Skip to main content
Imprivata Connect: The must-attend event to solve identity and access challenges—together
Partners
  • Integrations
  • Resellers
United States
  • United States
  • DACH
  • France
  • United Kingdom
Imprivata logo

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Secure AI agent access
        • Advanced and Passwordless Access
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
        • Move to passwordless authentication
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata Cares
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      Agentic AI. Passwordless. Mobile.
      Join the Imprivata community at Connect to explore these topics and more—through a day of networking and collaboration focused on shaping the future of simple, secure access for all digital identities.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
    • Column
      • 2nd Column
        • Integrations
        • Resellers
  • Post-CTAs
    • Request demo
    • Support
  • Request a demo
  • Support
The search found 3694 results.
Blog Post

How Can Agencies Achieve CJIS Compliance?

As we all know, the CJIS policy is now final and mandates that all agencies must have enforced unique IDs strong passwords by September, 2010, and that all agencies must comply with the CJIS Advanced Authentication requirement by 2013. However, if your agency has performed a system upgrade after 2005, the 2013 deadline advances to the time of the upgrade. If your agency is audited and found not to be in compliance with the CJIS policy, it could face losing access to CJIS systems.
News

How Can Health IT Help Reform the CDC?

COVID-19 forced a spike in policy-makers’ interest and willingness to invest in public health; a spike that is unfortunately retreating to the old business as usual. (President Biden, in his State of the Union speech, warned “we remain vigilant” while calling for an end to the emergency, but quickly switched the subject from the urgency of public health to prosecuting fraud.) Luckily, along with increased attention came a raft of intelligent suggestions for changing how public health institutions carry out their mission, starting with the Centers for Disease Control (CDC).

Blog Post

How can hospitals do remote access securely?

When COVID-19 broke out in earnest, hospitals and other employers told everybody to go home and work remotely. I’m doing the WFH drill right now. We’re all scrambling to get things done in this new environment, and not everybody has a clear sense of how to proceed. But one thing I can tell you as you realign your systems for a remote workforce: don’t forget security.

Blog Post

How can I secure my computer without a password?

Passwords are outdated and unsecure. Learn how passwordless authentication works, why it’s safer, and how organizations can make the transition now.

While passwords were once our only digital defense, today’s passwordless solutions are making the future more secure than ever, reshaping how we think about identity and access.

In this post, we’ll dive into the current state of passwordless technology, explore how it works, and answer common questions, including:

Blog Post

How can pharmacists successfully implement EPCS?

Q&A with Michele Higgins, PharmD, MBA Michele Higgins, PharmD, MBA, is the pharmacy informatics coordinator for Nebraska Methodist Health System in Omaha, Nebraska. Higgins’ experience, spanning over 20 years, includes implementing systems for automated dispensing cabinets, carousels, pharmacy information systems, bedside barcoding, and setting up a pharmacy department in a brand new facility with a new NICU population utilizing 100% CPOE. Her most recent project has been implementing electronic prescribing of controlled substances (EPCS) for providers across Nebraska Methodist Health System. Recently, Higgins spoke about her EPCS implementation experience and advice:
Blog Post

How can you avoid the roadblocks in the way of your IAM and PAM project implementation?

Privileged Access Management (PAM) consistently receives recognition as the most important and impactful cybersecurity consideration. This is due to the criticality of privileged credentials and the need to protect them.
Blog Post

How critical access management protects government entities from cyber threats

Every 11 seconds, a company falls victim to a ransomware attack. Compromised protected personal data resulted in 1.8 HIPAA privacy violations per day in 2020. The cost of cyber attacks globally in 2021, according to Cybersecurity Ventures, is expected to cost $20 billion.
Blog Post

How critical access management protects three industries from cyber threats

Despite large financial and time-intensive investments into access management tools and cybersecurity solutions, a business’ critical assets still remain vulnerable and prone to attack.
News

How Cybersecurity Solutions are Helping Curb America’s Opioid Crisis

When the clock struck midnight on January 1st, it didn’t just usher in the fresh start of a new year. It also marked the first day of a landmark nationwide mandate for curbing the opioid epidemic: Beginning in 2023, healthcare organizations and providers must electronically prescribe all Schedule II, III, IV, and V controlled substances covered by Medicare Part D.

Blog Post

How data breaches affect technology vendors

Data breaches that involve third parties, vendors, and contractors have continued to make headlines throughout the past 10 years. We continue to see headlines, see articles on social media, and we've all become numb to getting the letters in the mail about another data breach.

Pagination

  • First page 
  • Previous page 
  • …
  • Page 132
  • Page 133
  • Page 134
  • Page 135
  • Page 136
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • France
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2026 Imprivata, Inc. All rights reserved.