Blog Listing

VMWare 2023 image 1
Recapping VMware Explore 2023: Mobility & Digital Identity Drive Interest
Organizations are embracing a mobile-first future and are looking for technologies that improve mobile experiences, both for end-users and IT teams.
Frustration and friction-free: Secure mobile workflows
Frustration and friction-free: Secure mobile workflows
Frictionless mobile device security is not an oxymoron. You really can unlock the power of mobility without frustrating clinicians (or CISOs).
Conquer the CISO’s top challenge with powerful identity and access management solutions
Conquer the CISO’s top challenge with powerful identity and access management solutions
A recent report on the challenges faced by CISOs in today’s security environment showed a need to focus on identity and access management. 
Don’t slow down: The importance of accelerating your identity and access management investments
Don’t slow down: The importance of accelerating your identity and access management investments
Don’t let the economy and the complexities of today’s rapidly challenging technologies convince you to cut your investments in identity and access manage
Navigating the risks of identity governance and artificial intelligence
Navigating the risks of identity governance and artificial intelligence
Identity governance and artificial intelligence can be a beautiful technological marriage that enhances security and optimizes the benefits of technology
Third parties are a major source of ransomware attacks –here’s what you can do about it
Third parties are a major source of ransomware attacks –here’s what you can do about it
Healthcare organizations are particularly vulnerable to ransomware attacks, and nearly half of these attacks enter through third-party access points.
The three key phases to achieve a mature privacy monitoring program
The three key phases to achieve a mature privacy monitoring program
Best practices for a mature privacy monitoring program are based in three key phases that build upon one another, and quickly progress in scope and sophi
Nurse with iPad
Imprivata Humans of Healthcare: Tara Gregorio, RN
Our Humans of Healthcare series aims to spotlight medical professionals like Tara – the very foundation of our healthcare system.
Image of a person's thumb with graphics over it
Imprivata Privileged Access Management in 2023: Simplify workflows with new features and enhancements.
Check out the latest improvements we’ve made to Imprivata Privileged Access Management in the first half of 2023.
Mobile innovation supports care without barriers. Imprivata supports mobility without risk.
Mobile innovation supports care without barriers. Imprivata supports mobility without risk.
Mobile technology is playing an increasingly important role in enabling clinical workflows, but ensuring its security is still a concern for HDOs. With Imprivata, there’s a way forward.
Thumbnail image of the blog
The prescription for preventing patient misidentification
Inaccurate patient information can lead to medical record errors and dire consequences for both patients and healthcare delivery organizations. The good news? Biometric patient identification can deliver a proven solution for preventing patient misidentification.
Digital-business-interface-and-icons
Using large language models like ChatGPT in healthcare: Make sure you understand the risks
ChatGPT opens doors to exciting new possibilities in healthcare, but significant risks remain – particularly when it comes to data privacy and security.
Image of a lock
Cybersecurity leadership panel shares perspective on healthcare IoT and protecting patient data
Cybersecurity leaders share perspectives on challenges and best practices surrounding patient data privacy and healthcare IoT devices. Read the blog.
Top User Access Review Best Practices
Top User Access Review Best Practices
Learn what user access reviews are, the risks of not reviewing user access, and recommended user access review best practices. Read the blog.
What is secure remote access?
What is secure remote access?
What is secure remote access? Remote access ensures anyone accessing your network is authenticated using a secure connection. Read to learn more.
Cyber insurance: Elusive. Expensive. Essential.
Cyber insurance: Elusive. Expensive. Essential.
Worried about whether you can meet rapidly changing cyber insurance requirements? You’re not alone. But there are steps you can take to help secure (and afford) protection.
What is privileged access management?
What is privileged access management?
What is privileged access management (PAM)? If you need to secure information, don’t wait to find out. Read more about PAM here!
Hacking-related data breaches leverage compromised passwords
Hacking-related data breaches leverage compromised passwords
Stolen or compromised credentials are often responsible for damaging hacks. Learn how compromised passwords can lead to data breaches. Read the blog.
HIMSS 2023 booth
Imprivata customers highlight success stories at HIMSS 2023
Read more about how Imprivata customers overcame their digital identity management challenges using Imprivata solutions.
HIMSS 2023 booth
HIMSS23 retrospective: Future-proofing healthcare with digital identity
At HIMSS 2023, Imprivata discussed how healthcare leaders can use digital identity to enhance care, improve their security, and maximize resources.