Skip to main content
Imprivata Acquires Verosint to Add AI-Powered Risk Signaling to its Leading Enterprise Access Management Platform
Partners
  • Integrations
  • Resellers
United States
  • United States
  • DACH
  • French
  • United Kingdom
Imprivata logo
United States
  • United States
  • DACH
  • French
  • United Kingdom

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Move to passwordless authentication
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata culture
        • Corporate responsibility
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      The Imprivata Connect Conference series brings together visionary minds from the Imprivata community for a day of networking and collaboration in the spirit of shaping the future of simple and secure access management for every digital identity.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
    • Column
      • 2nd Column
        • Integrations
        • Resellers
  • Post-CTAs
    • Request demo
    • Support
  • Request a demo
  • Support
The search found 3835 results.
Blog Post

Post-it passwords

For many, creating a password starts with something easy. A pet’s name, a birthday, some even simply settle for the simple “password.” The truth is, any easy to remember password is likely easy to guess.
Blog Post

IoT devices and secure remote access

We live in a world that wants to connect everything and anything that it can to the Internet, and because of this, it seems that everything we buy today is “smart”— our fridges, our phones, and even our wearable devices.
Blog Post

Attack surfaces and third-party remote access

At the beginning of 2018, experts in the cybersecurity field predicted that bad actors attacking surfaces would continue to be a huge trend. Along the same lines, it’s widely accepted that hackers will take the easiest route available to either breach data, place a form of malware on a network, or just cause disruption.
Blog Post

Are you protected from a supply chain attack?

With the attack on the City of Atlanta, hackers targeting critical infrastructure shouldn’t come as a shock. Long gone are the days of hackers only targeting credit card information; they are looking to disrupt the things we take for granted—and right now hackers are feeding off third-party access to critical infrastructure.
Blog Post

Data breaches are overwhelming the news cycle. Are you next?

If you have already moved on from the Saks Fifth Avenue and Lord & Taylor breach that broke earlier this week affecting 5 million credit cards, don’t worry, another breach happened to other well-known corporations. This breach affected more people and their personal information, and it all stemmed from a third party.
Blog Post

Retail data breaches caused by vendor security problems

Grab a burger at Sonic or roast beef sandwich from Arby’s and watch a new episode streaming on Netflix in your hotel room—what do these consumer-related activities have in common? Each retail business was hacked through a third party connection in the last year.

Blog Post

Data breaches: Is the healthcare industry vulnerable?

A recent study indicated that healthcare data breaches are at a four-year low. However, this statistic is pretty misleading. Why? Because so far, the number of breaches are pretty on-par with past years.
Blog Post

Improve your retail outlook with PCI-compliant remote access

E-commerce gives consumers convenience, selection, and the belief that their online purchase is secure. Regulations developed by credit card companies require business owners to ensure their point of sale (POS) and other network capabilities are maintained in a secure environment.
Blog Post

Secure remote access—Third parties and the finance industry

Rapidly developing technology means consumers in the finance industry look for fast, personalized service. These new opportunities drive business development—but they also drive the risk of data loss and non-compliance. In late 2017, consumer credit agency and data aggregator, Equifax, revealed a severe data loss caused by sloppy security measures.
Blog Post

Do you know how many third-party vendors access your network?

Do you know how many vendors are accessing your network? Is someone in your organization following vendor movements in your system, and controlling their logins?

Pagination

  • First page 
  • Previous page 
  • …
  • Page 47
  • Page 48
  • Page 49
  • Page 50
  • Page 51
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • French
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2026 Imprivata, Inc. All rights reserved.