Blog Banner

Breezy Blog - Mobile Printing Experts

Gartner: AirWatch, Citrix, Good, IBM & MobileIron Stay on Top

Posted on Tue, Jun 23, 2015

Breezy integration partners AirWatch, Citrix, Good Technology, IBM and MobileIron made it into the coveted leaders' quadrant again this year in Gartner's 2015 Magic Quadrant for Enterprise Mobility Management Suite report. Several other vendors (Symantec, Tangoe, and Absolute Software) were dropped, and Microsoft was included in the visionaries’ quadrant for the first time along with smaller companies Sophos and Soti.

Read More

Tags: AirWatch, MobileIron, Gartner, IBM FiberLink MaaS, Citrix, Gartner EMM Magic Quadrant, AirWatch by VMware, Good Technology

Come & Visit Breezy at Mobile First This Week!

Posted on Tue, Jun 09, 2015

Do you need more reasons to attend MobileIron’s Mobile First Conference this week in San Francisco? How about these statistics, then.

Read More

Tags: mobile security, Breezy, MobileIron, mobile device security,, Mobile First conference, new security threats 2015

Come & See Breezy at Mobile First 2015 June 9-12 – San Francisco

Posted on Tue, May 26, 2015

Breezy is proud to be a sponsor of MobileIron’s Mobile First Conference, June 9-12, 2015, at the Hilton Union Square in San Francisco.

Read More

Tags: secure mobile printing, MobileIron, Mobile First conference, MobileIron user conference 2015

Texas BYOD Case’s Important Lessons for Employers & Employees

Posted on Thu, Apr 02, 2015

(Note: This article was written by Carl Spataro for the MobileIron blog, and was originally published on that blog on March 27, 2015. It is reprinted here with permission, because we think the information it contains is important for anyone concerned with issues of mobile device security, privacy, and management.)

A recent Texas case holds several simple but important lessons for implementing BYOD (mobile) policies for employers and employees alike. In Rajaee v Design Tech Homes et al., (Dist. Court, SD Texas, 2014), Saman Rajaee sued his employer, Design Tech Homes, for remote wiping personal data from his iPhone shortly after Rajaee gave notice of resignation. Rajaee cited violations of both federal and state law. Although the case was dismissed in federal court, the state court claims are still pending.

Read More

Tags: CFAA, MobileIron, BYOD, privacy, BYOD planning

What CIOs Can Learn from Shadow IT

Posted on Thu, Feb 19, 2015

When employees or groups of employees rely on unmanaged devices, source their own mobile apps and cloud services, and create their own technology workflows, it’s called shadow IT. And for most IT departments and CIOs, shadow IT is a major feature in nightmares and security worries.

Read More

Tags: secure mobile printing, MobileIron, shadow IT

How to Keep Your Data Safe on Their Mobile Devices

Posted on Tue, Jan 20, 2015

As any IT professional can attest, the main challenge with BYOD can be summed up in a single sentence. “IT does not control the content and configuration of the device.”

Since the mobile devices belong to individual employees, IT policies calling for the company to view or wipe personal data are problematic. So most enterprise mobility management or mobile device management tools piggy-back on top of the user’s personal data, so that it can be removed when the device is no longer used for work.

Read More

Tags: secure mobile printing, mobile security, MobileIron, EMM, data security, enterprise mobility management

What’s Different About Mobile Security?

Posted on Tue, Oct 21, 2014

Now that mobile devices are rapidly becoming the primary end-user computing platform in many workplaces, the world of information security is undergoing a profound shift. That’s because securing corporate data and minimizing risk requires a different approach in a mobile first world than in a PC-centric computing environment. That’s the key message in a new white paper from Breezy partner MobileIron, which is available for free download at this link.

The 12-page white paper explains that there are two key reasons why IT needs to adopt new strategies for securing corporate data on mobile devices, as compared to PCs. First, IT has reduced control over mobile devices. The Mobile First era is all about the end user. They get to pick a mobile platform that best meets their personal preferences, with the expectation that the device should also work in a business context for the full range of apps and content needed to stay productive.

