Skip to main content
Imprivata Acquires Verosint to Add AI-Powered Risk Signaling to its Leading Enterprise Access Management Platform
Partners
  • Integrations
  • Resellers
United States
  • United States
  • DACH
  • French
  • United Kingdom
Imprivata logo
United States
  • United States
  • DACH
  • French
  • United Kingdom

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Move to passwordless authentication
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata culture
        • Corporate responsibility
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      The Imprivata Connect Conference series brings together visionary minds from the Imprivata community for a day of networking and collaboration in the spirit of shaping the future of simple and secure access management for every digital identity.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
    • Column
      • 2nd Column
        • Integrations
        • Resellers
  • Post-CTAs
    • Request demo
    • Support
  • Request a demo
  • Support
The search found 3836 results.
Blog Post

4 Benefits of User Activity Monitoring for Healthcare Privacy

User activity monitoring in healthcare provides many benefits. To learn more about the top 4 benefits for privacy, read this post.
Blog Post

User Activity Monitoring in Salesforce: 5 Lessons Learned for a Stronger Data Governance Program

Here are five lessons learned from user activity monitoring in Salesforce – and what to keep in mind when building a data governance program.
Blog Post

User Behavior Analytics

How proactive is your security team about detecting, investigating, and isolating alerts? Do your current strategies alert you to information systems misuse from within your own organization?
Blog Post

Using Salesforce Shield to Monitor Salesforce Adoption, ROI

Are employees utilizing Salesforce the way you intended? What can lower performers learn from top performers? Where are your time and finances best spent? Who needs training -- and who can train?...
Blog Post

Verizon Protected Health Information Data Breach Report 2018 Breakdown

Healthcare faces an advanced set of challenges to secure data compared to other industries. There’s no single contributing factor, but rather a wide array of industry obstacles that make securing...
Blog Post

Weekly Cloud Security Roundup: Bank Data Security Weakened by Insiders, New Privacy Developments, and More

Each week, we’ll bring you seven of the most compelling cloud- and Salesforce-security-related stories from the last seven days. This week, we have updates on one of the biggest threats to bank...
Blog Post

Weekly Cloud Security Roundup: Starwood Data Breach Lawsuits Begin, Cybersecurity Predictions, and More

Each week, we’ll bring you seven of the most compelling cloud- and Salesforce-security-related stories from the last seven days. This week, we have updates on the Starwood data breach, 2019...
Blog Post

Weekly Cloud Security Roundup: The Nordstrom Insider Threat, Jail Time for the C-Suite, and More

Each week, we'll bring you seven of the most compelling cloud- and Salesforce-security-related stories from the last seven days. This week, we have the Nordstrom insider threat, a new bill that...
Blog Post

What Is an Audit Trail, and Why Is It Important?

What is an audit trail? Audit trails are electronic captures of user activity in data management systems. How do they relate to data security?
Blog Post

What is Einstein Analytics? A Closer Look at Salesforce’s Visibility Tool

In June 2017, the world’s #1 CRM platform, Salesforce, released their newly rebranded analytics tools for viewing data – Einstein Analytics (formerly known as “Wave”). Many who use the platform...

Pagination

  • First page 
  • Previous page 
  • …
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • French
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2026 Imprivata, Inc. All rights reserved.