VITA equips and empowers Virginia's executive branch in IT infrastructure, cybersecurity, governance and procurement services. We drive critical business connections between Virginians and their government. VITA connects, protects and innovates for Virginia's technological future.
Discover Technology Services
VITA offers a variety of IT services and products to Commonwealth and local governmental agencies and entities. The VITA service catalog contains descriptions, pricing, and service-specific ordering information for IT infrastructure, security and selected enterprise services to best serve Virginians.
About Information Security
VITA's security team prides itself with protecting Virginia’s data and providing a safe, secure technology environment that ensures state agencies can accomplish their respective missions. The team develops and manages an ever-changing portfolio of tools and processes designed to secure Commonwealth data and systems.
About Policy & Governance
VITA’s role is to lead the strategic direction of technology use in the Commonwealth. VITA facilitates development and provides oversight to ensure IT resources are used and appropriately managed within enterprise projects and procurements in support of agency business objectives.
VITA's supply chain management group is the Commonwealth's information technology procurement and sourcing hub. The team strives to consolidate and leverage the Commonwealth's buying power to develop value-driven IT contracts that benefit agencies and Virginians.
Get IT Support
The VITA Customer Care Center (VCCC) is available 24 hours a day, seven days a week to provide Commonwealth customers technical support and answer questions. Connect directly or use a do-it-yourself tool to reset a password or open a service ticket.
If you have a COV account, visit the VITA Service Portal to check on the status of your service ticket, order catalog services or report an issue.
A penetration test is a method of evaluating the security computer system or network simulating an attack by a malicious user.