Skip to main content
Imprivata logo
  • Request a demo
  • Support
United States
  • United States
  • DACH
  • French
  • United Kingdom

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Move to passwordless authentication
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata culture
        • Corporate responsibility
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      The Imprivata Connect Conference series brings together visionary minds from the Imprivata community for a day of networking and collaboration in the spirit of shaping the future of simple and secure access management for every digital identity.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
The search found 3763 results.
Blog
Is the future of access management consolidation?
Not only is cybersecurity changing, but the most recent iteration of the general idea, centered around access management, is itself in flux — threats are constantly changing and technology is evolving faster than most industries can implement.
Blog
Five steps to build a strong access management strategy
It’s no secret that organizations are changing the way they operate. Digitization is everywhere, and employees are going from desktops in cubicles to cloud-connected laptops in home offices, coffee shops, and anywhere in between.
Blog
The human element is still a major factor in breaches
Human error: It’s an everyday occurrence and happens to everyone at some point or another. Unfortunately, when it comes to cybersecurity, human errors, and the human element broadly, can have costly consequences.  According to the 2022 Data Breach Investigation Report by Verizon, human error is still a prominent factor when it comes to breaches.
Blog
Law firms are using more third parties, are they protected from third party risk?
Third party risk is not new. After all, over half of organizations (51%) were the victim of a third-party data breach in the past year. Third parties are opaque, transient, and harder to govern and limit access to.
Blog
The biggest challenge to adopting security tech in manufacturing
The manufacturing sector continues to be one of the most appealing targets for hackers. It has the largest average payout for a ransomware attack and the consequences are too visible and disruptive to ignore. The result: companies are much more likely to pay ransoms and meet demands.
Blog
User access reviews can neutralize retail sector risks
It only took two attacks for Brazilian e-commerce platform, Americanas.com, to lose millions. The attacks, over two days in February 2022, didn’t affect physical stores, but rendered the e-commerce side unavailable, and the total loss added up to $183 million.
Blog
How to identify critical access points
The current trends in the cyber landscape are all rotating around one axis — access points. Hackers and cybersecurity professionals alike are all focusing on access points as their means of success — whether that’s to infiltrate or protect those entryways into critical systems, data, and applications. In order to secure access points, you first need to identify them.
Blog
Looking back on the Colonial Pipeline hack
It’s been one year since Colonial Pipeline was infamously hacked, creating fuel shortages, driving up gas prices, and creating a state of emergency. We’ve dug into this hack many times before, but looking back on one of the biggest critical infrastructure attacks shows us both why this cyber incident is so important and how organizations should move forward with their cybersecurity strategies after the many lessons learned from the attack.
Blog
Insider threats are a major security issue in the financial sector
The Financial industry is becoming a hot target for hackers and ransomware, and it’s no surprise — the industry does deal with money, after all. The sector is 300 times more likely to experience a cyberattack than any other industry, and the industry is absorbing the highest cost with an average of $18.3 million lost per cyberattack.  But it’s not just the Scrooge McDuck-style pools of coins and cash that cause hackers to turn their eyes to financial institutions. It’s the access. The industry has a vast amount of internal users that can quickly turn into insider threats. 
Blog
Drug diversion and monitoring solutions
For a healthcare organization, monitoring access is critical, but that monitoring extends beyond just EMR data — to drug diversion. Drug diversion refers to the illegal distribution of prescription drugs, specifically referring to illegal distribution or abuse by medical professionals. According to the U.S. Department of Justice National Drug Intelligence Center (NDIC), the estimated cost of diversion to public and private medical insurers is more than $72 billion per year.

Pagination

  • First page 
  • Previous page 
  • …
  • Page 15
  • Page 16
  • Page 17
  • Page 18
  • Page 19
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • French
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 (0)2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2025 Imprivata, Inc. All rights reserved.