Disk Encryption - The Next Generation (Bitlocker Administration and Monitoring)

by Derek Melber
Sept. 1, 2017 0 comments TechGenix Encryption & Authentication access control

Throughout the years, certain elements of IT have evolved from a ‘nice to have’ to ‘an absolute requirement’. If one thinks back 10 years ago, the IT landscape looked very different; organizations had issues patching systems (if they were patching at all), configurations were rarely standardized and data was stored in a myriad of different locations. Fast forward to 2011 and we see many improvements; patch management is largely automated, configuration management exists to standardize server and desktop builds and…data is still stored in a myriad of different locations. Like it or not, encryption of data is needed, should be required, and will be here to stay. The fact is that mobile devices are becoming more prominent, more employers are realizing a laptop provisioned to an employee will yield more work out of them when they’re at home on the evening and on weekends, coffee shops and airports all over the world and more and more mobile workers are taking data with them as they trav...