In a dramatic transition the last few years, today's enterprise workers increasingly rely on mobile devices, including smartphones and tablets. In fact, one study noted that 73 percent of enterprises now allow non-IT managed devices to access corporate resources. That opens corporate data and networks to significant security risks.
Trusted Computing offers many solutions to securing mobile devices and ensuring the bring-your-own-device trend, known as BYOD, does not result in data loss or breaches, malware, unauthorized network access or other security challenges.
For example, enterprises today can use existing Trusted Network Connect (TNC) industry standards to ensure that guest workers, contractors and on-the-go staff safely and securely connect to the corporate network.
Mobile phones themselves can be secured via the Mobile Trusted Module, or MTM, developed in TCG by leading mobile phone vendors and the mobile phone community. By including the hardware root of trust in the device itself, secure transaction, safe storage of keys and certificates and assurance of integrity can be implemented.
Finally, TCG is developing implementation guidance and reference architectures to tie together existing and emerging Trusted Computing Group specifications and technologies.
In 2012, GlobalPlatform and the Trusted Computing Group (TCG) created a joint work group to enable the sharing of expertise and collaboration around mobile device industry standards. In our latest industry interview, John Mersh, editor of the Mobile Platform Working Group of the TCG, discusses the motivation for establishing the joint initiative and provides insight into the group's current priorities.
This whitepaper introduces how GlobalPlatform Trusted Execution Environment (TEE) and Trusted Computing Group Mobile Trusted Module (TPM MOBILE) can work together in mobile devices to provide security, peace of mind and enhanced services to users.