Endpoint Protection
Our company prioritizes the security and protection of our systems and data. We employ a multi-layered approach to endpoint security, utilizing a combination of antivirus/antimalware software, firewalls, patch management, data encryption, application whitelisting, and device control policies.
We continuously monitor and manage endpoint security measures to ensure effectiveness and responsiveness to evolving threats. Our dedicated security team conducts regular assessments, audits, and updates to maintain the integrity and robustness of our endpoint security infrastructure.
Vendor Security
MedPass adopts a risk-based strategy to assess vendor security, considering several factors when determining the inherent risk rating. These factors include the vendor’s access to customer and corporate data, integration within production environments, and potential impact on the MedPass brand. Following this assessment, vendor security undergoes rigorous evaluation to establish a residual risk rating and make an informed approval decision.
Secure Remote Access
MedPass ensures secure remote access to internal resources by utilizing OpenVPN, a cloud-based platform. Additionally, we employ malware-blocking DNS servers to safeguard employees and their endpoints during internet browsing.
Security Education
MedPass ensures robust security awareness among employees by providing comprehensive training upon onboarding and annually through educational modules on platforms such as Vanta and Riot. Our engineers undergo additional mandatory live sessions focusing on secure coding principles and practices.
Identity and Access Management
MedPass employs Multi-Factor Authentication (MFA) to enhance identity security by mandating multiple verification methods for accessing our systems and applications. Additionally, we utilize Vanta’s access management module to oversee and administer employee platform access.
Access to applications at MedPass is role-based, with employees granted permissions based on their job functions. When an employee’s tenure concludes, access rights are automatically revoked. Any additional access requests must adhere to the specific application’s approval policies established by our organization.