Skip to main content
The next generation of Access Management – Imprivata Advanced Passwordless Access (APA)
Partners
  • Integrations
  • Resellers
United States
  • United States
  • DACH
  • France
  • United Kingdom
Imprivata logo

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Secure AI agent access
        • Advanced and Passwordless Access
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
        • Move to passwordless authentication
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata Cares
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      Agentic AI. Passwordless. Mobile.
      Join the Imprivata community at Connect to explore these topics and more—through a day of networking and collaboration focused on shaping the future of simple, secure access for all digital identities.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
    • Column
      • 2nd Column
        • Integrations
        • Resellers
  • Post-CTAs
    • Request demo
    • Support
  • Request a demo
  • Support
The search found 3914 results.
Blog Post

Employee remote access risks vs. vendor access threats

The last decade saw a dramatic increase of enterprise employees leaving the confines of the company building to work remotely. The State of the Remote Job Marketplace report from FlexJobs found 2.9% of the entire United States workforce works from home at least half of the time. This introduces a significant security challenge for network managers.
Blog Post

The do's and don'ts of using active directory in your organization

Active Directory (AD) is so ubiquitous on Windows networks that many organizations have not invested time optimizing the tool. However, this consideration is critical. Your AD configuration has significant process and network security implications, so it’s important that you prioritize a review of how you’re currently managing the service. Here are a few guidelines to follow as you assess your current set up:

DO

Blog Post

Is hacking the new robbing? Cybersecurity in the finance industry

Though the days of robbing banks aren’t over, the attacks on the financial services sector have definitely evolved. Instead of coming up with an elaborate plan that includes avoiding the inevitable security cameras outside a bank, people with malicious intent are choosing a route that gives them access to a wealth of information from to comfort of their home, a cyberattack.
Blog Post

Post-it passwords

For many, creating a password starts with something easy. A pet’s name, a birthday, some even simply settle for the simple “password.” The truth is, any easy to remember password is likely easy to guess.
Blog Post

IoT devices and secure remote access

We live in a world that wants to connect everything and anything that it can to the Internet, and because of this, it seems that everything we buy today is “smart”— our fridges, our phones, and even our wearable devices.
Blog Post

Attack surfaces and third-party remote access

At the beginning of 2018, experts in the cybersecurity field predicted that bad actors attacking surfaces would continue to be a huge trend. Along the same lines, it’s widely accepted that hackers will take the easiest route available to either breach data, place a form of malware on a network, or just cause disruption.
Blog Post

Are you protected from a supply chain attack?

With the attack on the City of Atlanta, hackers targeting critical infrastructure shouldn’t come as a shock. Long gone are the days of hackers only targeting credit card information; they are looking to disrupt the things we take for granted—and right now hackers are feeding off third-party access to critical infrastructure.
Blog Post

Data breaches are overwhelming the news cycle. Are you next?

If you have already moved on from the Saks Fifth Avenue and Lord & Taylor breach that broke earlier this week affecting 5 million credit cards, don’t worry, another breach happened to other well-known corporations. This breach affected more people and their personal information, and it all stemmed from a third party.
Blog Post

Retail data breaches caused by vendor security problems

Grab a burger at Sonic or roast beef sandwich from Arby’s and watch a new episode streaming on Netflix in your hotel room—what do these consumer-related activities have in common? Each retail business was hacked through a third party connection in the last year.

Blog Post

Data breaches: Is the healthcare industry vulnerable?

A recent study indicated that healthcare data breaches are at a four-year low. However, this statistic is pretty misleading. Why? Because so far, the number of breaches are pretty on-par with past years.

Pagination

  • First page 
  • Previous page 
  • …
  • Page 39
  • Page 40
  • Page 41
  • Page 42
  • Page 43
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • France
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2026 Imprivata, Inc. All rights reserved.