Skip to main content
Imprivata Connect: The must-attend event to solve identity and access challenges—together
Partners
  • Integrations
  • Resellers
United States
  • United States
  • DACH
  • France
  • United Kingdom
Imprivata logo

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Secure AI agent access
        • Advanced and Passwordless Access
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
        • Move to passwordless authentication
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata Cares
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      Agentic AI. Passwordless. Mobile.
      Join the Imprivata community at Connect to explore these topics and more—through a day of networking and collaboration focused on shaping the future of simple, secure access for all digital identities.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
    • Column
      • 2nd Column
        • Integrations
        • Resellers
  • Post-CTAs
    • Request demo
    • Support
  • Request a demo
  • Support
The search found 3766 results.
Analyst reports

The state of cybersecurity and third-party remote access

Organizations are treading water when it comes to cybersecurity. What happens when the next wave comes?

Ebooks

The state of passwordless authentication in healthcare: Ending password pain

Webinars

The State of Third-Party Access in Cybersecurity

In today's digital age, the reliance on third parties—such as vendors, contractors, and suppliers—is more crucial than ever. However, this increased collaboration also introduces significant cybersecurity risks. While we've seen some progress, the threat is far from gone. Many companies still face data breaches that can be traced back to third parties, often due to overly generous access privileges. These breaches can lead to serious headaches, from lost data to regulatory fines and damaged business relationships.

The good news? You’re not alone in this battle.

Blog Post

The state of third-party access security: Are we gaining ground or spinning wheels?

Our latest Imprivata thought leadership blog examines the continued challenges of third-party access management, plus best practices to mitigate risks.

“Not enough. And not fast enough.”

That’s the bottom-line progress assessment by Imprivata leaders on the current state of vendor privileged access risk management. Here’s a look at some key obstacles hindering organizations’ progress, and how they can overcome them.

Blog Post

The success story of CynexLink and SecureLink

SecureLink is proud to introduce our enhanced Partner program, PartnerLink. PartnerLink is designed to build and grow relationships with valuable cybersecurity solutions for customers.

News

The Tate Chronicles: Gus Malezis, President & CEO of Imprivata

News

The tech needed for more contactless hospitals, healthcare

Datasheets

The Third-Party Remote Access Solution for HIPAA Compliance

Datasheets

The third-party remote access solution for the NIST Cybersecurity Framework

SecureLink Enterprise Access provides the means to meet NIST’s security recommendations with regards to your third parties’ access. With individual identity management, granular control over vendor access, and detailed audit trails that log all activity, Imprivata will be a valued partner in helping you mitigate the risks of third-party access and meet the recommendations in the Cybersecurity Framework.
Blog Post

The three key phases to achieve a mature privacy monitoring program

Best practices for a mature privacy monitoring program are based in three key phases that build upon one another, and quickly progress in scope and sophistication. Read our blog recapping the on-demand webinar: 3 key steps to achieve a mature monitoring program 

Pagination

  • First page 
  • Previous page 
  • …
  • Page 329
  • Page 330
  • Page 331
  • Page 332
  • Page 333
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • France
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2026 Imprivata, Inc. All rights reserved.