Skip to main content
Imprivata Connect: The must-attend event to solve identity and access challenges—together
Partners
  • Integrations
  • Resellers
United States
  • United States
  • DACH
  • France
  • United Kingdom
Imprivata logo

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Secure AI agent access
        • Advanced and Passwordless Access
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
        • Move to passwordless authentication
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata Cares
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      Agentic AI. Passwordless. Mobile.
      Join the Imprivata community at Connect to explore these topics and more—through a day of networking and collaboration focused on shaping the future of simple, secure access for all digital identities.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
    • Column
      • 2nd Column
        • Integrations
        • Resellers
  • Post-CTAs
    • Request demo
    • Support
  • Request a demo
  • Support
The search found 3765 results.
Ebooks

The cost and ROI of cybersecurity

News

The Cost of Inefficient Health-Care Communications

Blog Post

The Cost of Insider Threats in Financial Services and How to Reduce Them

The cost of insider threats in financial services may be high, but there are ways to reduce them – find out how in this blog post.
Blog Post

The Cost of Insider Threats in the Healthcare Industry and How to Reduce Them

With mounting costs of insider threats in healthcare, how can organizations protect themselves from risks that come from inside?
Blog Post

The cost of third-party remote access noncompliance: HIPAA violations edition

It’s no news to healthcare-related organizations that if they handle personal health information (PHI) or electronic personal health information (ePHI), they are required to maintain HIPAA/HITECH compliance. These regulations are stringent, and staying compliant can be difficult.
Blog Post

The countdown for New York's I-STOP legislation has begun. Are you ready?

Effective March 27th, 2016, the Internet System for Tracking Over-Prescribing (I-STOP) Act requires electronic prescribing of all medications, including controlled substances, in the state of New York. There are many requirements for Electronic Prescribing of Controlled Substances (EPCS) and for I-STOP. Prescribers must use e-prescribing software that has been certified and audited, complete an identity proofing process, obtain two-factor authentication for each prescription, in accordance with Drug Enforcement Agency (DEA) regulations, and register substance e-prescribing software with the Bureau of Narcotic Enforcement (BNE).
Blog Post

The Critical Access Management Gap We Need to Talk About at Identiverse

Every business wants to be secure. Every business needs to be productive. But in practice, the way we manage access too often forces a choice between the two.

News

The Crucial Role of Mobility in EHR Optimization

Technology is evolving faster than hospitals can keep up with. Clinicians are relying on outdated tools built to solve yesterday’s problems – and they’re not cutting it. While the proliferation of electronic health records (EHR) led to an era of digital transformation, it also introduced security friction and slowed clinicians down. A recent McKinsey study found that 20% of a 12-hour nursing shift is spent on activities that could be optimized through technology enablement. 

Blog Post

The dangerous ripple effects of ransomware attacks on patient safety

Our thought leadership blog provides valuable perspective on the dangerous domino-effect impacts of ransomware attacks on patient safety. Read more! 

News

THE DATA CENTER JOURNAL - ACCESS MANAGEMENT: HOW TO AUTHENTICATE USERS

Pagination

  • First page 
  • Previous page 
  • …
  • Page 319
  • Page 320
  • Page 321
  • Page 322
  • Page 323
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • France
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2026 Imprivata, Inc. All rights reserved.