Welcome!

News Feed Item

Imprivata Introduces Advanced Biometric Verification Solution to Safeguard against Unauthorized Access to Patient Information on Unattended Clinical Workstations

VMworld® (booth #316)Imprivata® (NYSE: IMPR), a leading provider of authentication, access management and secure communications solutions for the healthcare industry, today introduced several technology enhancements to Imprivata OneSign Secure Walk-Away®, the company’s biometric verification solution that safeguards against unauthorized access to patient records at unattended clinical workstations. Imprivata OneSign Secure Walk-Away now includes advanced 3D camera technology, video tracking and facial recognition software to deliver an active presence detection solution that protects patient information, supports HIPAA compliance and improves clinical workflow efficiency. Imprivata will demo Imprivata OneSign Secure Walk-Away in booth #316 at the VMworld® 2014 conference.

“We’ve made significant enhancements to Imprivata OneSign Secure Walk-Away to deliver a leading-edge, patented presence detection solution that helps customers solve important challenges. Unlike most motion sensor cameras that cover a two-dimensional field, we employ 3D technology to measure depth as well, which is more effective in a busy healthcare setting where multiple providers may be walking in front of a workstation,” said David Ting, founder and CTO of Imprivata. “Imprivata OneSign Secure Walk-Away helps healthcare organizations mitigate the potential exposure of protected health information (PHI) on unattended clinical workstations from which providers have not properly logged out, which is essential to ensuring the integrity and privacy of patient data.”

The use of shared workstations in hallways, patient rooms and other common areas of the hospital introduce the risk of exposing PHI to unauthorized access. Imprivata OneSign Secure Walk-Away addresses this by automating the process of logging providers out of workstations when they leave and re-authenticating them when they return. By minimizing the need to manually log in and out of systems and applications, providers can remain focused on patient care as they move throughout the hospital while PHI remains protected from unauthorized access.

Imprivata OneSign Secure Walk-Away also reduces the possibility of providers entering information when they are unknowingly logged into a system under the wrong credentials, which is a risk associated with shared workstations in a busy healthcare setting. The solution only allows the previously authenticated user to log back into their session, and if other providers need to use the workstations, they are required to provide their own authentication credentials.

“Our care providers are highly mobile, moving constantly throughout the hospital and accessing information from patient rooms, labs, shared workstations and other locations. They don’t want to have to worry about logging out of workstations, especially if they are called away in an emergency situation. However we need to be vigilant in preventing PHI from exposure on unattended computers,” said Gary Diemert, information technology supervisor at Mason General Hospital (Shelton, Wash.). “Imprivata OneSign Secure Walk-Away is a highly reliable, seamless solution for addressing these challenges without disrupting clinical workflows. Our providers can remain focused on patient care with the assurance that PHI is not left exposed, and we see tremendous value in deploying Imprivata OneSign Secure Walk-Away throughout the hospital.”

About Imprivata
Imprivata is a leading provider of authentication and access management solutions for the healthcare industry. Imprivata’s single sign-on, authentication management and secure communications solutions enable fast, secure and more efficient access to healthcare information technology systems to address multiple security challenges and improve provider productivity for better focus on patient care. For more information, please visit www.imprivata.com.

All Imprivata products are trademarks of Imprivata, Inc. in the USA and other countries. All other product or company names mentioned are the property of their respective owners

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, provideed economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session also included a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, drew together recent research and lessons learned from emerging and established compa...
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.