TCG Guidance for TPM 2.0 Mobile Implementations


Today, both at work and at home, more users than ever before rely on their mobile phones, tablets, and other mobile devices to keep in touch and get things done. With Bring Your Own Device, Choose Your Own Device, and other Enterprise- Owned Device models, business and personal data now coexist on the same device. More and more devices also means a growing attack surface for those who aim to cause harm.