The search found 4163 results.
Blog
The European version of the Citrix Synergy event is currently being held in Barcelona Spain. Besides Citrix, some 50 companies are exhibiting, with Imprivata being the only Authentication Management and SSO vendor on the show floor.
Blog
Imprivata OneSign remains an important part of the patient care environment at Memorial, and the hospital continues to partner with Imprivata to address the industry’s new and emerging healthcare IT security needs.
News
By Dan Bowman
A recently published survey by Lexington, Mass.-based IT security company Imprivata found that most hospital IT decision makers believe that text messaging will supplant paging in the healthcare industry within the next three years. Of 114 decision-makers surveyed, 70 percent said they believed that smartphone use will continue to rise, while pager use will continue to decline.
News
Imprivata, the leader healthcare IT security, will hold its first annual HealthCon 2012 User Conference at the Hyatt Regency in Boston, Nov. 6 - 8. The two-day event will feature more than 30 unique breakout sessions delivered by Imprivata product experts, partners, industry leaders and customers. Topics will include workflow improvement, maximizing technology investments, mobile health, electronic health record (EHR) adoption, and meeting HIPAA regulations.
Partner
Netability simplifies the transport, the storage, the processing and the security of all corporate data (documents, voice and video). It is our goal be a leading company in supplying technological solutions geared to rationality, cost balance and corporate innovation.
Blog
Imprivata OneSign ProveID remains an important part of the patient care environment at Catholic Health Partners and the network continues to partner with Imprivata to address their new and emerging healthcare IT security needs.
News
If you are receptive to the ideas of the Jericho Forum security thinktank, then you may well accept its view that organisations can no longer rely on the firewalls that used to mark the extent of their control over IT infrastructure. Of course, in most cases the firewalls are still there.