Skip to main content
Imprivata logo
  • Request a demo
  • Support
United States
  • United States
  • DACH
  • United Kingdom
  • French

Main Nav (2025)

    • 2025 Ponemon iPad
      Third party security report
      New research from Imprivata and the Ponemon institute unveils the inherent cyber risk associated with third-party network access.
      Learn more
    • Left column
      • By Objective
        • Facilitate seamless user access
        • Lower your total cost of ownership
        • Execute a shared mobile strategy
        • Mitigate security threats
        • Optimize your EHR
        • Secure third-party access
        • Meet cyber insurance requirements
        • Streamline regulatory compliance
        • Protect patient privacy and safety
    • Right column
      • By Industry
        • Healthcare
        • Manufacturing
        • State and Local Government
        • Financial Services
        • Gaming
        • Transportation and Logistics
    • Roadmaps
      Product roadmaps
      Explore recently released features and future items.
      Learn more
    • Left column
      • Core capabilities
        • Single Sign-On
        • Multifactor Authentication
        • Mobile Access
        • User Behavior and Access Analytics
        • Privileged Access Management
        • Third Party Access Management
        • Remote Support
    • Right column
      • Healthcare capabilities
        • Patient Privacy Monitoring
        • Drug Diversion Monitoring
        • Medical Device Access Management
        • Biometric Patient Authentication
        • Electronic Prescribing for Controlled Substances (EPCS)
    • About us
      We deliver simple and secure access management solutions for healthcare and other mission-critical industries to ensure every second of crucial work is both frictionless and secure.
      See details
      Contact us
    • Left column
      • Who we are
        • Imprivata culture
        • Corporate responsibility
        • Trust and security
        • Leadership
    • Right column
      • What’s new
        • Newsroom
        • Awards and recognition
        • Careers
    • Knowledge hub
      The Imprivata Knowledge Hub is a repository of important terms, topics, and solutions related to identity and access management. Browse content by product or industry to learn about securing assets, compliance across sectors, technology glossaries, and advancements in protecting identities and systems.
      Learn more
    • Left column
      • Events
        • Live events
        • On-demand webinars
      • Partners
        • Integration partners
        • Resellers
    • Right column
      • Resources
        • Blog
        • Analyst reports
        • Case studies
        • Whitepapers
        • Datasheets
        • Videos
        • Infographics
        • All resources
    • Connect logo
      Imprivata Connect
      The Imprivata Connect Conference series brings together visionary minds from the Imprivata community for a day of networking and collaboration in the spirit of shaping the future of simple and secure access management for every digital identity.
      Learn more
    • Left column
      • Customer experience
        • Customer success
        • Support services
        • Managed services
        • Clinical services
    • Right column
      • Development resources
        • Education center
        • Support portal
The search found 3769 results.
Blog
Improve third-party vendor security and reduce vendor risk
Just one weak link in your supply chain could lead to a potential security disaster. A third-party data breach could cause your organization financial loss, regulatory issues, and damage to your reputation. Here's three easy steps you can take to reduce your third-party vendor risks.
Blog
Principle of least privilege benefits
Current cybersecurity and data protection best practices are far beyond the days of just employing a perimeter defense. Threats are coming in from all sides and old castle-and-moat methodologies are outdated and vulnerable. All it takes is a look at the headlines to see how hackers are able to leverage privileged accounts to gain access to critical data.
Blog
Third-party vendor remote access best practices
Enterprises should be aware that vendors and employees need to have very different logins and credentials. It’s imperative that businesses have much more granular control over remote vendor access to their networks. Find out more in this post.
Blog
What’s the difference between RDP and VPN for remote access?
Remote access has become a necessity in business environments. Whether it’s employees working from home or third-party vendors that need to access a customer network, remote access needs to provide secure and reliable connectivity—keyword here being secure.
Blog
Okta breach highlights need for third-party security
Chances are you know of, or have even used, Okta. The authentication and identity management software is almost ubiquitous, offering multi-factor authentication for single users across large organizations. Unfortunately, Okta was the subject of a security breach back in January.
Blog
Four problems enterprise access solves
Using third parties is nearly inevitable in today’s business landscape. Most organizations need to outsource some of their operations, whether it’s on a large or small scale.
Blog
An investment in cybersecurity is an investment in patient care
Healthcare organizations’ number one priority is patient care. They’re in the business of helping patients, so most of their time, energy, and resources are allocated there. However, cybersecurity is becoming an increasingly important topic for healthcare organizations.
Blog
Five cybersecurity risks the manufacturing industry faces
As society enters a fourth industrial revolution, the manufacturing industry is facing vast, rapid changes. Those changes are marked by both innovation, productivity and efficiency improvements, and new, unforeseen risks.
Blog
How enterprise access helps achieve compliance
Third parties continue to be one of the biggest cybersecurity risks to an organization. Last year, nearly half of organizations experienced a data breach caused by a third party and with ransomware on the rise, businesses need to lock down their third-party security strategy before a hacker finds a vulnerable access point.
Blog
Benefits of credential vaulting
Despite warnings from every cybersecurity professional, passwords are still being shared, compromised, and ineffectively managed. 66% of individuals are using the same password across devices and applications. 42% rely on sticky notes to manage passwords. And shockingly, 59% of IT professionals rely on memory to manage their corporate credentials.

Pagination

  • First page 
  • Previous page 
  • …
  • Page 37
  • Page 38
  • Page 39
  • Page 40
  • Page 41
  • …
  • Next page 
  • Last page 
United States
  • United States
  • DACH
  • United Kingdom
  • French
  • Company
    • Who we are
    • Leadership
    • History
    • Integrations
    • Resellers
    • Trust and security
    • Careers
    • Newsroom
    • Events and webinars
  • Platform
    • Enterprise Access Management
    • Mobile Access Management
    • Mobile Device Access
    • Medical Device Access Management
    • Patient Access
    • Access Compliance
    • Privileged Access Management
    • Vendor Privileged Access Management
    • Customer Privileged Access Management
  • How to buy
    • Request demo
    • Contact us
  • Resources
    • Blog
    • Case studies
    • Analyst reports
    • Whitepapers
    • Datasheets
    • Videos
    • On-demand webinars
    • Infographics
    • Knowledge hub
  • Worldwide headquarters

    20 CityPoint, 6th floor

    480 Totten Pond Rd

    Waltham, MA 02451

    Phone: +1 781 674 2700

    Toll-free: +1 877 663 7446

    International

    London: +44 (0)208 744 6500

    Germany: +49 (0)2173993850

    Australia: +61 3 8844 5533

    • 
    • 
    • 
    • 
Also of interest
  • Resource Listing | Imprivata
  • Access management solutions
  • Digital Identity for Mission- and...
  • Imprivata Logo
  • Post Footer Menu
    • Contact us
    • Legal
    • Trust and Security
    • Privacy Policy
    • Cookie Policy
  • © 2025 Imprivata, Inc. All rights reserved.