Skip to main content
Imprivata Connect: The must-attend event to solve identity and access challenges—together
Partners
  • Integrations
  • Resellers
United States
  • United States
  • DACH
  • France
  • United Kingdom
Imprivata logo

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Secure AI agent access
        • Advanced and Passwordless Access
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
        • Move to passwordless authentication
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata Cares
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      Agentic AI. Passwordless. Mobile.
      Join the Imprivata community at Connect to explore these topics and more—through a day of networking and collaboration focused on shaping the future of simple, secure access for all digital identities.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
    • Column
      • 2nd Column
        • Integrations
        • Resellers
  • Post-CTAs
    • Request demo
    • Support
  • Request a demo
  • Support
The search found 3766 results.
Blog Post

What every business needs to know about PCI compliance

For any business accepting, processing, storing, or transmitting credit card information, PCI DSS compliance should be at the top of its must-do list. The Payment Card Industry Data Security Standard is a set of rules established to create a secure environment within all companies that accept credit card payments.
Blog Post

What I learned at a college recruiting fair.

As a Director of Engineering at Imprivata, I recently participated in a three day recruiting trip to three universities. The goal of the trip was for about 10 high tech companies to visit a few of the top engineering schools to facilitate new talent injection. The visit included University of Michigan, Carnegie Mellon University and Cornell University. The corporate participants included a number of very early startups and a few later stage companies like Imprivata.

Blog Post

What is “meaningful” about exchanging information in health care?

Patient Lily Johnson lies in her hospital bed, waiting for Dr. Barlow to write her discharge orders. She is tired. Hospitals are exhausting places where it’s nearly impossible to get a good night’s sleep. Activity swirls around her but none of it seems meaningful to her. She thought she was going home today. Dr. Barlow had come in on his morning rounds and told her she could go home. But although she calls out to the nurses who pass by her door, she can’t get any definitive time. So she waits.

Blog Post

What is access control?

Access governance is crucial when it comes to securing an organization’s critical access points and assets. But access governance alone isn’t enough. To add another, important, layer of security and mitigate mounting cyber threats, an organization needs to add friction and visibility as well as reduce risks when it comes to access rights.
Blog Post

What is access governance?

63% of organizations don’t have visibility into the level of access and permissions their users have to critical systems. Too many organizations aren’t implementing and enforcing access policies to their most critical assets, like systems, data, networks, infrastructure, and operational technology.
General

What is access management?

Blog Post

What is access monitoring?

It’s hard to know what’s happening with critical access and assets if no one is watching. Access governance can create a secure system, and access controls can add friction, but you don’t know who is actually accessing what unless there are eyes on it.
Blog Post

What is access provisioning in Identity Access Management (IAM)?

Account provisioning in identity access management solutions simplify and reduce time to complete tasks. Learn why IAM is the best choice in this blog.
Blog Post

What is adaptive security?

No attack vector is new. Ransomware, remote access breaches, phishing and other forms of cyber-espionage have been around for decades, yet we’re constantly coming up with new ways to solve them. Technology has evolved to meet the growing need to protect critical access points and assets from cyber-threats, but vulnerabilities are inherent.
Blog Post

What Is an Audit Trail, and Why Is It Important?

What is an audit trail? Audit trails are electronic captures of user activity in data management systems. How do they relate to data security?

Pagination

  • First page 
  • Previous page 
  • …
  • Page 359
  • Page 360
  • Page 361
  • Page 362
  • Page 363
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • France
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2026 Imprivata, Inc. All rights reserved.