New & Notable

Get Started

How to choose and set up a mobile VPN for an iPhone

Many users perform work tasks on their iPhones, relying on mobile VPNs to securely access corporate resources. Learn about VPN options for iPhones and how to set up these systems.

Manage

How do mobile VPNs work?

Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN.

Evaluate

5 top mobile security courses and certifications for IT

To stay on top of new threats, IT pros can test their skills with mobile security training. Explore the top programs to learn about mobile attacks, penetration testing and more.

Manage

How to incorporate smishing into security awareness training

Smishing is a major threat on enterprise smartphones, but users might not know how it compares to traditional email phishing. IT can help block attacks with training and testing.

Find Solutions For Your Project

Mobile Computing Basics

  • Get Started

    Apple iOS

    Apple iOS is a proprietary mobile operating system that runs on mobile devices such as the iPhone and iPad.

  • Get Started

    Apple watchOS (Apple Watch operating system)

    Apple watchOS is the operating system (OS) designed specifically for the Apple Watch wearable device, with features that take advantage of the smaller screen and location of the device on the user's wrist.

  • Get Started

    What is Cisco ISE?

    Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to end users and devices.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Mobile Computing