Endpoint encryption refers to encrypting the data stored on "endpoints," such as laptops, phones, and tablets.
Encryption is the process of transferring normal words and numbers, called plain text, into an unreadable form of letters, numbers, and symbols, called ciphertext, which cannot be easily read without the key from authorized people. The state utilizes two different software pieces to handle encrypted drives. The first is Wave, a hardware-based encryption, and the other is Bitlocker, a software-based encryption.
Wave encrypts the whole hard drive and is only able to be decrypted by a user entering in a password to get access. After the password is entered correctly, it will boot into the operating system and allow them to work. To use this kind of encryption, you must have a self-encrypted drive (SED) that will allow Wave to manage the device.
Bitlocker is enabled within the operating system. Users will only have to enter a key if an unauthorized party tries to access the hard drive while it’s powered off. Because it’s based on the operating system, if a hard drive is wiped, Bitlocker Encryption will also be wiped off.
ITD's online Work Management System (WMS) may be used to submit a "Generic" service request.