Mobile Security

Mobile Security

In a dramatic transition the last few years, today's enterprise workers increasingly rely on mobile devices, including smartphones and tablets. In fact, one study noted that 73 percent of enterprises now allow non-IT managed devices to access corporate resources. That opens corporate data and networks to significant security risks.

Trusted Computing offers many solutions to securing mobile devices and ensuring the bring-your-own-device trend, known as BYOD, does not result in data loss or breaches, malware, unauthorized network access or other security challenges.

For example, enterprises today can use existing Trusted Network Connect (TNC) industry standards to ensure that guest workers, contractors and on-the-go staff safely and securely connect to the corporate network.

Mobile phones themselves can be secured via the Mobile Trusted Module, or MTM, developed in TCG by leading mobile phone vendors and the mobile phone community. By including the hardware root of trust in the device itself, secure transaction, safe storage of keys and certificates and assurance of integrity can be implemented.

Finally, TCG is developing implementation guidance and reference architectures to tie together existing and emerging Trusted Computing Group specifications and technologies.

icon

Protect Your Data and Enhance Security

View this infographic on protecting your data and enhancing your security with TPM 2.0.

February 2014 | White Papers | Add to Briefcase

icon

Architects Guide: Cybersecurity

Enterprises are under attack — and the frequency and severity of the resulting breaches continues to escalate.

October 2013 | White Papers | Add to Briefcase

icon

GlobalPlatform, Industry Interviews | Trusted Computing Group

In 2012, GlobalPlatform and the Trusted Computing Group (TCG) created a joint work group to enable the sharing of expertise and collaboration around mobile device industry standards. In our latest industry interview, John Mersh, editor of the Mobile Platform Working Group of the TCG, discusses the motivation for establishing the joint initiative and provides insight into the group's current priorities.

July 2013 | White Papers | Add to Briefcase

icon

Implementing Hardware Roots of Trust

SANS Institute has developed a first-of-its-kind guide and informational webcast to update organizations on exciting new uses for implementing hardware roots of trust, enabled by the Trusted Platform Module.

June 2013 | White Papers | Add to Briefcase

icon

TPM MOBILE with Trusted Execution Environment for Comprehensive Mobile Device Security

This whitepaper introduces how GlobalPlatform Trusted Execution Environment (TEE) and Trusted Computing Group Mobile Trusted Module (TPM MOBILE) can work together in mobile devices to provide security, peace of mind and enhanced services to users.

June 2012 | White Papers | Add to Briefcase

  • 1-5