Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 701

Mobile VPN

What is Mobile VPN?

Mobile VPNA virtual private network designed for smartphones and tablets, tunnelling traffic from a mobile device to a corporate gateway or a privacy-focused provider over cellular and Wi-Fi links.


Mobile VPNs use protocols such as IKEv2/IPsec, WireGuard, and OpenVPN, with platform features like iOS Per-App VPN and Always-On VPN on Android Enterprise allowing fine-grained control. Enterprises deploy them through MDM to gate access to internal apps and pair them with conditional access; consumers use them to encrypt traffic on untrusted Wi-Fi and to mask their IP. Risk areas include malicious or low-trust VPN apps in app stores that log and sell user traffic, DNS leaks, kill-switch failures that expose traffic when the tunnel drops, and split-tunnel misconfigurations. For high-risk users, Mobile VPNs are increasingly being replaced or complemented by ZTNA solutions that authenticate per request rather than tunnelling all traffic to one perimeter.

Examples

  1. 01

    An iPhone uses an iOS Per-App VPN profile to route only the corporate email app over an enterprise IKEv2 gateway.

  2. 02

    A consumer WireGuard app encrypts traffic on a hotel Wi-Fi to prevent local network attackers from reading HTTP traffic.

Frequently asked questions

What is Mobile VPN?

A virtual private network designed for smartphones and tablets, tunnelling traffic from a mobile device to a corporate gateway or a privacy-focused provider over cellular and Wi-Fi links. It belongs to the Mobile Security category of cybersecurity.

What does Mobile VPN mean?

A virtual private network designed for smartphones and tablets, tunnelling traffic from a mobile device to a corporate gateway or a privacy-focused provider over cellular and Wi-Fi links.

How does Mobile VPN work?

Mobile VPNs use protocols such as IKEv2/IPsec, WireGuard, and OpenVPN, with platform features like iOS Per-App VPN and Always-On VPN on Android Enterprise allowing fine-grained control. Enterprises deploy them through MDM to gate access to internal apps and pair them with conditional access; consumers use them to encrypt traffic on untrusted Wi-Fi and to mask their IP. Risk areas include malicious or low-trust VPN apps in app stores that log and sell user traffic, DNS leaks, kill-switch failures that expose traffic when the tunnel drops, and split-tunnel misconfigurations. For high-risk users, Mobile VPNs are increasingly being replaced or complemented by ZTNA solutions that authenticate per request rather than tunnelling all traffic to one perimeter.

How do you defend against Mobile VPN?

Defences for Mobile VPN typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Mobile VPN?

Common alternative names include: Mobile virtual private network, Phone VPN.

Related terms