Endpoint encryption refers to encrypting the data stored on "endpoints," such as laptops, phones, and tablets. Encryption is the process of transferring normal words and numbers, called plain text, into an unreadable form of letters, numbers, and symbols, called ciphertext, which cannot be easily read without the key from authorized people.
The state utilizes Bitlocker as part of the Microsoft 365 agreement, a software-based encryption. Bitlocker is enabled within the operating system. Users will only have to enter a key if an unauthorized party tries to access the hard drive while it’s powered off. Because it’s based on the operating system, if a hard drive is wiped, Bitlocker Encryption will also be wiped off.
ITD's online Work Management System (WMS) may be used to submit a "Generic" service request.
Ensures that sensitive information is encrypted.
Wave Systems, a developer of hardware based encryption technology used by the state, has filed for bankruptcy. ITD will provide updates on this topic through the monthly Information Technology Coordinators Council meeting.
End User Compute and Collaboration is a holistic approach to managing all of the personal computing devices within an organization, including laptops, tablets, and mobile phones.