New & Notable

Evaluate

5 top mobile security courses and certifications for IT

To stay on top of new threats, IT pros can test their skills with mobile security training. Explore the top programs to learn about mobile attacks, penetration testing and more.

Manage

How to incorporate smishing into security awareness training

Smishing is a major threat on enterprise smartphones, but users might not know how it compares to traditional email phishing. IT can help block attacks with training and testing.

Get Started

Building mobile security awareness training for end users

Do concerns of malware, social engineering and unpatched software on employee mobile devices have you up at night? One good place to start is mobile security awareness training.

Get Started

How to remove a work profile from an Android device

When a user leaves their organization or loses their device, it's time to remove their Android work profile. Learn three methods to delete a work profile on an end-user device.

Find Solutions For Your Project

Mobile Computing Basics

  • Get Started

    What is Samsung Galaxy?

    Samsung Galaxy is a product line of Android smartphones, tablets and internet of things devices manufactured by Samsung Electronics.

  • Get Started

    What is the consumerization of IT (IT consumerization)?

    The consumerization of IT refers to how software and hardware products designed for personal use have migrated into the enterprise and are used for work purposes.

  • Get Started

    What is Google Drive?

    Google Drive is a cloud-based storage service that allows users to store and share files online.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Vendor Resources

Sections from across Search Mobile Computing