Skip to main content
Imprivata Acquires Verosint to Add AI-Powered Risk Signaling to its Leading Enterprise Access Management Platform
Partners
  • Integrations
  • Resellers
United States
  • United States
  • DACH
  • French
  • United Kingdom
Imprivata logo
United States
  • United States
  • DACH
  • French
  • United Kingdom

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Move to passwordless authentication
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata culture
        • Corporate responsibility
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      The Imprivata Connect Conference series brings together visionary minds from the Imprivata community for a day of networking and collaboration in the spirit of shaping the future of simple and secure access management for every digital identity.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
    • Column
      • 2nd Column
        • Integrations
        • Resellers
  • Post-CTAs
    • Request demo
    • Support
  • Request a demo
  • Support
The search found 3835 results.
Partner

Infosistem

INFOSISTEM is the leading regional system-integrator and a company with extensive experience in information technology, whose origins date back to 1959. Thanks to knowledge and experience of its professionals, INFOSISTEM became a natural choice and a stable backbone of many large business systems. We use cutting-edge technology like Imprivata in all the areas we work in so that we can design and implement the very best and secure systems for our clients.

Our reference list shows our presence not only in the Republic of Croatia, but also in the entire region.

Blog Post

NERC updates may force utility companies into better cybersecurity

Once implemented, these upcoming regulations will ensure electrical utilities are safer from cyber threats, especially those brought in by third parties. Breaches and incidents at utility and other energy-related companies have been rising faster than an electric bill in a Texas summer.
Blog Post

Boost manufacturing security with a vendor access management strategy

In our previous blog, we explained how cyberattacks are putting manufacturing systems at greater risk of data loss and malicious activity. Now let’s look at strategies companies can take to tighten up some of the security gaps that can leave manufacturing systems vulnerable to attack.
Blog Post

Five ways cyber attacks put manufacturing systems at risk

Some industries, like financial services and healthcare, have been targets of cyberattacks since day one. For years, manufacturing seemed far less interesting to hackers, and even C-suite executives at these companies weren’t particularly worried about the risk of attack.
Blog Post

Why you need third-party risk management in manufacturing

Manufacturing is changing. As we enter the fourth industrial revolution, factories are becoming globalized, digitized, and relying more and more on the internet of things to produce goods and services. As this transformation continues and once localized entities become smart factories, they are connecting to more third parties. And inviting in more third-party risk.
Blog Post

Are you using the right vendor remote access tool? lessons from the texas connectwise ransomware attack

Nearly six months after the Texas mass ransomware attacks that took down operations at 22 small Texas cities, we still talk about it pretty regularly. That's the type of impact a mass ransomware attack can have.
Blog Post

Why third-party risk management matters

We’ve made it through one full month of the New Year and the outlook for terrorism-related cyber incidents is already pretty stormy. During the standoff with Iran, cyberattacks were listed as one of their top possible responses.
Blog Post

Why MSPs should care about cybersecurity

As a Managed Service Provider (MSP), there are many things you need to focus on to be successful in your business. You have to be a subject matter expert in your particular area in order to convince companies to outsource that function to you, customer service is always important, and response time and time to resolution are critical metrics that organizations will evaluate when deciding whether or not to continue your service.
Blog Post

How to survive a cybersecurity audit

If you’re in a regulated industry or serve customers that are, sooner or later you will probably have auditors examine your cybersecurity setup. This may be on the behalf of clients, or for your own internal corporate governance.
Blog Post

The risks of business associates and HIPAA compliance

In May 2019, the American Medical Collection Agency (AMCA), a "business associate" of a number of healthcare providers, reported an eight-month data breach had exposed sensitive information for more than 20 million patients.

Pagination

  • First page 
  • Previous page 
  • …
  • Page 43
  • Page 44
  • Page 45
  • Page 46
  • Page 47
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • French
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2026 Imprivata, Inc. All rights reserved.