VITA equips and empowers Virginia's executive branch in IT infrastructure, cybersecurity, governance and procurement services. We drive critical business connections between Virginians and their government. VITA connects, protects and innovates for Virginia's technological future.
VITA offers a variety of IT services and products to Commonwealth and local governmental agencies and entities. The VITA service catalog contains descriptions, pricing, and service-specific ordering information for IT infrastructure, security and selected enterprise services to best serve Virginians.
Discover Technology Services
VITA's security team prides itself with protecting Virginia’s data and providing a safe, secure technology environment that ensures state agencies can accomplish their respective missions. The team develops and manages an ever-changing portfolio of tools and processes designed to secure Commonwealth data and systems.
About Information Security
VITA’s role is to lead the strategic direction of technology use in the Commonwealth. VITA facilitates development and provides oversight to ensure IT resources are used and appropriately managed within enterprise projects and procurements in support of agency business objectives.
About Policy & Governance
VITA's supply chain management group is the Commonwealth's information technology procurement and sourcing hub. The team strives to consolidate and leverage the Commonwealth's buying power to develop value-driven IT contracts that benefit agencies and Virginians.
The VITA Customer Care Center (VCCC) is available 24 hours a day, seven days a week to provide Commonwealth customers technical support and answer questions. Connect directly or use a do-it-yourself tool to reset a password or open a service ticket.
Get IT Support
If you have a COV account, visit the VITA Service Portal to check on the status of your service ticket, order catalog services or report an issue.
Detailed statements of how employees, contractors, vendors, business partners, and third parties of an organization must comply with its information security policy.