Skip to main content
Imprivata logo
  • Request a demo
  • Support
United States
  • United States
  • DACH
  • United Kingdom

Main Nav

  • Products
    • Access Management
      Fast, secure access to shared devices and applications to improve user efficiency and reduce cyber risks
      • Left column
        • Enterprise Access Management
          SSO, passwordless MFA, and access analytics
        • Mobile Access Management
          Secure, optimize, and manage shared mobile devices
        • Mobile Device Access
          SSO for shared mobile devices and apps
      • Right column
        • Medical Device Access Management
          Fast access to connected medical devices
        • Patient Access
          Touchless facial and palm vein recognition
        • Access Compliance
          Risk analytics for PHI access and medical workflows
    • Privileged Access Security
      Secure privileged access from vendors, employees, or outbound to customers
      • Privileged Access Management
        Enterprise credential vaulting and access security for privileged users and activities
      • Vendor Privileged Access Management
        Secure and control third-party access
      • Customer Privileged Access Management
        Secure remote support access to customers
    • Wall lock icon black
      Integration partners
      A trusted network of technology partners to seamlessly integrate authentication into any application and device
  • Why Imprivata
    • Your objectives
      • Left column
        • Facilitate seamless user access
        • Lower your total cost of ownership
        • Execute a shared mobile strategy
        • Mitigate security threats
        • Optimize your EHR
        • Make EPCS ordering simple
      • Right column
        • Secure third-party access
        • Meet cyber insurance requirements
        • Streamline regulatory compliance
        • Protect patient privacy and safety
    • Industry
      • Healthcare
      • Manufacturing
      • Financial Services
      • Gaming
      • Transportation & logistics
      • State and local government
    • What is access management?
      Access management refers to the set of processes and tools used to allow access to necessary information and resources within an organization
      Explore more
  • Company
    • About us
      We solve the most complex workflow, security, and compliance challenges with purpose-built access management solutions that deliver simple and secure access for every type of user.
      See details
    • Right column
      • Imprivata culture
      • Awards and recognition
      • Corporate responsibility
      • Trust and security
      • Careers
      • Integrations
      • Resellers
      • Contact us
      • Newsroom
  • Customers
    • Experience
      Customers are our top priority, and we’re ready to meet your challenges head-on
      • Customer success
      • Support services
      • Managed services
      • Clinical services
    • Development
      Get the resources you need to ensure success with educational tools that go far beyond implementation
      • Education center
      • Support portal
  • Resources
    • Left side
      • Icon of a calculator
        ROI for Mobile Access Management
        See how much you can save with mobile access management
      • Icon of a calculator
        ROI for Enterprise Access Management
        Explore time savings with enterprise access management
      • Digital Identity Framework icon
        Imprivata product roadmaps
        Explore recently released features and future items
    • Right side
      • Blog
        Stay up to date with insights, tips, and education from experts in digital identity
      • Events and webinars
        Stay informed and register for upcoming events and live webinars
      • Knowledge hub
        Browse content related to the integrity of identity and access management.
    • Content library
      From trends and best practices to datasheets and case studies, find what you need right here
      • Case studies
      • Analyst reports
      • Whitepapers
      • Datasheets
      • Videos
      • On-demand webinars
      • Infographics
      • All resources
The search found 4044 results.
Blog
Tips and Tricks for selecting Strong Authentication
Strong authentication can come in a variety of forms, each with it's own unique strengths and weaknesses. Before selecting a type of strong authentication, think about the following:
Blog
InSights from the Lone Star state
Hundreds of McKesson customers converged in Grapevine, Texas this past week to learn what their peers are doing and to get the latest product updates from McKesson. Infrastructure upgrades was a common theme this year for many of the attendees I spoke to, with virtualization in particular continuing to rise in priority. Many hospitals had partially or completely virtualized their data center, and some had even virtualized all their desktops.
Blog
ASIS 2008 in Atlanta: Where Physical/Logical Convergence Happens
I just came back from the ASIS 2008 Show in Atlanta and boy, do my feet hurt. Over 15,000 attendees, participation in 6 booths including our own, 3 days of constant conversation will do that to a person. This security show is the top venue for those wanting to be educated on the latest in security...from state of the art manhole covers to new IP video and access control systems.
