Skip to main content
Imprivata logo
  • Request a demo
  • Support
United States
  • United States
  • DACH
  • United Kingdom
  • French

Main Nav

  • Products
    • Access Management
      Fast, secure access to shared devices and applications to improve user efficiency and reduce cyber risks
      • Left column
        • Enterprise Access Management
          SSO, passwordless MFA, and access analytics
        • Mobile Access Management
          Secure, optimize, and manage shared mobile devices
        • Mobile Device Access
          SSO for shared mobile devices and apps
      • Right column
        • Medical Device Access Management
          Fast access to connected medical devices
        • Patient Access
          Touchless facial and palm vein recognition
        • Access Compliance
          Risk analytics for PHI access and medical workflows
    • Privileged Access Security
      Secure privileged access from vendors, employees, or outbound to customers
      • Privileged Access Management
        Enterprise credential vaulting and access security for privileged users and activities
      • Vendor Privileged Access Management
        Secure and control third-party access
      • Customer Privileged Access Management
        Secure remote support access to customers
    • Wall lock icon black
      Integration partners
      A trusted network of technology partners to seamlessly integrate authentication into any application and device
  • Why Imprivata
    • Your objectives
      • Left column
        • Facilitate seamless user access
        • Lower your total cost of ownership
        • Execute a shared mobile strategy
        • Mitigate security threats
        • Optimize your EHR
        • Make EPCS ordering simple
      • Right column
        • Secure third-party access
        • Meet cyber insurance requirements
        • Streamline regulatory compliance
        • Protect patient privacy and safety
    • Industry
      • Healthcare
      • Manufacturing
      • Financial Services
      • Gaming
      • Transportation & logistics
      • State and local government
    • What is access management?
      Access management refers to the set of processes and tools used to allow access to necessary information and resources within an organization
      Explore more
  • Company
    • About us
      We solve the most complex workflow, security, and compliance challenges with purpose-built access management solutions that deliver simple and secure access for every type of user.
      See details
    • Right column
      • Imprivata culture
      • Awards and recognition
      • Corporate responsibility
      • Trust and security
      • Careers
      • Integrations
      • Resellers
      • Contact us
      • Newsroom
  • Customers
    • Experience
      Customers are our top priority, and we’re ready to meet your challenges head-on
      • Customer success
      • Support services
      • Managed services
      • Clinical services
    • Development
      Get the resources you need to ensure success with educational tools that go far beyond implementation
      • Education center
      • Support portal
  • Resources
    • Left side
      • Icon of a calculator
        ROI for Mobile Access Management
        See how much you can save with mobile access management
      • Icon of a calculator
        ROI for Enterprise Access Management
        Explore time savings with enterprise access management
      • Digital Identity Framework icon
        Imprivata product roadmaps
        Explore recently released features and future items
    • Right side
      • Blog
        Stay up to date with insights, tips, and education from experts in digital identity
      • Events and webinars
        Stay informed and register for upcoming events and live webinars
      • Knowledge hub
        Browse content related to the integrity of identity and access management.
    • Content library
      From trends and best practices to datasheets and case studies, find what you need right here
      • Case studies
      • Analyst reports
      • Whitepapers
      • Datasheets
      • Videos
      • On-demand webinars
      • Infographics
      • All resources
The search found 3983 results.
Blog
Halloween Scary Security Stories 2008
This week I was part of Network World's second annual real-life scary security stories podcast, a panel hosted by Keith Shaw that told the tales of some frightful security happenings over the past year. There were some amazing examples of breaches of data, corporate espionage and simple access and authentication mis-steps, of which I added a few anecdotes from actual conversations I've had over the past year. [to protect the innocent, actual names were not used]
Blog
Security in the Cloud
