Learn about the security features of Mirth Connect interface engine, it's vulnerabilities, and best-practices for hardening the system. 
 

intended audience:

  • Anyone performing a security comparison analysis where Mirth Connect is a potential choice. 
  • IT administrators whose job may include the administration of a Mirth Connect appliance.
  • Interface analysts looking to build secure interfaces in Mirth Connect.

IN THIS White paper, YOU WILL LEARN:

  • How to enable and configure encryption for all sensitive content in Mirth Connect.

  • How to enforce password policies for users of Mirth Connect.

  • How to configure Mirth Connect to use certificates for both sending and receiving secure traffic.

AWARD WINNING PRODUCTS          BLOG          WIKI         NEWS/WEBCASTS

Connect With Us