Skip to main content
The next generation of Access Management – Imprivata Advanced Passwordless Access (APA)
Partners
  • Integrations
  • Resellers
United States
  • United States
  • DACH
  • French
  • United Kingdom
Imprivata logo
United States
  • United States
  • DACH
  • French
  • United Kingdom

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Advanced and Passwordless Access
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
        • Move to passwordless authentication
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata Cares
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      The Imprivata Connect Conference series brings together visionary minds from the Imprivata community for a day of networking and collaboration in the spirit of shaping the future of simple and secure access management for every digital identity.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
    • Column
      • 2nd Column
        • Integrations
        • Resellers
  • Post-CTAs
    • Request demo
    • Support
  • Request a demo
  • Support
The search found 3842 results.
Blog Post

Cloud Security Roundup: New Guidelines for Zero Trust Architecture, the Cost of Cybercrime, and More

Discover the latest cloud security news, including new zero trust architecture guidelines, CISO priorities, the cost of cybercrime, and more.
Blog Post

Cloud Security Roundup: Salesforce Buys Slack, Top Cybersecurity Threats, CPRA Amends CCPA, and More

Discover the latest cloud security news, including, Salesforce’s purchase of Slack, the top cybersecurity threats, CPRA, and more.
Blog Post

Cloud Security Roundup: Shopify’s Insider Threat Data Breach, Security and Risk Trends in 2020, and More

Discover the latest cloud security news, including, Shopify’s insider threat data breach, 2020’s top security and risk trends, and more.
Blog Post

Cloud Security Roundup: SolarWinds Breach, Twitter’s GDPR Fine, WFH Insider Threats, and More

Discover the latest cloud security news, including, SolarWinds breach, Twitter’s $500k GDPR fine, WFH insider threats, and more.
Blog Post

Cloud Security Tools: Selecting the Right Solutions and the Right Vendors

In this post, we highlight the five most effective cloud security vendor solutions that thwart the type of malicious activity that threatens the safety of your data.
Blog Post

What CMS and ONC’s Proposed Rules on Data Blocking in Healthcare Mean for Patient Privacy, Security

What is data blocking, and what do the ONC and CMS's proposed rules mean for healthcare privacy, security, and interoperability?
Blog Post

Complying with Privileged User Regulations: How One Firm Met GDPR, ISO 27001 in Salesforce

Find out how, like United Capital, you can protect data from privileged user abuse or misuse and comply with privileged user regulations.
Blog Post

COVID-19 Privacy Laws and Regulating Contact Tracing in the U.S.

Policymakers in the United States have introduced three privacy acts to regulate contact tracing solutions that track the spread of the coronavirus, fueling the nationwide debate over data privacy...
Blog Post

Creating a HIPAA Compliant Data Privacy and Security Training Program

Explore this post to learn the best practices for creating a HIPAA compliant data privacy and security training program.
Blog Post

Cloud Data Compliance and Security – Achieving Regulatory Compliance with Cloud Security Applications

Security and privacy may lead the pack when it comes to cloud usage, but cloud data compliance is an important area that often goes overlooked.

Pagination

  • First page 
  • Previous page 
  • …
  • Page 340
  • Page 341
  • Page 342
  • Page 343
  • Page 344
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • French
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2026 Imprivata, Inc. All rights reserved.