Skip to main content
Imprivata Connect: The must-attend event to solve identity and access challenges—together
Partners
  • Integrations
  • Resellers
United States
  • United States
  • DACH
  • France
  • United Kingdom
Imprivata logo

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Secure AI agent access
        • Advanced and Passwordless Access
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
        • Move to passwordless authentication
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata Cares
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      Agentic AI. Passwordless. Mobile.
      Join the Imprivata community at Connect to explore these topics and more—through a day of networking and collaboration focused on shaping the future of simple, secure access for all digital identities.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
    • Column
      • 2nd Column
        • Integrations
        • Resellers
  • Post-CTAs
    • Request demo
    • Support
  • Request a demo
  • Support
The search found 3921 results.
Blog Post

Desktop Virtualization – Has it hit your desk yet?

The discussion on desktop virtualization, or hosted virtual desktop, is heating up. Some view it as futuristic. Others say it is throwback to the world of mainframe computing. With economic concerns forcing businesses to take a hard look at expenses across the enterprise, however, there are many reasons this is such a hot topic.
Blog Post

Massachusetts Data Privacy Regulations – Are You Protected?

A recent Gartner Blog Network post and Wall Street Journal article both focus on new, stricter data regulations being passed in several states, including Massachusetts. The final set of the Massachusetts regulations focus on restricting employee access to data, monitoring malicious activity on the network, and strong authentication protocols. The new regulations will go into effect beginning January 1, 2009.
Blog Post

Identity Management Trends in PCI Compliance Survey Findings

The other week, we announced some findings from a survey conducted over the past couple of months aimed at understanding where authentication and access management sits in the eyes of those concerned with Payment Card Industry (PCI) data security standards (DSS). With PCI publishing the latest PCI Data Security Standard 1.2 on Oct. 1, 2008, this online survey highlighted some interesting trends as companies work toward compliance. Here are a few stats to briefly call out...
Blog Post

Halloween Scary Security Stories 2008

This week I was part of Network World's second annual real-life scary security stories podcast, a panel hosted by Keith Shaw that told the tales of some frightful security happenings over the past year. There were some amazing examples of breaches of data, corporate espionage and simple access and authentication mis-steps, of which I added a few anecdotes from actual conversations I've had over the past year. [to protect the innocent, actual names were not used]
Blog Post

Security in the Cloud

While the concept of cloud computing (accessing applications online) has been around for close to a decade, talks on the subject have intensified significantly in recent months. The catalysts to these discussions range from the sharp decline in hardware and network infrastructure costs to the desire for a business to 'go green' to the need for accessibly by an increasingly distributed workforce. Whatever the reason, big business has taken notice and as this interest turns into action, these companies must be prepared to look at all of the key issues around this move before taking action.
Blog Post

Tips and Tricks for selecting Strong Authentication

Strong authentication can come in a variety of forms, each with it's own unique strengths and weaknesses. Before selecting a type of strong authentication, think about the following:
Blog Post

InSights from the Lone Star state

Hundreds of McKesson customers converged in Grapevine, Texas this past week to learn what their peers are doing and to get the latest product updates from McKesson. Infrastructure upgrades was a common theme this year for many of the attendees I spoke to, with virtualization in particular continuing to rise in priority. Many hospitals had partially or completely virtualized their data center, and some had even virtualized all their desktops.
Blog Post

ASIS 2008 in Atlanta: Where Physical/Logical Convergence Happens

I just came back from the ASIS 2008 Show in Atlanta and boy, do my feet hurt. Over 15,000 attendees, participation in 6 booths including our own, 3 days of constant conversation will do that to a person. This security show is the top venue for those wanting to be educated on the latest in security...from state of the art manhole covers to new IP video and access control systems.
Blog Post

What’s Next: Peering into the Future of Biometrics & Security Convergence

I was recently asked to comment on the future of biometrics so I wanted to share my thoughts here after distilling them down into four buckets... What's Next in Adoption, What's Next in the Tech, What's Next in the Enterprise, and What's Next in Consolidation.
Blog Post

Who’s Really Afraid of HIPAA?

Since 1996, HIPAA has become one of the most important and highly publicized pieces of healthcare legislation in the United States. Over this time it has also become one of THE biggest topics of conversation within the healthcare and security industries and with good reason-HIPAA involves two major issues, patients and privacy. What's truly amazing to me is that behind the scenes, one would naturally have to assume that the majority of healthcare organizations are being driven by the worry of the potential penalties that might be levied on them by the Department of Health & Human Services (HHS) for their failure to fully comply with HIPAA...

Pagination

  • First page 
  • Previous page 
  • …
  • Page 317
  • Page 318
  • Page 319
  • Page 320
  • Page 321
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • France
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2026 Imprivata, Inc. All rights reserved.