Skip to main content
Imprivata logo
  • Request a demo
  • Support
United States
  • United States
  • DACH
  • French
  • United Kingdom

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Move to passwordless authentication
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata culture
        • Corporate responsibility
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      The Imprivata Connect Conference series brings together visionary minds from the Imprivata community for a day of networking and collaboration in the spirit of shaping the future of simple and secure access management for every digital identity.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
The search found 3760 results.
News
The Top Line - Health Care Social Media Is In Its Infancy Says Panel
Blog
The top five takeaways from the 2018 Gartner Identity and Access Management Summit
There are three main components of an identity and access management (IAM) strategy: identity governance and administration, access management (including privileged access management), and adaptive multifactor authentication.
Webinar
The top five ransomware attacks, how they happened, and how to prevent them
Ransomware attacks have seen year-on-year growth, with no signs of slowing down. And cybercriminals are using new ransomware tactics, while also diversifying their target industries. The financial consequences of a ransomware attack are enough to put any organization on edge – and if it isn’t, you haven’t been paying attention. According to Sharkstriker, there have been an estimated 2.3 billion ransomware attacks in 2022, an 80% increase since 2021 (Zscaler, 2022).
Blog
The top 8 security points of vendor lifecycle management
Companies continue to heavily rely on third-party vendors to manage mission-critical business functions. These applications may be cloud-based (SaaS) or deployed on-premises and they are often accessed remotely via different devices.
Blog
The top 3 reasons VPNs are a compliance nightmare
Companies of all sizes often turn to virtual private networks, or VPNs, for a critical layer of data security. These solutions are used to protect user-information that's transferred via internet connections from unauthorized access.
News
The Top 25 Women Leaders In Healthcare Software of 2020
Blog
The Top 13 Signs Your Employee Is About to Quit
Departing employees can create a lot of challenges for an organization. So what are the signs your employee is about to quit?
Blog
The top 10 cybersecurity trends in 2024 CISOs should be ready for now: what lies ahead
As healthcare’s digital age continues, the importance of cybersecurity cannot be overstated. With each passing year, cyber threats continue to evolve and pose new challenges. Let’s explore the top cybersecurity trends to watch out for in the healthcare industry in 2024.
Blog
The three key phases to achieve a mature privacy monitoring program
Best practices for a mature privacy monitoring program are based in three key phases that build upon one another, and quickly progress in scope and sophistication. Read our blog recapping the on-demand webinar: 3 key steps to achieve a mature monitoring program 
Datasheet
The third-party remote access solution for the NIST Cybersecurity Framework
SecureLink Enterprise Access provides the means to meet NIST’s security recommendations with regards to your third parties’ access. With individual identity management, granular control over vendor access, and detailed audit trails that log all activity, Imprivata will be a valued partner in helping you mitigate the risks of third-party access and meet the recommendations in the Cybersecurity Framework.

Pagination

  • First page 
  • Previous page 
  • …
  • Page 43
  • Page 44
  • Page 45
  • Page 46
  • Page 47
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • French
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 (0)2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2025 Imprivata, Inc. All rights reserved.