The search found 3760 results.
Press
Integration of Verosint Identity Threat Detection & Response with Imprivata Enterprise Access Management will strengthen the company’s advanced and passwordless access strategy to bolster security, improve workflow efficiency, and drive ROI at enterprise scale
News
Cybersecurity Leaders Urge Action as CISA 2015 Expiration Creates Gaps in Cyber Intelligence Sharing
Critical infrastructure industries are facing new uncertainty following the recent expiration of the Cybersecurity Information Sharing Act of 2015 (CISA 2015).
Blog
For decades, organizations have poured resources into securing systems with stronger and more complex passwords. Yet despite this investment, passwords remain one of the weakest links in cybersecurity and one of the biggest drains on workforce productivity.
News
The expiration of the Cybersecurity Information Sharing Act of 2015 (CISA 2015) on September 30 has left healthcare delivery organizations (HDOs) navigating new uncertainty in an already volatile threat landscape.
News
Despite years of investment in cybersecurity awareness training, complex password policies, and multifactor authentication (MFA), human error remains a top cause of data breaches. According to IBM’s Cost of a Data Breach Report, 90% of successful cyberattacks and 70% of data breaches originate at endpoint devices, often triggered by employee workarounds under pressure to move fast.
Blog
As organizations accelerate IT/OT integration, they face new security risks tied to legacy systems, shared logins, and misaligned priorities. Here’s a checklist of top concerns to address when bringing IT and OT environments together.Integrating IT and OT systems enables manufacturers to connect data, devices, and workflows, resulting in more efficient operations. Done right, it powers real-time decision-making, predictive maintenance, and smarter supply chains. But without proper security, IT/OT integration can introduce more risk than resilience.
Blog
Patient misidentification is a leading cause of medical errors, fueling patient harm, denied claims, and unnecessary costs. By focusing on prevention rather than correction, organizations can ensure patient safety and stronger financial performance.
Partner
Unicon, part of Citrix, ensures clinicians can access virtual desktops and patient data instantly and securely — without delays or complex logins. With 30+ years of experience and over 2 million endpoints deployed globally, Unicon serves organizations that handle sensitive data, including healthcare, banking, and the public sector — from small clinics to large hospitals.
Datasheet
Imprivata Enterprise Access Management (EAM) enables access to shared Windows workstations through proximity badge tap combined with face authentication as a secondary factor.