New & Notable

Get Started

How to choose and set up a mobile VPN for an iPhone

Many users perform work tasks on their iPhones, relying on mobile VPNs to securely access corporate resources. Learn about VPN options for iPhones and how to set up these systems.

Manage

How do mobile VPNs work?

Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN.

Evaluate

5 top mobile security courses and certifications for IT

To stay on top of new threats, IT pros can test their skills with mobile security training. Explore the top programs to learn about mobile attacks, penetration testing and more.

Manage

How to incorporate smishing into security awareness training

Smishing is a major threat on enterprise smartphones, but users might not know how it compares to traditional email phishing. IT can help block attacks with training and testing.

Find Solutions For Your Project

Mobile Computing Basics

  • Get Started

    What is Cisco ISE?

    Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to end users and devices.

  • Get Started

    How to choose and set up a mobile VPN for an Android phone

    A tailored approach to network security is crucial when managing smartphones in the enterprise. IT teams should consider Android VPN options for their organization.

  • Get Started

    What is a SIM card and how does it work?

    A SIM card, also known as a subscriber identity module, is a smart card that stores the information necessary for a smartphone to connect to a mobile network.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Mobile Computing