The search found 3759 results.
Whitepaper
This whitepaper examines requirements of the PCI standard and review identity and access management technology that can help organizations comply with these regulations in an efficient and cost-effective manner that is easy for users to embrace.
Blog
Passwordless authentication is the future of healthcare, offering improved security, user experience, and patient care. Reducing passwords is good for clinicians; eliminating them is great. When a clinician taps their proximity badge to open the nearest workstation, then signs in to an EHR system like Epic without entering a password, they conserve precious time and focus for patient care. That’s the goal: passwordless authentication, and more time and attention towards what matters most.
Blog
Listen in as Dai Snyder, Delegated Oversight Program Manager of the Care Coordination Institute (CCI), discusses her multifaceted breach prevention efforts.
Blog
CJIS compliance shouldn’t slow the mission. Imprivata’s Nick Stohlman shares why he joined a team dedicated to helping agencies strengthen security and speed operations with simple, secure access that works the way public safety does.When it comes to law enforcement, every shift depends on having access to information and systems when they’re needed most. That’s been true for the entirety of my career, which spans over two decades. Even now, that part of the job hasn’t changed. What has changed is the complexity of the systems.
Blog
Imprivata experienced a record-breaking year in 2010, punctuated by several prestigious awards and first place ratings from leading industry organizations. These honors underscore our dedication to providing customers and partners with exceptional technology and services, and help to further define Imprivata as the leader in single sign-on (SSO) and access management. We are extremely proud of these accolades, and wanted to share with you a few of the high points from 2010...
Blog
For decades, organizations have poured resources into securing systems with stronger and more complex passwords. Yet despite this investment, passwords remain one of the weakest links in cybersecurity and one of the biggest drains on workforce productivity.
Blog
Physical logical security convergence has garnered increased attention over the past year, and we've had countless conversations with both IT departments and physical security teams about the people, process and technology issues that come with the territory. Integrating teams and policy, not just the technology, needs to be well thought out. Increasingly, the path of our conversations with prospects and customers interested in converging physical and logical access focuses on where to start that type of project.
Whitepaper
This tool provides hospitals and eligible professionals with the core and menu objectives for meeting Meaningful Use -Stage 1 criteria.
News
The moment a patient walks into a hospital and checks in for an appointment is the moment their care journey begins. Ensuring that patient is accurately and efficiently identified is critical to ensuring they receive the appropriate care and have a good experience at the hospital. Yet, while accurate identification may seem simple, it relies on manual identifying information like addresses and birthdates – which can be difficult to rely on when hospitals see hundreds of thousands of patients every year.