Blog Listing

Considerations in your IAAM journey – Final (Part IV): Why take the risk of integration?
Considerations in your IAAM journey – Final (Part IV): Why take the risk of integration?
Before you read, catch up on Part 0: An IAAM system overview,
Have you searched our online Solutions Database lately?
Have you searched our online Solutions Database lately?
Over the past few months, the Solutions Database located within our online Customer Center has undergone a number of improvements to provide you with a reliable and effective source of information for addressing common product issues and questions. The improvements include enhanced searching capability, content reliability, and format consistency.
Verity Credit Union Live Webinar - Q&A
Verity Credit Union Live Webinar - Q&A
Security compliance often requires complex passwords – causing user frustration and helpdesk calls. Jon Wu, System Engineer at Verity Credit Union, joined me for a webinar on how SSO helped Verity increase user productivity and customer satisfaction. Below is the transcribed Q&A from the webinar. View the full webinar here Question 1: Did auditing play a role in your decision to buy single sign-on, and has it helped with reporting on user access? Answer: Yes it did. When we first mentioned that we would be getting a password program, users were nervous. They thought, “is this password program going to remember all of my passwords and keep it secure?” When we presented to Imprivata, they said no problem, it’s all taken care of. From end to end the passwords are encrypted. Imprivata takes care of both situations, and we don’t have to worry about it being exposed in any way.
Even Spies Have Password Management Problems
Even Spies Have Password Management Problems
Catching up on some news from last week and I thought Tim Greene’s article in Network World was an interesting piece on the Russian spy ring story that is currently grabbing headlines. One of the most glaring errors made by one of the spy defendants was leaving an imposing 27-character password written on a piece of paper that law enforcement officers found while searching a suspect's home. They used the password to crack open a treasure trove of more than 100 text files containing covert messages used to further the investigation.
HITECH Act:  One Year Later, Are you Ready for Compliance?
HITECH Act: One Year Later, Are you Ready for Compliance?
On Feb. 17, 2009, the HITECH Act was enacted, giving birth to new tiered civil monetary penalties for data breach violations, new powers to state attorney generals (AGs) for class-action pursuit and new guidelines for technology and methodologies that render data “unusable, unreadable or indecipherable.” While we previously covered how HITECH will make available $2.0 billion in grant money for organizations to transition to electronic medical records (EMRs) and deploy appropriate security measures, the time is now upon us for full compliance. Otherwise, organizations risk significant penalties from the department of Health and Human Services (HHS)/ Office of Civil Rights (OCR). The Healthcare & Technology blog has a good, quick post with some useful resources...
Thoughts from the Siemens Innovations Conference
Thoughts from the Siemens Innovations Conference
I just got back from the annual Siemens Innovations Conference in Philadelphia. Imprivata had a booth at the event. I had an opportunity to talk with existing and prospective OneSign customers. Clearly, single sign-on and authentication are top of mind for many of the Siemens customers we spoke with. One thing is clear - CMIOs and IT folks are looking for ways to make application access seamless and secure for the clinicians while NOT changing workflows. Imprivata OneSign is what Siemens Med is recommending as the solution of choice. In fact, there were two customer presentations where OneSign was discussed.
Stimulating Strong Authentication
Stimulating Strong Authentication
The stimulus package recently signed by President Obama has been the cause for vigorous debate. One by-product of the package that has not been widely discussed is a provision that would reshape the medical industry by creating a central repository of computerized medical records for all American's. An increase in the level of electronic information of this magnitude exponentially raises the vulnerability of a security breach, which we'll focus on today.
Modeling Risk
Modeling Risk
Risk management seems to be the conversation du jour. I was just a the Lenel Paradigm Conference in Rochester with some of their leading security consultants and the topic that constantly came up was Risk and how security practioners needed to understand the business drivers around mitigating risk. With access and authentication management-centric security breaches like LendingTree and Societe Generale making headlines and compliance requirements mandating greater information security, how does one even begin to understand what a company needs to do?
Five Identity Management Trends to Watch
Five Identity Management Trends to Watch
I'm often asked what seems like a simple question: 'what's new in identity management?' As simple as it is, it's a big question so here are five trends that I see out there for identity management... at least for now.
Imprivata adds Frost and Sullivan North American Customer Value Enhancement Award
Imprivata adds Frost and Sullivan North American Customer Value Enhancement Award
Last week, Frost and Sullivan named Imprivata the recipient of the
Where will you be Election Day 2012?
Where will you be Election Day 2012?
I know where I’ll be, at Imprivata HealthCon!
Thin and Zero Client Vendors; Helping the Healthcare Industry Win the Tech Revolution!
Thin and Zero Client Vendors; Helping the Healthcare Industry Win the Tech Revolution!
I love any opportunity to recognize the healthcare industry for its technology prowess!
Imprivata Healthcare News Watch
Imprivata Healthcare News Watch
Monday always feels like a day of catch-up, doesn’t it?
Imprivata Health Care News Watch 4/29/13
Imprivata Health Care News Watch 4/29/13
Welcome to this week’s Imprivata Healthcare News Watch!
Momentum Building for Desktop Virtualization in Healthcare
Momentum Building for Desktop Virtualization in Healthcare
Striking that ‘just right’ balance between information access and security seems like a tougher goal than ever for healthcare IT pros. On one hand, they’re tasked with delivering fast, seamless and increasingly mobile access to patient information for doctors, nurses and other clinicians. Meanwhile, they’re dealing with budget pressures, regulatory changes and the need to accommodate some very different clinical workflows.
Health 2.0 Conference: Technology Investments for Tomorrow…and Today.
Health 2.0 Conference: Technology Investments for Tomorrow…and Today.
Secure Communications solutions are needed to solve healthcare's inefficient communications problems: secure communications promise improved patient care.
The Future of Patient Engagement: Security and Communications
The Future of Patient Engagement: Security and Communications
Security, usability, and interoperability need to be baked into health apps for patients to reap their full benefits. Otherwise, they won't enhance care
How the Internet of (Healthcare) Things will revolutionize patient care
How the Internet of (Healthcare) Things will revolutionize patient care
As healthcare transitions from a fee-for-service to a pay-for-performance model to improve patient engagement and outcomes, the future of care delivery for organizations centers on a network of IP-connected computers, sensors, and devices through which doctors, nurses, and patients can securely share information. In this HIMSS industry solutions and healthcare IT news webinar, David Bratt, Director of Technology Services at Miami’s Children’s Health System, Matt Crawford, Director of Solutions Marketing at Citrix, and David Ting, Imprivata’s co-founder and CTO, talk about how the “Internet of (Healthcare) Things” (IoHT) minimizes the need for direct patient-physician interaction while allowing providers to deliver more personalized treatments, using patient health information from wearables in a secure and reliable way.
4 statistics that prove there’s a patient identification crisis
4 statistics that prove there’s a patient identification crisis
Learn how hospitals can address the growing patient identification crisis that’s threatening patient safety, EMPI integrity, and financial efficiency
Why Wooster Community Hospital chose to Implement EPCS, and why you should too
Why Wooster Community Hospital chose to Implement EPCS, and why you should too
As the Manager of Information Systems at Wooster Community Hospital with 14 years of healthcare IT experience, Eric Gasser is no stranger to what tools are n