The search found 3760 results.
Datasheet
Blog
The shifting cybersecurity landscapeThe cybersecurity landscape is changing quickly, but not necessarily in ways that make defenders’ jobs easier. On one hand, the Cybersecurity Information Sharing Act (CISA) of 2015 is approaching its September 30 expiration date, threatening to undercut the collaborative intelligence-sharing that has served as a critical early-warning system for the past decade.
Blog
In industries where seconds matter, workers are losing minutes, sometimes hours, trying to log in to the systems they need to do their jobs. Clinicians struggle with repeated timeouts while patients wait. Manufacturing lines stall while frontline workers reset complex passwords. Police officers face constant reauthentication that slows down reporting and response times. What was once viewed as “just an IT issue” has become, in fact, a major drag on productivity, morale, and the bottom line.
Blog
Just back from our Imprivata international business review in Amsterdam, where I met Philippe Maury, our regional manager for France. In OneSign 4.6 SP 1, we announced support for the third generation of the smart card that is the French national standard for healthcare authentication: la Carte de Professionnel de Santé (CPS).
Blog
Shared mobile devices are transforming clinical workflows. The 2025 Imprivata state of shared mobile devices in healthcare report reveals why they are now the industry’s gold standard. We all understand that in healthcare, every second matters. Every delay — whether waiting for lab results, struggling with authentication, or tracking down a misplaced device — can ripple into slower care delivery and lower staff satisfaction. Mobile technology has transformed clinical workflows, but the model of ownership and management makes all the difference.
Datasheet
Infographic
Organizations with a fully implemented shared-mobile policy report 63% greater ROI than those without, for an average annual savings of $1.4M vs. $860K.
News
This World Manufacturing Day, the spotlight is on how manufacturers are embracing Industry 4.0—powered by IIoT, automation, and AI—while grappling with the security risks that accompany hyper-connected environments.
News
In the era of Industry 4.0, manufacturing relies on digital integration to keep production running, from Industrial IoT (IIoT) tools and technologies to cloud-based supply chain platforms. But with every new vendor connection comes a hidden exposure: third-party and privileged access.