Skip to main content
Imprivata logo
  • Request a demo
  • Support
United States
  • United States
  • DACH
  • French
  • United Kingdom

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Move to passwordless authentication
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata culture
        • Corporate responsibility
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      The Imprivata Connect Conference series brings together visionary minds from the Imprivata community for a day of networking and collaboration in the spirit of shaping the future of simple and secure access management for every digital identity.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
The search found 3767 results.
Blog
How data breaches affect technology vendors
Data breaches that involve third parties, vendors, and contractors have continued to make headlines throughout the past 10 years. We continue to see headlines, see articles on social media, and we've all become numb to getting the letters in the mail about another data breach.
Blog
Why efficiency and security are more important than ever for vendor access management
We're not going to be dropping new information when we say that security is important when allowing network access to external parties like vendors and contractors. Along the same lines, breaches coming from third-party access are increasing, as vendors often offer an easier way into your network than a full-frontal assault on your defenses.
Blog
How the cloud could improve vendor access management
At first, it may seem antithetical to consider deploying a vendor access management system in the cloud. After all, you are trying to provide access for third parties to internal systems, and whether it’s a VPN concentrator or a vendor privileged access management (VPAM) system, these devices typically sit inside or on your DMZ.
Blog
Multi-factor authentication for remote access
Multi-factor authentication (MFA) is talked about, and used, a lot in our day-to-day lives. A classic example of using MFA is a debit card. Not only do you need the physical card, but you also have to enter a personal identification number (PIN) to use it when checking out at a store, or when taking money out of the ATM.
Blog
Reasons to consider a cloud deployment for your vendor access management system
To cloud or not to cloud? That seems to be the question for every IT system these days, and vendor management is no exception.
Blog
Network security audits: 5 keys for successful audits
A network security audit is essential to ensure sensitive data is protected from hackers and unauthorized third parties. It can isolate security threats and prevent data breaches, allowing you to plug holes, restrict network access, and improve your company’s network surveillance. Here we outline the 5 keys to preparing for a successful audit.
Blog
The importance of choice: How to deploy your vendor access management software
Not all software deployments are created equally! When it comes to purchasing and deploying new software, we know that not every organization will have the same wants or needs. Companies will differ with their infrastructure, resources, bandwidth, regulatory environments, or implementation timeframes.
Blog
Can you afford a third-party data breach?
In a year filled with data breaches, cyber-attacks, and unauthorized access, yet another company has been the victim of hackers targeting payment information. Have you considered the consequences of becoming susceptible to a hacking attack? Read this blog post to learn more.
Blog
What does zero trust network access look like for third-party vendors?
Zero Trust Network Access (ZTNA) is everyone's favorite buzzword these days, particularly with security vendors hawking their products. It has become a popular catchphrase describing a next-generation security practice that was formalized by Gartner and implemented by Google in their BeyondCorp concept years later.
Blog
Is cyber insurance worth it?
These days, having cyber insurance that covers a company for costs related to cyberattacks is an expected standard corporate practice. It is the last in the line of risk mitigation tools that lessens or defers your company’s cyber risk.

Pagination

  • First page 
  • Previous page 
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • French
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 (0)2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2025 Imprivata, Inc. All rights reserved.