Blog
What’s Next: Peering into the Future of Biometrics & Security Convergence
I was recently asked to comment on the future of biometrics so I wanted to share my thoughts here after distilling them down into four buckets... What's Next in Adoption, What's Next in the Tech, What's Next in the Enterprise, and What's Next in Consolidation.
Blog
Who’s Really Afraid of HIPAA?
Since 1996, HIPAA has become one of the most important and highly publicized pieces of healthcare legislation in the United States. Over this time it has also become one of THE biggest topics of conversation within the healthcare and security industries and with good reason-HIPAA involves two major issues, patients and privacy. What's truly amazing to me is that behind the scenes, one would naturally have to assume that the majority of healthcare organizations are being driven by the worry of the potential penalties that might be levied on them by the Department of Health & Human Services (HHS) for their failure to fully comply with HIPAA...
Blog
A Logical Security Convergence Starting Point: The Data Center
Physical logical security convergence has garnered increased attention over the past year, and we've had countless conversations with both IT departments and physical security teams about the people, process and technology issues that come with the territory. Integrating teams and policy, not just the technology, needs to be well thought out. Increasingly, the path of our conversations with prospects and customers interested in converging physical and logical access focuses on where to start that type of project.
Blog
New York Times article on Single Sign-on: Cryptography vs. Passwords?
The New York Times recently posted an article decrying passwords as an inadequate defense mechanism for security today in a wave of identity theft occurrences. The article goes on to push a cryptography-based approach to log-on systems, touting ‘information cards' that rely on the computer handshake between machines to authenticate a user, or in this case, a site visitor. The article goes on to rail against the OpenID initiative because of its password-driven approach to SSO to access OpenID-enabled Web sites.
Blog
Strong Authentication at the Point of Transaction
Recently, according to a Federal Computer Week article, the Drug Enforcement Administration proposed rules to allow e-Prescribing of controlled substances, such as painkillers and stimulants. The proposed rules require doctors to use two forms of identification for each transmission of e-Prescriptions for controlled substances in addition to an annual audit of each system by a certified public accountancy. Under current rules, doctors may use e-Prescribing for most prescriptions but must sign a written prescription for Schedule II controlled substances, such as Nembutal, OxyContin and opium. The DEA rule, if it becomes final, would allow doctors to use the same system for generating and transmitting all prescriptions.
Blog
Modeling Risk
Risk management seems to be the conversation du jour. I was just a the Lenel Paradigm Conference in Rochester with some of their leading security consultants and the topic that constantly came up was Risk and how security practioners needed to understand the business drivers around mitigating risk. With access and authentication management-centric security breaches like LendingTree and Societe Generale making headlines and compliance requirements mandating greater information security, how does one even begin to understand what a company needs to do?
Blog
SSO Summit field notes
Full disclosure: I'm just a medium-sized hospital's IT security guy. I've had Imprivata'sESSO appliance (three of them actually, a pair of HA, and a test box) up and running, happily, for about three years. I was invited by Imprivata and Ping Identity to participate in a panel discussion at the SSO Summit held in Keystone, CO, on July 23-25 (http://www.ssosummit.com/). Andre Durand (Ping Identity) and friends put on a very nice event. There was a good blend of topics, from SSO-centric details, to Federation issues, and a mixture of interesting case studies to visionary presenters like John Haggard (independent security consultant and long-time IT mentor) and Gunnar Peterson (Arctec Group). The event was solid throughout, but to hear John and Gunnar speak about the important issues of the past and future of SSO and IT/Web security, made the event a powerful experience not to be missed.

Pagination

  • First page 
  • Previous page 
  • …
  • Page 291
  • Page 292
  • Page 293
  • Page 294
  • Page 295
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • United Kingdom
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
    • Events and webinars
  • Platform
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 (0)2173993850

    Australia: +61 3 8844 5533

    • 
    • 
    • 
    • 
Also of interest
  • Resource Listing | Imprivata
  • Access management solutions
  • Digital Identity for Mission- and...
  • Imprivata Logo
  • Post Footer Menu
    • Contact us
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2025 Imprivata, Inc. All rights reserved.