Skip to main content
The next generation of Access Management – Imprivata Advanced Passwordless Access (APA)
Partners
  • Integrations
  • Resellers
United States
  • United States
  • DACH
  • France
  • United Kingdom
Imprivata logo

Main Nav (2025)

    • State of mobile in healthcare
      Shared mobile devices in healthcare research report
      Our comprehensive report examines the real-world impacts of shared-use mobile devices on healthcare organizations and clinical staff.
      Learn more
    • Left column
      • By Objective
        • Secure AI agent access
        • Advanced and Passwordless Access
        • Access shared devices and kiosks
        • Deploy shared mobile devices
        • Control third-party access
        • Address cyber insurance requirements
        • Improve EHR workflows
        • Protect patient privacy
        • Achieve CJIS compliance
        • Face authentication and identity verification
        • Move to passwordless authentication
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
        • Identity Threat Detection and Response
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata Cares
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Podcast
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Check it out
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      Agentic AI. Passwordless. Mobile.
      Join the Imprivata community at Connect to explore these topics and more—through a day of networking and collaboration focused on shaping the future of simple, secure access for all digital identities.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Resources
        • Education center
        • Community portal
        • Product documentation
    • Column
      • 2nd Column
        • Integrations
        • Resellers
  • Post-CTAs
    • Request demo
    • Support
  • Request a demo
  • Support
The search found 3915 results.
Blog Post

Staying protected against ransomware

As we wrap up cybersecurity month, we’d be remiss if we didn’t visit the ever-present threat of ransomware attacks. Every time we look at the trends around ransomware attacks, the news is rarely positive. The frequency of these attacks has yet to slow down, with experts estimating that an attempted ransomware attack occurred every 11 seconds in 2021, with a total 700 million attempted attacks, up 134% from 2020. Phishing attacks continue to be a common and successful method by which attackers gain initial access to an organization’s network.
Blog Post

The best VPN alternatives for businesses

If you work in the cybersecurity field, or if you’ve ever worked from home, you’re probably pretty familiar with a virtual private network, or as we all know them, a VPN. VPNs offer a method of secure remote access connection between users and a private corporate network.

In other words, it gives you the access you need to files (or anything else) that are found locally on a server, but from the comfort of your home (or airport, coffee shop, or anywhere in between).

Case studies

Finance technology vendor

Finance technology vendor improves time to resolution, meets security and compliance requirements, and simplifies remote access processes
Case studies

Oldcastle centralizes remote access

SecureLink’s standardized solution solved the management of IT contractors, consultants, vendors, and manufacturing support on a single platform.
Checklists

Protect your PHI with a HIPAA compliance checklist

Maintaining HIPAA compliance can be complicated and time consuming for even a small healthcare organization. A slip in compliance, or worse, a breach that compromises data, can cost millions, cause reputational damage, and more.
Checklists

PCI DSS compliance checklist

PCI DSS compliance is important for all industries, from retail, to state and local government, to healthcare. If you handle payment card transactions, it behooves you to stay abreast of PCI regulatory guidelines.
News

Single Sign-on: It's only as good as your ability to use it

Because they are dependent on dozens of highly technical processes, modern factories can't afford to let security burden end users who rely on technology. While this sounds simple enough, putting a plan in action isn't easy.

Checklists

Vendor privileged access checklist

A vendor privileged access management (VPAM) tool should allow network admins to granularly control the remote access of third-party users in a way that increases efficiency and reduces security threats.
Videos

Customer Privileged Access Management overview

Videos

Imprivata Vendor Privileged Access Management Overview

Pagination

  • First page 
  • Previous page 
  • …
  • Page 77
  • Page 78
  • Page 79
  • Page 80
  • Page 81
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • France
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
  • Product
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Events and webinars
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 2173993850

    Australia: +61 3 8844 5533

    France: contactfrance@imprivata.com

    • 
    • 
    • 
    • 
  • Imprivata Logo
  • Post Footer Menu
    • Sitemap
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2026 Imprivata, Inc. All rights reserved.