Skip to main content
Imprivata logo
  • Request a demo
  • Support
United States
  • United States
  • DACH
  • French
  • United Kingdom

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Move to passwordless authentication
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata culture
        • Corporate responsibility
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      The Imprivata Connect Conference series brings together visionary minds from the Imprivata community for a day of networking and collaboration in the spirit of shaping the future of simple and secure access management for every digital identity.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
The search found 3760 results.
Blog
Compare RDP vs VNC in simple language
 RDP or VNC AccessA friend recently asked me to explain the difference between RDP and VNC protocol to remotely access a computer.RDP stands for Remote Desktop Protocol. It is a proprietary protocol built by Microsoft to let users graphically control a remote computer.
Blog
Bipartisan legislation in U.S. Congress requires e-prescribing to combat opioid abuse
On July 28, federal legislators introduced HR 3528, The Every Prescription Conveyed Securely Act – bipartisan legislation that would require healthcare providers to prescribe opioids and other medications electronically through a Medicare Part D prescription drug plan.
Datasheet
Ensure positive patient identification with Imprivata and Just Associates
Healthcare can only be effective if the correct care is provided to the correct patient, using accurate patient information. However, relying on manual identification processes such as demographic searches and querying using Social Security Numbers often results in patient misidentification, which can lead to patient safety errors and financial issues for the hospital.
News
Community Hospital Anderson Goes Live on Imprivata’s Biometric Solution
News
PatientSecure Sees Indiana Hospital Deployment
Blog
Community Hospital Anderson Ensures Positive Patient Identification
Community Hospital Anderson, a part of Indiana’s Community Health Network, believes that positive patient identification is the foundation of accurate, quality care and patient safety.
Blog
Four methods to access cloud computers securely
 Networks in the cloudIt is easy to start a virtual computer these days in a cloud datacenter managed by Amazon AWS or Microsoft Azure. It is also easy to start a second and a third one and then plan to build a virtual network. This network can grow and shrink, get updated and upgraded following the needs of the organization even outgrowing old good on-premises datacenter.
Press
Community Hospital Anderson Uses Imprivata Biometric Solution to Combat Patient Misidentification Crisis
Leading Healthcare System in Indiana to deploy Imprivata PatientSecure identification solution
News
2 steps to improve positive patient identification & lower the rate of duplicate records
Blog
Preparing for cyberattacks: building a resilient infrastructure
As history shows, global ransomware attacks have been part of the new reality for quite some time. As the healthcare industry continues to move away from paper and towards an increasingly digitized environment, the risk of cyberattacks increases. What is a cyberattack? In basic terms, a cyberattack involves launching an attack from one or more computers against another computer, multiple computers, or networks. The goal of these attacks is to:

Pagination

  • First page 
  • Previous page 
  • …
  • Page 224
  • Page 225
  • Page 226
  • Page 227
  • Page 228
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • French
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 (0)2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2025 Imprivata, Inc. All rights reserved.