Staying current: Merit Medical Systems and Symplified

Staying current: Merit Medical Systems and Symplified
Staying current: Merit Medical Systems and Symplified

Universal coverage

To provide universal coverage for all mobile platforms in use at Merit, Symplified uses an identity-based approach to protect apps and data that does not require the installation and maintenance of software on the tablet or smartphone. This makes it possible to secure any operating system, which is especially helpful in cases where the device belongs to the employee. 

“Since users need only enter a single URL on their devices to securely access the apps they need, we can rapidly extend secure web access management, federated SSO and auditing to mobile devices and applications,” Cannon says.

Symplified's new architecture delivers the right applications to the right users on any computing device, anywhere the user happens to be – and does it securely and with centralization of management and auditing, says Darren Platt, CTO of Boulder, Colo.-based Symplified. “The Symplified solution has greatly improved user productivity, reduced IT management time in identity management, in setting/resetting passwords, increased security and provides Merit with audit capabilities on SaaS apps.”

Symplified uses a proven proxy architecture that works without agents or custom code, Platt says. “The company has developed and patented the only cloud-native IAM solution that extends and enforces policies on public and private cloud applications, and audits usage.” While some vendors focus on specific pieces of the cloud IAM problem, Symplified performs all the functions needed to secure access to cloud resources, he says.

Instead of requiring companies to install or write complex plug-in software for each application they want to secure, Symplified allows companies to select the applications they want to secure from the Symplified Trust Fabric App Store, says Platt. From there, security administrators simply set up their policies and link to the identity repositories they want to use for enforcing rules. 

Page 2 of 3
close

Next Article in Features

More in Features

Behind the scenes: Privacy and data-mining

Behind the scenes: Privacy and data-mining

With data-mining firms harvesting personal information from online activity, privacy advocates, if not yet consumers, are alarmed, reports James Hale.

The great divide: Reforming the CFAA

The great divide: Reforming the CFAA

Aaron Swartz's death inspired Rep. Zoe Lofgren to want to reform the federal anti-hacking law, but some security pros worry this would sterilize a potent enforcement weapon, reports Dan Kaplan.

Suspect everything: Advanced threats in the network

Suspect everything: Advanced threats in the network

Are there ways to catch sophisticated malware that hides in trusted processes and services? Deb Radcliff finds out.