This is in stark contrast from the PC era where IT offered end-users an approved PC with a set of pre-selected apps. End-users had very limited say on what the PC was able to access and IT had the ability to control every aspect of the corporate-owned device from physical ports, to software and application versions. For mobile, end-users make the decision for many of these variables and IT can only recommend devices and applications. IT has no way to enforce a standard OS, device or app across the organization. In fact, the more IT tries to lock down devices, the more end-users will try to by-pass policies, increasing risk to the organization, the report says.

Second, old security models are no longer relevant. In the PC operating system scenario, the agent-based security method worked well. This involved a piece of software residing on the PC that controlled the process and data belonging to other applications. Unfortunately, this agent-based security model cannot be used to secure Mobile because of the differences in the way these operating systems are designed.

Mobile operating systems are designed using a sandboxed architecture which enables for isolation of apps and associated data which can only interact and share data through very well-defined mechanisms. This allows for greater security than the open-file system used by PC OS, and needs new tools that leverage specific security capabilities made available by the device vendor itself.

Different Threats Require Different Responses

Prat Agarwal, director of business development at secure mobile printing leader Breezy, agrees with the new MobileIron white paper that mobile devices expose company data to different threats. “Enterprise Mobility Management (EMM) tools help companies minimize risk and protect data without interfering with end-user productivity,” Agarwal says. “The methods are different than those used in a PC-only environment, because the threats are different.”

The differences include device-based threats such as:

  • Always-on connectivity which could allow unauthorized parties to access business data.
  • Software vulnerabilities that allow “jailbreak” or “rooting” of devices, compromising data security.
  • Portable form-factor making the devices susceptible to theft and misplacement.

In addition, mobile devices are always connected to the Internet, and users often rely on untrusted public networks that provide a way for malicious parties to access and intercept transmitted data using rouge access points, Wi-Fi sniffing tools, and sophisticated man-in-the-middle attacks. Agarwal says, “The only proven way to protect against man-in-the-middle attacks is on-device encryption. That’s why Breezy encrypts every file: so the simple act of sending a document to a printer doesn’t open the door to this kind of attack.

For more information about the kinds of threats posed by mobile devices, and how to combat them with proven tools, download the new MobileIron white paper, or the mobile threats infographic available at the same link, watch this video from Breezy, or download The Definitive Guide to Mobile Printing, a free ebook from Breezy.

 

Graphic credit: The graphic is part of an infographic called Security in the Mobile First Era by MobileIron; ©2014 MobileIron.

 

Read More

Tags: mobile security, MobileIron, Breezy for Enterprise

Gartner Announces 2014 EMM Magic Quadrant Leaders

Posted on Wed, Jun 11, 2014

This week, Gartner released the 2014 Magic Quadrant results in the new Enterprise Mobility Management (EMM) category. In past years, Gartner called this category “MDM”, or mobile device management, and the name change signals Gartner’s view that the category has evolved from a point solution to a more comprehensive platform.

Read More

Tags: AirWatch, Breezy, MobileIron, Mobile Iron, enterprise mobility, Gartner, IBM FiberLink MaaS, Good Work and Dynamics Printing, Citrix Mobile Printing Worx

Breezy Heads to Mobile First Conference June 17-20

Posted on Sat, Jun 07, 2014

Breezy, the leading provider of secure mobile device print solutions, will be showcasing its MobileIron AppConnect secure mobile printing solution during the fourth annual MobileIron Mobile First User Conference June 17-20 at the Hyatt Regency in San Francisco.

Read More

Tags: Breezy, MobileIron, Mobile Iron, MobileFirst User Conference, MobileIron User Conference 2014

Securing the Mobile Print Environment with MobileIron & Breezy

Posted on Tue, May 13, 2014

As you work to enable mobile productivity, have you thought about what happens to the paper-based portions of your workflow? For many companies, unsecured apps downloaded by employees seeking to print from their mobile devices can pose a significant mobile security issue.

Read More

Tags: secure mobile printing, Breezy, MobileIron Printing with AppConnect, mobile device management, MobileIron, Mobile Iron

Email Subscription

Follow Us

Browse by Tag