New independent research reveals significant time and cost savings with single sign-on
New independent research reveals significant time and cost savings with single sign-on
As an emergency physician, I’ve been deeply impressed by the medical community’s response to the crisis conditions imposed by the COVID-19 global pandemic.
How the cloud could improve vendor access management
How the cloud could improve vendor access management
At first, it may seem antithetical to consider deploying a vendor access management system in the cloud. After all, you are trying to provide access for third parties to internal systems, and whether it’s a VPN concentrator or a vendor privileged access management (VPAM) system, these devices typically sit inside or on your DMZ.
Multi-factor authentication for remote access
Multi-factor authentication for remote access
Multi-factor authentication (MFA) is talked about, and used, a lot in our day-to-day lives. A classic example of using MFA is a debit card. Not only do you need the physical card, but you also have to enter a personal identification number (PIN) to use it when checking out at a store, or when taking money out of the ATM.
Privacy and Patient Identification: Do the risks outweigh the benefits?
Privacy and Patient Identification: Do the risks outweigh the benefits?
Recently, Imprivata was pleased to have the opportunity to present at 
Major benefits of mature data privacy and protection programs
Uncover the benefits of data protection and privacy program maturity in this article. Find out about programs, attributes of maturity, and more!
Healthcare Roundup: The First Cyberattack Death, The Future of Health Data Privacy, and More
Learn about the world’s first cyberattack fatality, the top causes of data breaches in 2020, the future of health data privacy, relationships with cyber resilient vendors, and more in this post.
Cloud Security Roundup: Shopify’s Insider Threat Data Breach, Security and Risk Trends in 2020, and More
Discover the latest cloud security news, including, Shopify’s insider threat data breach, 2020’s top security and risk trends, and more.
Reasons to consider a cloud deployment for your vendor access management system
Reasons to consider a cloud deployment for your vendor access management system
To cloud or not to cloud? That seems to be the question for every IT system these days, and vendor management is no exception.
Reflections from the UK Digital Health Summer School 2020
Reflections from the UK Digital Health Summer School 2020
The recent Digital Health Summer School was different this year – and not just in the obvious way.  As dictated by current COVID-19 restrictions, it was an online, digital event. This worked very well in terms of the quality and quantity of information that was able to be shared with delegates, but the traditional networking opportunities were missing.
Get digital identity right with the Imprivata Digital Identity Framework for Healthcare
Get digital identity right with the Imprivata Digital Identity Framework for Healthcare
As healthcare delivery organizations (HDOs) evolve into highly complex environments including many roles, locations, devices, and applications, we’re challenged to manage these complexities while maintaining security and efficiency, all without adding a lot of disparate tools.
11 Salesforce Data Security Threats Uncovered by Risk Assessments
Discover 11 Salesforce data security threats organizations discovered with real findings from Imprivata FairWarning's Salesforce data risk assessments.
Healthcare Roundup: Pandemic-Fueled Drug Diversion, Walgreens’ Pharmacy Data Breach, and More
Learn about pandemic-fueled drug diversion, a new Walgreens pharmacy data breach, the top target for credential theft, and more in this post.
Network security audits: 5 keys for successful audits
Network security audits: 5 keys for successful audits
A network security audit is essential to ensure sensitive data is protected from hackers and unauthorized third parties. It can isolate security threats and prevent data breaches, allowing you to plug holes, restrict network access, and improve your company’s network surveillance. Here we outline the 5 keys to preparing for a successful audit.
Exploring the value of time in clinical settings today
Exploring the value of time in clinical settings today
Clinicians are focused on delivering quality patient care. This has become especially true with the surge in patients due to the COVID-19 global pandemic.
Cloud Security Roundup: New Guidelines for Zero Trust Architecture, the Cost of Cybercrime, and More
Discover the latest cloud security news, including new zero trust architecture guidelines, CISO priorities, the cost of cybercrime, and more.
A Closer Look at How the COVID-19 Pandemic Affects Drug Diversion in Healthcare Organizations
COVID-19 has significantly impacted healthcare. In this article, discover how COVID-19 impacts drug diversion in healthcare organizations.
The importance of choice: How to deploy your vendor access management software
The importance of choice: How to deploy your vendor access management software
Not all software deployments are created equally! When it comes to purchasing and deploying new software, we know that not every organization will have the same wants or needs. Companies will differ with their infrastructure, resources, bandwidth, regulatory environments, or implementation timeframes.
Can you afford a third-party data breach?
Can you afford a third-party data breach?
In a year filled with data breaches, cyber-attacks, and unauthorized access, yet another company has been the victim of hackers targeting payment information. Have you considered the consequences of becoming susceptible to a hacking attack? Read this blog post to learn more.
What does zero trust network access look like for third-party vendors?
What does zero trust network access look like for third-party vendors?
Zero Trust Network Access (ZTNA) is everyone's favorite buzzword these days, particularly with security vendors hawking their products. It has become a popular catchphrase describing a next-generation security practice that was formalized by Gartner and implemented by Google in their BeyondCorp concept years later.
COVID-19 Privacy Laws and Regulating Contact Tracing in the U.S.
Policymakers in the United States have introduced three privacy acts to regulate contact tracing solutions that track the spread of the coronavirus, fueling the nationwide debate over data privacy...