You’ve learned a lot thus far about creating and deploying Windows To Go drives, and you’ve learned about using BitLocker, but I haven’t talked at length about any other security-related topics. In this chapter that’s what I’ll cover. Although some of this will be highly technical, it’s important to understand the underlying technologies that go into protecting and securing data. You need to be aware of what’s available and how those technologies can be used in your network to protect users’ data and transmissions, and you need to have at least a basic understanding of the options available.
Because ...