Interested companies are encouraged to review the Benefits of Membership and apply today!Join Now
Unfamiliar with a term used in this section? Check the TCG Glossary of TechnicalTerms for the definition.
- Frequently Asked Questions - Trusted Mobility Solutions
Trusted Mobility Solutions
Users everywhere increasingly rely on mobile devices (including smartphones, tablets, and laptops) to do their work – no matter where they are located. A 2011 report from IDC noted that almost a third of enterprise users were accessing corporate resources and doing their corporate work on a smartphone. Since then, smartphone and tablet sales have skyrocketed. These smart, connected devices augment and often replace the hundreds of millions of laptops that already present significant security issues for corporate IT and security staff.
TCG's Trusted Mobility Solutions (TMS) Work Group’s mission is to provide solutions guidance to individuals and organizations interested in leveraging Trusted Computing technologies to help ensure the reliability of their mobile devices, networks, and data. For example, mobile devices ideally should include trustworthy device identity, device integrity, and secure storage. In enterprise environments, trusted mobile devices should also be integrated with policy provisioning, strong authentication, access control, and application and data protection mechanisms. These trusted mobile devices could support a wide variety of sensitive applications, including mobile banking, mobile payment, and healthcare.
The TMS Work Group is defining detailed use cases and a continually evolving solutions framework that includes implementation guidelines and best practices and incorporates proven Trusted Computing technologies along with other established industry standards.
The TCG Trusted Mobility Solutions (TMS) use cases consider a broad range of scenarios where TCG technology can be applied in the mobile embedded devices’ context and ecosystem.