Encrypting your laptop and desktop computers is the single most important step you can take to protect your personal information and Northwestern's data in the event the device is lost or stolen.Desktop Encryption provides protection for computers by preventing data loss with strong access control and powerful disk encryption. It is important that Northwestern University personnel storing sensitive information such as Protected Health Information (PHI), Personally Identifiable Information (PII), or research data protect this information with encryption software.
Choose an operating system to learn more:
- Microsoft Windows (BitLocker with MBAM)
- Mac OS (FileVault2 with Casper)
- Linux (Symantec Encryption - Formerly PGP)
Key Benefits of Desktop Encryption
- Protects and prevents information from accidental data loss and assures protection for desktops and laptops against unauthorized access
- Meets government directives and regulations
- Centrally managed WDE policies
Northwestern Information Technology (IT) maintains centrally hosted servers to facilitate reporting and key management including the JAMF Casper Suite, Microsoft BitLocker Administration and Monitoring (MBAM) server, and Symantec PGP Universal server that provide:
- Client installation support
- Encryption key archival and recovery
- Encryption status verification
Install and License
- Faculty and staff wanting to deploy WDE should check with their local IT group for support before installing any encryption software.
- BitLocker and FileVault 2 are included in current versions of Windows OS and Mac OS X at no additional cost and current operating system versions are available through Northwestern IT if needed.
- Schools and departments can contact Northwestern Information Technology for assistance planning an encryption project and/or for access to the centralized Northwestern IT MBAM server or JAMF Casper Suite.
- Schools or departments that would like access to the MBAM Helpdesk server, JAMF Casper server, or the Symantec PGP Universal Encryption server can contact email@example.com to obtain access.
Last Updated: 30 January 2017Get Help Back to top