Interested companies are encouraged to review the Benefits of Membership and apply today!Join Now
Unfamiliar with a term used in this section? Check the TCG Glossary of TechnicalTerms for the definition.
- Frequently Asked Questions - Trusted Mobility Solutions
Trusted Mobility Solutions
Users everywhere increasingly rely on mobile platforms, including smartphones, tablets and notebook PCs, to do real work - no matter where they are located. A recent report from IDC noted that almost a third of enterprise users access or do corporate work on a smartphone, and tablet sales have skyrocketed. These smart, connected devices join hundreds of millions of notebooks that present significant security issues for IT and security staff.
TCG's Trusted Mobility Solutions (TMS) Work Group provides solutions guidance to those interested in leveraging Trusted Computing technologies to help ensure security of the devices, networks and data. For example, secure mobile devices ideally have trustworthy device identity and device integrity as well as secure storage. In an enterprise environment, trusted mobile devices also must be integrated with provisioning, access control and application or data protection mechanisms. Ideally, trusted mobile devices then can enable a variety of secure applications, including mobile payment and financial services, healthcare and others.
The TMS Work Group aims to define an architectural framework, use cases, implementation guidelines and best practices, incorporating existing industry standards as well as established, proven Trusted Computing technologies.
Today, just about every device or machine in an office, factory, distribution center or any other enterprise is a computer or contains a computer of some sort. No longer are computers limited to desktop PCs and servers and to complicate IT matters, all of these non-PC computing devices are connected in some way.