While the concept of cloud computing (accessing applications online) has been around for close to a decade, talks on the subject have intensified significantly in recent months. The catalysts to these discussions range from the sharp decline in hardware and network infrastructure costs to the desire for a business to 'go green' to the need for accessibly by an increasingly distributed workforce. Whatever the reason, big business has taken notice and as this interest turns into action, these companies must be prepared to look at all of the key issues around this move before taking action.
Blog
Tips and Tricks for selecting Strong Authentication
Strong authentication can come in a variety of forms, each with it's own unique strengths and weaknesses. Before selecting a type of strong authentication, think about the following:
Blog
InSights from the Lone Star state
Hundreds of McKesson customers converged in Grapevine, Texas this past week to learn what their peers are doing and to get the latest product updates from McKesson. Infrastructure upgrades was a common theme this year for many of the attendees I spoke to, with virtualization in particular continuing to rise in priority. Many hospitals had partially or completely virtualized their data center, and some had even virtualized all their desktops.
Blog
ASIS 2008 in Atlanta: Where Physical/Logical Convergence Happens
I just came back from the ASIS 2008 Show in Atlanta and boy, do my feet hurt. Over 15,000 attendees, participation in 6 booths including our own, 3 days of constant conversation will do that to a person. This security show is the top venue for those wanting to be educated on the latest in security...from state of the art manhole covers to new IP video and access control systems.
Blog
What’s Next: Peering into the Future of Biometrics & Security Convergence
I was recently asked to comment on the future of biometrics so I wanted to share my thoughts here after distilling them down into four buckets... What's Next in Adoption, What's Next in the Tech, What's Next in the Enterprise, and What's Next in Consolidation.
Blog
Who’s Really Afraid of HIPAA?
Since 1996, HIPAA has become one of the most important and highly publicized pieces of healthcare legislation in the United States. Over this time it has also become one of THE biggest topics of conversation within the healthcare and security industries and with good reason-HIPAA involves two major issues, patients and privacy. What's truly amazing to me is that behind the scenes, one would naturally have to assume that the majority of healthcare organizations are being driven by the worry of the potential penalties that might be levied on them by the Department of Health & Human Services (HHS) for their failure to fully comply with HIPAA...
Blog
HIMSS 2010: Meaningful Use, EMR Standards, Clinician Workflows, Security, Oh My!
This year’s HIMSS was quite an active conference, with healthcare IT a national focal point with new legislation and stimulus funding being funneled into reform and modernization initiatives. To kickoff the conference, Imprivata chief medical officer, Dr. Barry Chaiken, who is the current chair of HIMSS highlighted the need for healthcare IT solutions to drive positive industry change. Here are some pull-outs from an InformationWeek blog covering the event that capture the sentiment well...
Blog
Guest Post: ecfirst CEO, Ali Pabrai, on HITECH’s Meaningful Use and Compliance
There’s a lot of discussion around meaningful use, its definition and how organizations can obtain the government incentives that recent legislation promises. However, in the dash for these types of healthcare IT investment reimbursements, one must not overlook the role of security risk in satisfying compliance requirements.
Blog
Barriers to EHR Implementation: Fact and Fun
Over at the Life as a Healthcare CIO blog, John D. Halamka MD captured a list of top barriers to electronic health record (EHR) implementations, then added on with another ‘Top 10’ that puts a little fun into the serious business of EHRs. Below are barriers that stood out to me from a data security and healthcare access management perspective, and I urge you to check out John’s blog for more specifics – definitely worth the read and a great source of information. The key Barriers to deploying EHR worth noting...

Pagination

  • First page 
  • Previous page 
  • …
  • Page 348
  • Page 349
  • Page 350
  • Page 351
  • Page 352
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • United Kingdom
  • French
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
    • Events and webinars
  • Platform
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 (0)2173993850

    Australia: +61 3 8844 5533

    • 
    • 
    • 
    • 
Also of interest
  • Resource Listing | Imprivata
  • Access management solutions
  • Digital Identity for Mission- and...
  • Imprivata Logo
  • Post Footer Menu
    • Contact us
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2025 Imprivata, Inc. All rights reserved.