Blog Listing

Teaser Feature Image
Photo of two doctors working on mobile devices
Shared mobile devices, shared success: How healthcare leaders are redefining clinical mobility, security, and ROI in 2025
Shared mobile devices are transforming care delivery in 2025.
Teaser Feature Image
Image of person holding an electronic medical record
Preventing medical errors: Enhancing safety and reducing costs
Patient misidentification is a leading cause of medical errors, fueling patient harm, denied claims, and unnecessary costs.
Teaser Feature Image
Illustration of OT/IT integrations
Top 5 security concerns for IT/OT integrations
As organizations accelerate IT/OT integration, they face new security risks tied to legacy systems, shared logins, and misaligned priorities.
Teaser Feature Image
Photo of Imprivata booth at conference
A look ahead: Advancing passwordless access at InfoSec World
For decades, organizations have poured resources into securing systems with stronger and more complex passwords.
Teaser Feature Image
Photo of patient paying at hospital
Reducing reimbursement friction, and reclaiming millions with accurate patient identification
Patient identification is important. It’s also complicated.
Teaser Feature Image
Russell Dowdell
Russell fields five: Answers to five key questions on managing third-party vendor access risks
Russell Dowdell, Imprivata Senior Director, Product Management, Privileged Access, tackles five pivotal questions, sharing valuable insights and best pra
Teaser Feature Image
Manufacturing professionals in warehouse
What are the 3 biggest challenges of Industry 4.0 for manufacturing organizations?
Industry 4.0 is transforming manufacturing — but rising cyber risks, legacy infrastructure, and lack of standards stand in the way.
Teaser Feature Image
Photo of clinician using mobile device in scrubs
Why shared mobile is the new gold standard in clinical workflow: From convenience to necessity
Shared mobile devices are transforming clinical workflows.
Teaser Feature Image
Photo of worker looking at data
Your login process is killing productivity—Here’s the data
In industries where seconds matter, workers are losing minutes, sometimes hours, trying to log in to the systems they need to do their jobs.
Teaser Feature Image
Photo of team working on monitors
The new rules of authentication for critical industries
The shifting cybersecurity landscapeThe cybersecurity landscape is changing quickly, but not necessarily in ways that make defenders’ jobs easier.
Teaser Feature Image
Photo of clinician using a mobile device
From 13 minutes to instant access: Optimizing your shared mobile program
Clinicians waste an average of 13 minutes per shift just getting mobile devices ready to use.
Teaser Feature Image
Aerial View of the Atlanta Suburb of Marietta, Georgia
How Marietta, GA, made CJIS compliance work in the real world
Marietta, GA, shows that CJIS compliance can be more than a checkbox.
Teaser Feature Image
Photo of employee providing remote support to vendor
Remote support for enterprise: How to grant vendors secure access and level-up your customer service
Enterprises can’t afford delays — or security gaps — in remote support.
Teaser Feature Image
Illustrated image of computer with security icons overlaid
Am I responsible for ransomware and compromised devices?
From lost devices to phishing attacks, ransomware responsibility raises tough questions.
Teaser Feature Image
Photo of the computer hardware with justice symbol inscribed
Overcoming legacy and third-party challenges in CJIS compliance
Agencies face real hurdles in meeting CJIS 6.0, from outdated systems to vendor risks.
Teaser Feature Image
Photo of clinician using tablet
What clinicians could accomplish if technology got out of the way
Why simplified mobile access is the key to happier clinicians and better patient outcomes.
Teaser Feature Image
Photo of Imprivata booth for Identity Week
Imprivata at Identity Week America: Securing the Frontline Without Slowing It Down
Connect with Imprivata at Identity Week to learn about the future of identity and access for frontline workers
Teaser Feature Image
Officer in vehicle with laptop
Access management under CJIS 6.0: The new gold standard
Learn how agencies can put access management requirements into practice that supports compliance with CJIS 6.0.
Teaser Feature Image
Photo of business person using iPhone at desk
How do I enable a VPN on a business iPhone?
Wondering how to enable a VPN on your business iPhone?
Teaser Feature Image
Photo of person typing on laptops with overlaid checkmarks to signify complaince
What you need to know now about CJIS 6.0
The FBI has raised the bar for protecting criminal justice data. Discover what’s new in CJIS 6.0.