The search found 144 results.
Press
Waltham, Mass.—March 13, 2025 — Imprivata®, the digital identity company for life- and mission-critical industries, today announced that Imprivata Mobile Access Management (MAM) has won the Mobile Device Access Management category in the 2025 Cybersecurity Excellence Aw
News
As cyber threats escalate and budgets tighten, security discussions are increasingly shifting away from predicting the next big thing and toward identifying what delivers real, measurable results. With ransomware attacks rising across sectors and global cyber insurance premiums increasing by 15-20% year-over-year, boards are pressuring CISOs to demonstrate measurable returns on every dollar spent.
Press
Integration of Verosint Identity Threat Detection & Response with Imprivata Enterprise Access Management will strengthen the company’s advanced and passwordless access strategy to bolster security, improve workflow efficiency, and drive ROI at enterprise scale
News
Despite years of investment in cybersecurity awareness training, complex password policies, and multifactor authentication (MFA), human error remains a top cause of data breaches. According to IBM’s Cost of a Data Breach Report, 90% of successful cyberattacks and 70% of data breaches originate at endpoint devices, often triggered by employee workarounds under pressure to move fast.
Partner
Unicon, part of Citrix, ensures clinicians can access virtual desktops and patient data instantly and securely — without delays or complex logins. With 30+ years of experience and over 2 million endpoints deployed globally, Unicon serves organizations that handle sensitive data, including healthcare, banking, and the public sector — from small clinics to large hospitals.
Datasheet
Imprivata Enterprise Access Management (EAM) enables access to shared Windows workstations through proximity badge tap combined with face authentication as a secondary factor.
Datasheet
Imprivata Enterprise Access Management with single sign-on (formerly Imprivata OneSign) integrates with Baxter’s Welch Allyn Connex vital signs monitors to enable fast, secure badge-tap access at the bedside.
Blog
At a time when security and efficiency are crucial for modern enterprises, business leaders can’t afford to choose one over the other.
Blog
Effective identity and access security depends on strengthening trust and cyber resilience through AI-powered identity threat detection and response.The foundation for cybersecurity has shifted. The security perimeter is gone, and complex passwords are becoming obsolete. With AI now embedded in most workflows, powering critical business systems, and even accelerating cyberattacks, identity has become the most reliable control point to build security around. It’s the one constant across users, devices, cloud apps, and third parties.