|By PR Newswire||
|March 3, 2014 11:34 AM EST||
CLEVELAND, March 3, 2014 /PRNewswire-USNewswire/ -- Checkpoint Surgical has been awarded a contract for neural monitoring and nerve stimulation devices by the world's largest medical group purchasing organization MedAssets. The three year agreement between the two firms covers all Checkpoint devices and is effective April 1st, 2014. Checkpoint Surgical produces the Checkpoint Stimulator/Locator, which is a state-of-the-art, handheld, intra-operative nerve and muscle stimulator that helps surgeons locate, identify and evaluate motor nerve function in surgical procedures.
"We are pleased to announce this agreement," said Checkpoint CEO & President Len Cosentino. "We began this journey over 18 months ago and now to be officially recognized as a MedAssets' approved vendor is a significant accomplishment. It validates Checkpoint both clinically and financially as a device and a company and we look forward to helping MedAssets members save money while improving patient care."
About Checkpoint Surgical
2013 Manny award and Innovation in Business award-winning Checkpoint Surgical is headquartered in Cleveland, Ohio, a leading center for neurodevice research and development. Checkpoint Surgical provides surgeons with state-of-the-art neurodevices to locate and identify nerves and evaluate nerve and muscle function in surgical procedures.
SOURCE Checkpoint Surgical
Jul. 2, 2015 03:00 PM EDT Reads: 936
Jul. 2, 2015 02:52 PM EDT
Jul. 2, 2015 02:30 PM EDT Reads: 1,128
Jul. 2, 2015 02:15 PM EDT Reads: 713
Jul. 2, 2015 02:15 PM EDT Reads: 2,179
Jul. 2, 2015 02:00 PM EDT Reads: 1,019
Jul. 2, 2015 01:45 PM EDT Reads: 2,270
Jul. 2, 2015 01:36 PM EDT Reads: 353
Jul. 2, 2015 01:00 PM EDT Reads: 1,199
Jul. 2, 2015 01:00 PM EDT Reads: 1,030
Jul. 2, 2015 12:00 PM EDT Reads: 2,006
Jul. 2, 2015 11:50 AM EDT Reads: 398
Jul. 2, 2015 11:17 AM EDT Reads: 397
Jul. 2, 2015 11:15 AM EDT Reads: 1,029
Malicious agents are moving faster than the speed of business. Even more worrisome, most companies are relying on legacy approaches to security that are no longer capable of meeting current threats. In the modern cloud, threat diversity is rapidly expanding, necessitating more sophisticated security protocols than those used in the past or in desktop environments. Yet companies are falling for cloud security myths that were truths at one time but have evolved out of existence.
Jul. 2, 2015 11:00 AM EDT Reads: 2,187