Learn about the security features of Mirth Connect interface engine, it's vulnerabilities, and best-practices for hardening the system.
- Anyone performing a security comparison analysis where Mirth Connect is a potential choice.
- IT administrators whose job may include the administration of a Mirth Connect appliance.
- Interface analysts looking to build secure interfaces in Mirth Connect.
IN THIS White paper, YOU WILL LEARN:
How to enable and configure encryption for all sensitive content in Mirth Connect
How to enforce password policies for users of Mirth Connect
- How to configure Mirth Connect to use certificates for both sending and receiving secure traffic.
Connect With Us