Blog Listing

Imprivata at Citrix Synergy 2012
What an amazing start to the event. The welcome reception here on the show floor was packed.
Wyse adds No Click Access® to Zero and ThinOS clients
Yesterday, Wyse announced the integration of Imprivata OneSign® Virtual Deskt
What I learned at a college recruiting fair.
As a Director of Engineering at Imprivata, I recently participated in a three day recruiting trip to three universities.
Congratulations to Licking Memorial Hospital on achieving Stage 6 on the HIMSS EMR Adoption Model
We were delighted this month to see yet another Imprivata customer achieve Stage 6 on the HIMSS EMR Adoption Model. Congratulations to Sallie Arnett and the team at Licking Memorial Hospital on becoming the 316th US hospital to be distinguished with Stage 6 status! I caught up with Sallie to ask her a few questions about the adoption process and how the EMR systems is being received among care providers at Licking Memorial.
The Unintended Consequences of Meaningful Use – A CIO’s Perspective
Ed Ricks, the VP Information Services & CIO at Beaufort Memorial Hospital (an Imprivata customer), has started blogging for Computerworld on healthcare IT issues.
Want to Improve Clinician Workflows and Physician Satisfaction? It’s All About the Clicks.
Physicians and nurses are on the front lines caring for patients while at the same time living through unprecedented change in thei
Stage 2 Meaningful Use – Are You Ready?
Are you ready for Stage 2 Meaningful Use? The proposed ruling states hospitals must attest to 18 objectives, 16 core and 2 of 4 menu objectives and Stage 2 now begins in FFY 2014 (10/1/2013). By consolidating some objectives, introducing new ones and raising the threshold on some the bar is certainly raised.
Announcing the Imprivata Developer Program
Here’s the problem.
HIMSS12 - From the show floor - Day 2
I thought I’d give you the condensed version of the great customer presentations and comments we had here at booth #3160 from the HIMSS show floor.
HIMSS12 - From the show floor - Day 1
A great day at the Imprivata stand today.
There’s truth to the saying you have to walk a mile in someone else’s shoes
In the case of a OneSign implementation, the answer may surprise you.
What a Difference a Year Makes: Onsite at VMworld 2011
VMworld was markedly different from a healthcare IT point of view this year. I wrote a guest blog for HealthITExchange summarizing a few of my thoughts which you can find here. Were you at VMworld this year? What was your impression?
Study Finds Security and Privacy is Low Priority for Health Care Organizations
The recent Ponemon Institute benchmark study on patient data privacy and security practices sheds some much-needed light on the practice of data protection within our nation’s hospitals. According to the study, today’s hospitals have little confidence in their ability to secure patient records, revealing just how vulnerable they are to data breaches – a concern for all patients. Highlighted are some of the key findings...
Seven Habits of Highly-Effective Healthcare Security (without Sacrificing Clinician Workflow)
Coming out of HIMSS 2010, it was clear that patient data security was a chief concern, but so was the need for improved clinician workflows. For all the requirements driven by new laws and the stimulus bill, what was overlooked was the impact of security in the real-world hospital environment from a user perspective. Forcing someone to change habits and daily routines is difficult, if not impossible, to do. Therefore, it is integral to the successful adoption of these security endeavors that they be paired with improving workflow. If change makes people’s lives easier, it’s easier for them to embrace. It doesn’t need to be an either/or argument.
Observations from the 2009 Cerner Health Conference
I just left the annual Cerner Health Conference in Kansas City, where clinical and technical users of Cerner software gather to share ideas, best practices and technology solutions that are molding the future of healthcare.
Access Management Questions to Ponder
I was reading about the recent access management related breach at the California Water Services Company, where an auditor resigned, but illegally accessed computer systems to steal more than $9 million before leaving. While the company should be lauded for catching the fraud before the wire transfers could go through and irreparable damage could be done, it should serve as another cautionary tale in what has become a recurring theme on the application security front. This is just one more saga in an every growing litany of tales of breaches that we’ve hearing about.
What’s Next: Peering into the Future of Biometrics & Security Convergence
I was recently asked to comment on the future of biometrics so I wanted to share my thoughts here after distilling them down into four buckets... What's Next in Adoption, What's Next in the Tech, What's Next in the Enterprise, and What's Next in Consolidation.
2008 Identity Management Trends in Healthcare Survey Results
After the recent 2008 HIMSS Conference, we conducted a survey of 171 healthcare IT decision makers to identify some of the trends they face relating to identity management. I wanted to call out a few interesting data points...
Drive EMR Adoption and Increase IT Security - Webinar
On Wednesday, November 10th at 1:00 PM EST, I am fortunate to host Kristi Roose, IT director at Mahaska Health Partnership on a webinar where Kristi will share her insights on how to successfully deploy an EMR and help satisfy the requirements of meaningful use and the privacy and security standards embedded in the HITECH Act.
Mass 201 CMR 17.00: When State Compliance Kicks in, How Do You Respond?
While many of us were down at HIMSS 2010, on March 1, 2010, Mass 201 CMR 17.00 officially went into effect: 17.05: Compliance Deadline (1)Every person who owns or licenses personal information about a resident of the Commonwealth shall be in full compliance with 201 CMR 17.00 on or before March 1, 2010.