Blog Listing

Image of a doctor speaking to a patient
4 steps to overcome patient misidentification
Patient misidentification is a problem that continues to plague healthcare organizations, but these steps help to make sure your HDO isn’t one of them.
Image of a nurse using a tablet
5 ransomware statistics and what they mean for healthcare IT decision-makers
In healthcare IT? Then these five statistics will change how you’re thinking about the security of your organization.
Image of a person touching a hologram
Emerging from the multi-vendor quagmire
The move to one trusted vendor for your digital identity strategy may be easier than you think. And the consolidation brings both security and efficiency benefits.
Image of two people viewing a device
3 signs your identity governance program may need a managed services component
Managed services may be the key to maturing your identity governance program. Here are some signs you might need to consider it.
Image of medical bottles lined up in a rack
What is drug diversion? A look at the problem, and what happens if you don’t prevent it.
Left unchecked, the devastating toll taken by drug diversion runs wide and deep.
Image of a person typing on their laptop
Leading IGA capabilities with Imprivata Identity Governance 7.3
Check out the all-new updates to Imprivata Identity Governance with version 7.3.
Image of a person using multiple devices
Take a look at what’s new with Imprivata Privileged Access Management
Take a look at the improvements we’ve made to Imprivata Privileged Access Management in the first half of 2022.
Image of pill bottle laying on its side, with pills spilling out
Stepping up to a proactive drug diversion prevention strategy
Fighting drug diversion takes a holistic approach aided by powerful technology.
UNITY graphic
UNITY
Recently, the word unity has taken on a new meaning at Imprivata. With our team more spread out than ever before, our employees are working out of our various offices around the globe and even their homes.
Image of a person using a laptop with holographic signs
PAM and VPAM: The power couple safeguarding critical assets from inside and outside threats
Threats exist internally and externally, so you need to make sure you’re prepared. The powerful combo of PAM and VPAM can help keep your organization safe.
Image of two people looking at a tablet inside a storage area
Imprivata Identity Governance 7.2: Expanded capabilities to keep your organization secure
Take a look at the improvements we’ve made to Imprivata Identity Governance, all in the name of making sure we anticipate the needs of your organization.
Image of a person typing on a laptop, with icons surrounding the open space
Strengthen your security posture with identity governance and privileged access management
Need to keep identity and access locked down? Then you need identity governance and privileged access management.
Image of a person viewing a tablet at a desk
Why your Zero Trust strategy needs a third-party privileged access component
Zero Trust isn’t a buzzword. But to do it right, you need to lock down privileged access. Yes, even for third parties.
Image of a shield with a target, with arrows struck at the bullseye
10 reasons why hackers think your HDO is an easy target
And why many CIOs are choosing managed services to bridge the IT resource gap and boost security.
Thumbnail image of the SecureLink blog
We’re expanding the Imprivata family: Welcome, SecureLink!
We’re thrilled to be welcoming SecureLink, the leader in critical access management, to the Imprivata family!
Image of an abstract web of fingerprints and red lines connecting them
Staving off March (security) madness: Digital identity management is your key defense strategy
I know you don’t really need reminding, but here it is anyway: the security of your organization needs to be top of mind. Always.
Two people viewing statistics from an iPad
Inside the cyber insurance application process
The Imprivata team shares lessons learned from recent completion of the cyber insurance application process. Start early and be ready and transparent.
Why We Love Imprivata Thumbnail
Why we love Imprivata!
While it’s easy for us to show you what makes Imprivata a great place to work, we asked our team what they love most about Imprivata, here’s what they had to say
Image of a zero trust security model
Biden administration’s new cybersecurity directive champions Zero Trust
It’s the year of Zero Trust. For your strategy to succeed, be sure to put digital identity at its core. Here’s why.
Medical students working on a project together
If 95% of cyber-attacks are due to human error, why have so few clinicians been trained to avoid them?
New study finds a serious lack of urgency among many clinical executives regarding cybersecurity awareness.