Skip to main content
Imprivata logo
  • Request a demo
  • Support
United States
  • United States
  • DACH
  • French
  • United Kingdom

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Move to passwordless authentication
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata culture
        • Corporate responsibility
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      The Imprivata Connect Conference series brings together visionary minds from the Imprivata community for a day of networking and collaboration in the spirit of shaping the future of simple and secure access management for every digital identity.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
The search found 3763 results.
Blog
Enterprise access and PAM are a perfect pair
As Imprivata strengthens its portfolio with SecureLink, the Securelink Enterprise Access platform will now seamlessly integrate into Imprivata's PAM solution. This software collaboration now allows enterprise organizations to secure and efficiently manage all privileged access to critical assets. That’s a capability all organizations need to stay secure.
Blog
Why the retail industry should embrace access management
The Works, which sells books, toys, and other objects, has 520 stores across the UK. Recently, many of those locations had to temporarily close after a major cyberattack on the retailer. This kind of cybersecurity incident is becoming more and more common across the globe as cyberattacks soar and industries like retail find themselves digitizing faster than their cybersecurity architecture can keep up.
Blog
What is adaptive security?
No attack vector is new. Ransomware, remote access breaches, phishing and other forms of cyber-espionage have been around for decades, yet we’re constantly coming up with new ways to solve them. Technology has evolved to meet the growing need to protect critical access points and assets from cyber-threats, but vulnerabilities are inherent.
Blog
Cybersecurity mesh architecture is the next big trend in cybersecurity
The word is already making the rounds in analyst meetings, white papers, and slide decks: cybersecurity mesh. Is it new software? Or a new attack vector? Or something else entirely? The fact is that cybersecurity mesh architecture is a concept all organizations need to be paying attention to and utilizing in their own cybersecurity strategies.
Blog
Tribal casinos are becoming a major target for ransomware
There’s plenty of money in casinos, and we’re not talking about the coins rattling around in slot machines. Tribal casinos are becoming a new target for ransomware attacks, with bad actors holding systems for ransom and making away with some serious dough.
Blog
Common risks of digital supply chain transformation
The supply chain is changing. Like many industries — retail, critical infrastructure, healthcare — what was once analog is now digital, and the digital supply chain transformation carries with it new, unimagined risks. 
Blog
How user access reviews help organizations achieve SOX compliance
Compliance is critical for many organizations. It not only keeps an organization’s valuable data safe, it also protects against fines, lawsuits, and general mismanagement of data. While it varies based on the industry and size of the organization, the cost of non-compliance can be staggering.
Blog
Improve third-party vendor security and reduce vendor risk
Just one weak link in your supply chain could lead to a potential security disaster. A third-party data breach could cause your organization financial loss, regulatory issues, and damage to your reputation. Here's three easy steps you can take to reduce your third-party vendor risks.
Blog
Principle of least privilege benefits
Current cybersecurity and data protection best practices are far beyond the days of just employing a perimeter defense. Threats are coming in from all sides and old castle-and-moat methodologies are outdated and vulnerable. All it takes is a look at the headlines to see how hackers are able to leverage privileged accounts to gain access to critical data.
Blog
Third-party vendor remote access best practices
Enterprises should be aware that vendors and employees need to have very different logins and credentials. It’s imperative that businesses have much more granular control over remote vendor access to their networks. Find out more in this post.

Pagination

  • First page 
  • Previous page 
  • …
  • Page 16
  • Page 17
  • Page 18
  • Page 19
  • Page 20
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • French
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 (0)2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2025 Imprivata, Inc. All rights reserved.