Skip to main content
Imprivata logo
  • Request a demo
  • Support
United States
  • United States
  • DACH
  • French
  • United Kingdom

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Move to passwordless authentication
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata culture
        • Corporate responsibility
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      The Imprivata Connect Conference series brings together visionary minds from the Imprivata community for a day of networking and collaboration in the spirit of shaping the future of simple and secure access management for every digital identity.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
The search found 3766 results.
Blog
Access intelligence — 3 cybersecurity insights for health system leaders
Health systems today are more vulnerable than ever to data breaches and malicious cybercrime. Regular user access reviews are a key part of securing critical data, but it comes with challenges, costs and potential roadblocks.
Blog
What is access governance?
63% of organizations don’t have visibility into the level of access and permissions their users have to critical systems. Too many organizations aren’t implementing and enforcing access policies to their most critical assets, like systems, data, networks, infrastructure, and operational technology.
Blog
October is national cybersecurity awareness month 2021!
October is cybersecurity awareness month! But what does this mean for your business? With the number of data breaches continuing to skyrocket, 51% of which were tied to third-party vendors, this month-long initiative is the perfect opportunity for your organization to take a closer look at your own cybersecurity infrastructure and strategy.
Blog
The success story of CynexLink and SecureLink
SecureLink is proud to introduce our enhanced Partner program, PartnerLink. PartnerLink is designed to build and grow relationships with valuable cybersecurity solutions for customers.
Blog
How to achieve HITRUST compliance
It’s no secret that healthcare organizations contain endless sensitive and critical assets. Patient files and electronic medical records (EMR) are not only important, but some of the most highly valued assets on the black market. In fact, healthcare related breaches increased by 55.1% in 2020.
Blog
Becoming HIPAA-compliant: Everything you need to know
The Health Insurance Portability and Accountability Act was initially passed in 1996, and it has drastically modernized the healthcare industry as well as increased security surrounding the handling of protected health information (PHI). While HIPAA has done a lot to ensure peace of mind for patients, HIPAA compliance has often become quite a headache for small to large businesses alike.
Blog
How user access reviews manage insider threats
The threat isn’t always coming from outside an organization. In any organization, big or small, employees are given access to critical information, files, data, and more. It may seem like employees, or internal users, would be the obvious people to trust with these kinds of assets.
Blog
Reactive vs. proactive cybersecurity
The government is taking on cybersecurity matters with gusto and leading the charge with some pretty heavy hitters like Amazon, IBM, Apple and Google. Not to mention, the latest cybersecurity initiative involving the private sector follows two mandates addressing the improvement of cybersecurity of the federal government and enhancing cybersecurity measures of critical infrastructure. It’s the momentum that the cybersecurity industry loves to see.
Blog
What to look for in EMR access auditing systems
Patient data is being accessed every day at healthcare facilities to the point where an EMR system can experience over a million accesses in just one day. HIPAA requires that all of that patient data is audited to ensure each access attempt is appropriate, so it’s the job of compliance officers to make sure these audits happen.
Blog
User access management systems offer efficiency and ease
When it comes to reviewing and managing user access rights, many organizations are failing to do so thoroughly or are simply opting out. The reason? Reviewing user access manually is too difficult, too time-consuming, or not possible for smaller organizations whose focus is elsewhere.

Pagination

  • First page 
  • Previous page 
  • …
  • Page 11
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • French
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 (0)2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2025 Imprivata, Inc. All rights reserved.