Endpoint encryption refers to encrypting the data stored on "endpoints," such as laptops, phones, and tablets. Encryption is the process of transferring normal words and numbers, called plain text, into an unreadable form of letters, numbers, and symbols, called ciphertext, which cannot be easily read without the key from authorized people.
The state utilizes two different software pieces to handle encrypted drives. The first is Wave, a hardware-based encryption, and the other is Bitlocker, a software-based encryption. Wave encrypts the whole hard drive and is only able to be decrypted by a user entering in a password to get access. After the password is entered correctly, it will boot into the operating system and allow them to work. To use this kind of encryption, you must have a self-encrypted drive (SED) that will allow Wave to manage the device. Bitlocker is enabled within the operating system. Users will only have to enter a key if an unauthorized party tries to access the hard drive while it’s powered off. Because it’s based on the operating system, if a hard drive is wiped, Bitlocker Encryption will also be wiped off.
Wave Systems has declared bankruptcy; therefore, ITD is in the process of selecting and implementing an alternative solution for agencies that currently utilize Wave. This page will be updated once a new solution is available. Contact the Service Desk for more information.
ITD's online Work Management System (WMS) may be used to submit a "Generic" service request.
Ensures that sensitive information is encrypted.
Wave Systems, a developer of hardware based encryption technology used by the state, has filed for bankruptcy. ITD will provide updates on this topic through the monthly Information Technology Coordinators Council meeting.
Desktop Support is a holistic approach to managing all of the personal computing devices within an organization, including laptops, tablets, and mobile phones.