Skip to main content
Imprivata Connect: The must-attend event to solve identity and access challenges—together
Partners
  • Integrations
  • Resellers
United States
  • United States
  • DACH
  • France
  • United Kingdom
Imprivata logo

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Secure AI agent access
        • Advanced and Passwordless Access
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
        • Move to passwordless authentication
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata Cares
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      Agentic AI. Passwordless. Mobile.
      Join the Imprivata community at Connect to explore these topics and more—through a day of networking and collaboration focused on shaping the future of simple, secure access for all digital identities.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
    • Column
      • 2nd Column
        • Integrations
        • Resellers
  • Post-CTAs
    • Request demo
    • Support
  • Request a demo
  • Support
The search found 3766 results.
News

Cybersecurity Leaders Urge Action as CISA 2015 Expiration Creates Gaps in Cyber Intelligence Sharing

Critical infrastructure industries are facing new uncertainty following the recent expiration of the Cybersecurity Information Sharing Act of 2015 (CISA 2015).

Blog Post

Cybersecurity leadership panel shares perspective on healthcare IoT and protecting patient data

Cybersecurity leaders share perspectives on challenges and best practices surrounding patient data privacy and healthcare IoT devices. Read the blog.
News

Cybersecurity Meaningful Use: Healthcare's Next Big Incentive

If you worked in healthcare back in 2009, you surely have an opinion on the topic of meaningful use. You likely recall the blissful optimism the healthcare community had when the policy was first introduced—and the inevitable disruption and frustration that followed. Now, over a decade later, we're still cleaning up the cybersecurity mess that meaningful use created.

Blog Post

Cybersecurity mesh architecture is the next big trend in cybersecurity

The word is already making the rounds in analyst meetings, white papers, and slide decks: cybersecurity mesh. Is it new software? Or a new attack vector? Or something else entirely? The fact is that cybersecurity mesh architecture is a concept all organizations need to be paying attention to and utilizing in their own cybersecurity strategies.
News

Cybersecurity mesh: Healthcare’s foundation for a strong ZTA

One of the most popular analyst terms in 2022, cybersecurity mesh is a defense method for securing each device and critical access points with their own security perimeter. It builds a foundation of dynamic interoperability in the environment, rather than the traditional security protections of a single perimeter.

Read the full article at MedCityNews.com

News

Cybersecurity Trends and Predictions 2025 From Industry Insiders: Parts 1 & 2

Cybersecurity was a significant concern for organizations in 2024, as it became increasingly more difficult to protect sensitive data and critical infrastructure from theft, damage, and unauthorized access by bad actors.

Blog Post

Cybersecurity year-end review: Two attacks that helped make 2023 the worst on record

No one is immune in this record-breaking time of cyberattacks. Read on to learn about some of 2023’s most notable data breaches, and the tools you need to safeguard your organization.

In an article from Cybersecurity Ventures, author Steve Morgan made a striking comparison that illustrates how prevalent cybercrime has become. Specifically, if cybercrime were a country, it would be the third-largest economy on earth.

Let that sink in.

News

Cybersecurity: addressing the 'termination gap' and protecting data

Between remote work models, clinician burnout and an increased reliance on traveling healthcare professionals to meet shortages, the transient nature of the healthcare workforce in the pandemic era has deepened the risk of insider threats and data security.

News

Cybersecurity: Trends From 2022 and Predictions For 2023

As our home networks continue to merge with the enterprise, and as enterprises across all industries become more dispersed, cybersecurity threats increase. Along with ongoing digital transformation and the proliferation of cloud, that dispersal introduces new challenges for the cybersecurity community. The past 12 months have proven that adapting hasn’t been easy.

Read the full article at www.infosecurity-magazine.com

Partner

Cydentiq Sdn Bhd

Cydentiq is a leading identity security company focused on helping organizations address the ever-evolving identity landscape by building an identity fabric that is governed by our identity security framework to protect business against digital risk – ensure the right people have the right access to the right data at the right time and doing the right thing for the right reason.

Pagination

  • First page 
  • Previous page 
  • …
  • Page 67
  • Page 68
  • Page 69
  • Page 70
  • Page 71
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • France
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2026 Imprivata, Inc. All rights reserved.