobile enterprise strategy.

Read More

Tags: mobile security, mobile device management, BYOD, Gartner, Radicati,, IDC

Changing Questions Posed to Analysts Highlight “Absurd” Pace of Change in Securing Mobile Devices

Posted on Fri, Aug 15, 2014

Four years ago, in June 2010, Forrester Analyst Michele Pelino wrote a blog post that summarized the top questions that Forrester clients asked about mobile devices and mobile applications. Pelino wrote that in the previous 12 months, 700 of the 22,000 inquiries that Forrester analysts fielded from clients were related to enterprise mobility issues, a jump from 360 in 2007.

Read More

Tags: secure mobile printing, mobile security, IT security, mobile devices, Forrester Research,

Keyloggers & Other Business Center Security Worries

Posted on Tue, Jul 15, 2014

When business travelers are on the go and need to print, a trip to the business center at a hotel, airport or convention center can be a lifesaver. This week, however, security blogger Brian Krebs published a memo from the U.S. Secret Service warning that criminals have been compromising hotel business center PCs with keystroke-logging malware, in a bid to steal personal and financial data from guests.

Read More

Tags: secure mobile printing, mobile security, Breezy Partner Network

Mobile Security Threats Grow with Mobile Device Penetration

Posted on Tue, Jul 01, 2014

Every year, tech venture capital leader Kleiner Perkins Caulfield Byers (KPCB) publishes a report on Internet trends. And every year that report serves as a snapshot that developers, investors and CIOs use to help them plan ahead and check their understanding of important trends.

Read More

Tags: mobile security, enterprise mobility

Mobile App Mistakes May Account for 75% of Mobile Security Breaches

Posted on Tue, Jun 24, 2014

According to Gartner, nearly 2.2 billion smartphones and tablets will be sold to end users in 2014. And it’s a good bet that most of them will wind up housing at least some data that belongs to the device owner’s employer.

Read More

Tags: Android, iPad, mobile security, iPhone, mobile device management, MDM, Gartner, Android security, iPhone security, iPad security

What Google’s End-to-End Encryption Move Means for Mobile Security

Posted on Fri, Jun 20, 2014

Earlier this month, Google announced a new Chrome browser add-on dubbed End-to-End, which is designed to make email more secure. While some media reports trumpeted the move as an attempt to “fly in the face of the National Security Agency”, most reported it simply as an added layer of security for messages delivered via the Internet.

Read More

Tags: mobile security, Breezy, encryption, Google End-to-End encryption

Mobile Security Lessons IT Can Learn from FIFA's World Cup

Posted on Tue, Jun 17, 2014

Football – not the American-style game played with a pointed ball by men in helmets and pads, but the global game played with a round ball by men in shorts --  is suddenly a hot topic in U.S. IT circles.

Read More

Tags: IT, mobile security, IT security, BYOD, 2014 World Cup

Basic Security Steps to Protect Any Business from Cyber Threats

Posted on Tue, Jun 03, 2014

Whether you work in a small business, a growing mid-size business, or a large enterprise, protecting your business from cyber threats can seem like a daunting task. A smaller business may not need the robust protections required for an enterprise, but regardless of the size of your business there are five basic steps that are absolutely essential.

Read More

Tags: secure mobile printing, mobile security, Breezy, security

Email Subscription

Follow Us

Browse by Tag