Blog Listing

Imprivata at Citrix Synergy 2012
What an amazing start to the event. The welcome reception here on the show floor was packed.
Wyse adds No Click Access® to Zero and ThinOS clients
Yesterday, Wyse announced the integration of Imprivata OneSign® Virtual Deskt
What I learned at a college recruiting fair.
As a Director of Engineering at Imprivata, I recently participated in a three day recruiting trip to three universities.
Congratulations to Licking Memorial Hospital on achieving Stage 6 on the HIMSS EMR Adoption Model
We were delighted this month to see yet another Imprivata customer achieve Stage 6 on the HIMSS EMR Adoption Model. Congratulations to Sallie Arnett and the team at Licking Memorial Hospital on becoming the 316th US hospital to be distinguished with Stage 6 status! I caught up with Sallie to ask her a few questions about the adoption process and how the EMR systems is being received among care providers at Licking Memorial.
The Unintended Consequences of Meaningful Use – A CIO’s Perspective
Ed Ricks, the VP Information Services & CIO at Beaufort Memorial Hospital (an Imprivata customer), has started blogging for Computerworld on healthcare IT issues.
Want to Improve Clinician Workflows and Physician Satisfaction? It’s All About the Clicks.
Physicians and nurses are on the front lines caring for patients while at the same time living through unprecedented change in thei
Stage 2 Meaningful Use – Are You Ready?
Are you ready for Stage 2 Meaningful Use? The proposed ruling states hospitals must attest to 18 objectives, 16 core and 2 of 4 menu objectives and Stage 2 now begins in FFY 2014 (10/1/2013). By consolidating some objectives, introducing new ones and raising the threshold on some the bar is certainly raised.
Announcing the Imprivata Developer Program
Here’s the problem.
HIMSS12 - From the show floor - Day 2
I thought I’d give you the condensed version of the great customer presentations and comments we had here at booth #3160 from the HIMSS show floor.
HIMSS12 - From the show floor - Day 1
A great day at the Imprivata stand today.
There’s truth to the saying you have to walk a mile in someone else’s shoes
In the case of a OneSign implementation, the answer may surprise you.
What a Difference a Year Makes: Onsite at VMworld 2011
VMworld was markedly different from a healthcare IT point of view this year. I wrote a guest blog for HealthITExchange summarizing a few of my thoughts which you can find here. Were you at VMworld this year? What was your impression?
Fast Access for Clinicians and Secure Patient Data for IT: Can You Have Both?
A couple of weeks ago I moderated a Healthcare IT News webinar session that examined how hospitals today make patient data easily and securely accessible throughout the clinical workflow. I was joined by Dr. Zafar Chaudry, CIO of Liverpool Women’s NHS Foundation Trust & Alder Hey Children’s NHS Foundation trust and Dr. Lawrence Losey, Pediatrician, Chief of Pediatrics and Chief Medical Information Officer (CMIO) for Parkview Adventist Medical Center. The session addressed the clinical workflow, process and technology behind providing fast, secure access to patient data, touching on all the areas within a hospital where a workstation sits and from anywhere a clinician may need access.
Halloween Scary Security Stories – Healthcare Security Risks
This week, I took part in Network World’s annual real-life scary security stories podcast, a panel hosted by Keith Shaw that looks at some of the most frightful security incidents over the past year. This year, I focused on some of the data security incidents that are becoming all too common in the healthcare industry.
2009 Identity Management Mid-Year Report: A brief look back and ahead
Back in January, I shared some of my observations on 2009 Priorities for identity management in the new economic reality people are faced with - productivity, security and manageable IT projects. This year’s economics have forced people to do more with less, manage tighter budgets and maintain enterprise security while dealing with re-orgs and layoffs. While 2008 was the worst year to date for data breaches, 2009 hasn’t been much better if you look at this chronology of data breaches, including the recently disclosed incident at Goldman Sachs. The Identity Theft Resource Center keeps tabs as well, and has a nice snapshot of high-profile data breaches. Many of these are the result of unauthorized access, some combined with placing malicious code on servers or laptops to siphon off data. It’s amazing the methods that are being used to access systems, steal data, sometimes extort money and always damage reputations. Potential impact of the Goldman Sachs’s unauthorized upload of proprietary software is still under investigation, but information on how easy it was to pull off makes for scary reading. Given the potential impact of data breaches, there has been significant progress made to tighten access to systems, so let’s review some of the relevant things that are happening in identity management. Following are three areas, I believe, we need to watch for in the latter half of 2009...
Tips and Tricks for selecting Strong Authentication
Strong authentication can come in a variety of forms, each with it's own unique strengths and weaknesses. Before selecting a type of strong authentication, think about the following:
Inside the Insider Threat
Insider threat is among the biggest challenges security folks face in 2008. The perimeter is dissolving with increased reliance on distributed computing and the mobile workforce, making it more difficult than ever to put up definitive walls around the enterprise. It's a simple reality that we all have to deal with. Check out last month's 2008 Global Information Security Workforce Study conducted by Frost & Sullivan for ISC(2) and SearchSecurity.com's coverage. Two-factor authentication using biometrics as well as physical-logical convergence will gain speed in dealing with the insider threat.
Welcome, Jim Whelan, VP of Imprivata’s North American Healthcare Group
I’m excited to join Imprivata at a time where healthcare IT, patient data security and clinician workflow efficiencies are front and center in boardrooms and nurses' stations across the country’s healthcare institutions. With more than 500 hospitals on the customer roster, one million healthcare users and strategic relationships with all of the popular HIS vendors, Imprivata has built a strong foundation that was very attractive for me to join and bring my experiences. Imprivata’s healthcare pedigree enables us to focus on delivering practical innovations for solving real-world problems surrounding simplifying and securing user access in hospital environments.
Identifying Identity Resources, Part II
Back when this blog was in its infancy, we outlined a number of identity management resources that readers should check out. Those blogs are still on the “must-read” list, but there are a number of new ones that have popped up that people interested in identity and access management may find useful...
Medical ID Theft and Tying Patients to Electronic Records with Strong Authentication
The New York Times recently published an interesting article on the rising problem of medical identity theft. When the federal government last researched the issue in 2007, more than 250,000 Americans reported that they were victims of medical identity theft. Since that last report, most experts agree the problem has undoubtedly grown, in part because of the growing use of electronic medical records built without extensive safeguards. To exacerbate the situation, cleaning up after medical ID theft can be hindered by HIPPA compliance – the regulations protect the medical information of the ID thieves as well as you.