Skip to main content
Imprivata Acquires Verosint to Add AI-Powered Risk Signaling to its Leading Enterprise Access Management Platform
Partners
  • Integrations
  • Resellers
United States
  • United States
  • DACH
  • French
  • United Kingdom
Imprivata logo
United States
  • United States
  • DACH
  • French
  • United Kingdom

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Move to passwordless authentication
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata culture
        • Corporate responsibility
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      The Imprivata Connect Conference series brings together visionary minds from the Imprivata community for a day of networking and collaboration in the spirit of shaping the future of simple and secure access management for every digital identity.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
    • Column
      • 2nd Column
        • Integrations
        • Resellers
  • Post-CTAs
    • Request demo
    • Support
  • Request a demo
  • Support
The search found 3836 results.
Blog Post

Use vendor management audit checklists to identify, monitor, & audit remote access to your network

Using outside vendors can be a godsend for many organizations. These third parties provide the ability to scale a business, bring new and vital expertise to bear on problems, and let you concentrate on core competencies.
Blog Post

The cost of third-party remote access noncompliance: HIPAA violations edition

It’s no news to healthcare-related organizations that if they handle personal health information (PHI) or electronic personal health information (ePHI), they are required to maintain HIPAA/HITECH compliance. These regulations are stringent, and staying compliant can be difficult.
Blog Post

Credential harvesting attacks can threaten your networks

In these strange times of Covid-19, companies face increased and expanded cybersecurity threats. Enterprise security perimeters expanded exponentially almost overnight as both employees and vendor reps work from their homes.
Blog Post

Embracing cybersecurity for better vendor access risk management

When the event hit the news that the medical debt collector American Medical Collection Agency (AMCA) suffered a massive data breach last year, businesses from various industries were shaken.
Blog Post

Top industrial VPN alternatives for manufacturing

The manufacturing industry, like so many others, is undergoing massive change. With the introduction of technologies like 3D printing, Internet of Things (IoT) and Industrial Internet of Things (IIoT), companies have been able to disrupt the industry extremely quickly with creative ways to manufacture products. However, these new tools, increasingly connected to global networks, have created heightened vulnerabilities to cyberattacks.
Blog Post

The importance of vendor onboarding and offboarding processes with third-party risk management

Third-party risk management, or TPRM, is becoming a big deal in IT and Information security circles. This is because a large number of breaches and hacks are being connected to insecure or mismanaged third parties such as vendors, supply chain partners, and cloud companies providing infrastructure or software applications.
Blog Post

Four ways covered entities can ensure HIPAA compliance

Every healthcare organization knows about the Health Insurance Portability and Accountability Act (HIPAA). It’s part of daily life for those working in a healthcare setting, and it can be — from a cybersecurity perspective — a difficult set of regulations to navigate.
Blog Post

How artificial intelligence benefits access control systems

With a single healthcare system averaging 2.5 million EMR accesses a day, it’s safe to say that access control can be an overwhelming task for an organization to manage.
Blog Post

Why enterprise access is a superior VPAM system

The digital world today is all about access. Third parties are accessing software programs, systems, and assets remotely. Employees are accessing servers and data from coffee shops, vacation homes, and even on the road. But more access inherently means more risk.
Blog Post

Zero trust network access vs. least privileged access

If there’s a phrase as buzzy as Zero Trust these days, it’s least privileged access. The two sound similar in both name and concept. If you’re employing zero trust aren’t you, by default, also only granting least privileged access?

Pagination

  • First page 
  • Previous page 
  • …
  • Page 17
  • Page 18
  • Page 19
  • Page 20
  • Page 21
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • French
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2026 Imprivata, Inc. All rights reserved.