Your cookie settings

We use cookies. By clicking "Submit Preferences" you are consenting to the use of cookies and understand that you can update your cookie preferences at any time. For more information about which cookies we use and how to change your preferences please visit our Privacy Policy page.

Some cookies are necessary for the usual function of our website. These are destroyed when you close your browser and do not store any of your details. Please note that choosing this option will result in you seeing this message each time you visit a new page as we are not storing any preferences for you.

In order for us to remember the preferences you select today and ensure that you don’t see this message again, we need to store a cookie to remember you. This is the only tracking cookie we will store if you select this option.

By selecting ‘all cookies’, you are consenting to the use of cookies and understand that you can update your cookie preferences at any time. For more information about which cookies we use and how to change your preferences please visit our Privacy Policy page.

Submit Preferences
Background

Bitlocker Encryption

BitLocker is Microsoft’s proprietary encryption system for Windows computers that provides at-rest encryption of your drive (both fixed and removable), helping protect against unauthorised changes to your system. Used together with a Trusted Platform Module (TPM), it can prevent unauthorised start-up of a computer using a combination of PIN, password and/or USB key.

Is it right for me?

Security is everyone's responsibility. In many cases, a data breach could have been mitigated if encryption had been implemented for data at rest. This "last resort" ensures that data is protected against unauthorised access.

You can use BitLocker to mitigate unauthorised data access on lost or stolen computers by encrypting all user files and system files on the operating system drive, including the swap files and hibernation files, and checking the integrity of early boot components and boot configuration data.

You can also use BitLocker to encrypt the entire contents of a data drive and use Group Policy to require that BitLocker be enabled on a drive before the computer can write data to the drive. Bitlocker supports multiple locking/unlocking methods by using a Pin, Recovery Key/Password, or Network unlock from a trusted devices.

Protect your system and data with BitLocker, Microsoft’s proprietary encryption feature for Windows computers.

Why choose The Bunker?

With our background of secure hosting and managed services, we are able to advise best practice to suit your needs amongst the many BitLocker options and configurations available.

Our 24/7/365 Service Desk means that we are always available to answer questions or resolve any issues that might arise.

How Bitlocker Encryption works

A TPM is a chip that runs an authentication check on your hardware, software, and firmware. If the TPM detects an unauthorized change, your PC will boot in a restricted mode to deter potential attackers. Attacking the TPM requires physical access to the computer. Additionally, the tools and skills necessary to attack hardware are often more expensive, and usually are not as available as the ones used to attack software. And because each TPM is unique to the computer that contains it, attacking multiple TPM computers would be difficult and time-consuming.

BitLocker supports multifactor authentication for operating system drives. If you enable BitLocker on a computer that has a TPM version 1.2 or later, you can use additional forms of authentication with the TPM protection.

Our Accreditations

  • ISO 27001
  • CITRIX Partner
  • First
  • G-Cloud Accredited
  • ITIL Service Management
  • Microsoft Gold Partner
  • NHS IGSoC Approved
  • PCI DSS
  • PRINCE2
  • RIPE NCC Member
  • Tech UK
  • Veeam Gold Cloud & Service Provider Partner